Code vulnerable to buffer overflow:
char command[16];
char way_too_small_input_buf[8];
//...
read(0, way_too_small_input_buf, 24);
//...
system(command);
Code vulnerable to buffer overflow:
char command[16];
char way_too_small_input_buf[8];
//...
read(0, way_too_small_input_buf, 24);
//...
system(command);
Logic2 file (recognized by the UART in the name of the challenge and the .sal
extension)
By opening it, we can see that most of the channels are unused, there's transmission only on channel 0.
Since we already know that is a UART communication, we can use Logic's Async Serial tool to read the content
We can try the most common Baud Rates to try and decode the serial content (9600, 14400, 19200, 38400, 57600, 115200)
This one is simple! Just look where you might look at the cryptographic history of the sunshinectf.org domain! There's a Yeti in one and a Nimbus in another!
Here, we're asked to chech the cryptographic history of the challenge domain. Since we're talking about a website, it can only mean to check the history of its security certificates!
We can see it by visiting crt.sh. This is an OSINT Tool aimed to gather info on certificates emitted to the certificate transparency logs,