You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As part of our engagement in the [P3rf3ctr00t](https://perfectroot.wiki/) CTF, [Fr334aks-mini](https://www.linkedin.com/company/83010158/) showcased remarkable teamwork and determination, achieving 5th place overall, while our second team secured 26th position. This competition presented diverse challenges that tested our problem-solving skills across multiple domains, sharpening our technical expertise and teamwork.
In this write-up, I will delve into some of the challenges I tackled in OSINT, Reverse Engineering, Forensics, and Steganography. These categories not only highlight the breadth of the competition but also underline the strategic approaches and methodologies I employed to solve them. Each challenge provided unique insights and opportunities for growth, contributing to our overall success.
21
21
@@ -24,7 +24,7 @@ Let’s explore the challenges and my journey through these fascinating categori
Making the file executable with `chmod +x poresssss` then running it `./poresssss` gave no output.
123
123
124
124
What just happened! Ever downloaded a random game online and installed it locally. While playing you get to see random pop ups that disappear in a sec? that’s what it feels running a binary and there’s no nothing.
The main functions is empty and does not seem to call any other function, especially the printFlag function which is why we are here in the first place!
@@ -140,19 +140,19 @@ The function `printFlag` takes two parameters:
140
140
141
141
Together, these parameters allow the function to decode and print data stored in a memory block, treating each element as an encoded value to be broken down into individual characters.
0 commit comments