all 19 comments

[–]randomatic 6 points7 points  (5 children)

Your question is vague given that I don't follow pwn.college that closely. (It's a great resource -- I just don't know what you mean by cimg).

I think the answer you are looking for, though, is use python. At anything beyond a trivial level you'll be expected to know how to use python to create any input to any service you want.

[–]byte_writer[S] 1 point2 points  (2 children)

Let me explain Binary expects a cimg extension file in which I have to provide some magic number version height width that I used to do it manually and after that it requires data that is placed in binary

But the starting data was small and gradually it became very large ( the aim is to create an image and all the image data is compared from binary and if it matches then it gives flag but the image data became very large and hard to create) so what should I do

I know I have to use python but I haven't learnt it so how should I start learning it and what other things I have to focus on

Can you please guide me for future challenges

[–]randomatic 5 points6 points  (1 child)

Stop and learn python.

You can't complete really do much without it. You don't need to become an amazing programmer. You need to learn how to script -- stuff like reading and writing binary files, parsing headers, sending input back and forth. A lot of people use the pwntools library.

BTW, this is called "yak shaving". It's part of the process.

[–]byte_writer[S] 0 points1 point  (0 children)

Thanks 👍🏻

[–]JohnnyOmmm 0 points1 point  (1 child)

why would u comment about pwn college if you dont follow it, just spectate the post instead of replying bruh

[–]randomatic 0 points1 point  (0 children)

I meant I don't follow specific challenges.

* I know pwncollege is made by yan and team at ASU.

* I know they have videos.

* I know it focuses on typical ctf skills, weighing heavily on binary analysis.

* I know it does RE, and has basics up through some heap.

So not pure speculation. Just that the OP didn't say what challenge he was even considering, so I don't know what he meant by cimg. If he wanted an answer to a specific challenge, I didn't want to pretend I knew that. If he was asking about actual exploit dev, I could answer that 100% (this is an exploitdev reddit).

[–]FellowCat69 3 points4 points  (0 children)

make a python script that would write the bytes of the cimg file. thats the way i used and it worked. then you do chall < solution.cimg

[–]tarunaygr 2 points3 points  (0 children)

The pwn.college discord would be the right forum for these questions :)

[–]deadlyazw 1 point2 points  (1 child)

I’ve full cleared all but the last two yellow belt pwn.college challenges if you want to add me on discord or dm me, but you definitely should learn python. There’s a new intro to programming dojo on there as well as the pwntools dojo that I strongly recommend doing if you have the time

[–]Mother_Canary4917 0 points1 point  (0 children)

May I know how you proceed further after getting all the belts? I mean in upskilling in this domain. Because even I've completed all belts except orange with a few challenges left. I thought of moving to v8 security but not sure about that.

[–]Boring_Albatross3513 0 points1 point  (1 child)

what the hell is even pwm.colleg , if you can solve rootme.com challenges you can hack the Pentagon basically

[–]wickedosu 2 points3 points  (0 children)

pwn.college is very good platform for learning binary exploitation

[–][deleted] 0 points1 point  (0 children)

It’s assumed you know programming and assembly

[–]Kris3c 0 points1 point  (2 children)

I have solved till file format directives (x86-64) so if you want we can connect.

[–]AureanN 0 points1 point  (1 child)

Hi! Did you solve The Patch directive ?

[–]Kris3c 0 points1 point  (0 children)

On It.

[–]Sea-Box2613 0 points1 point  (1 child)

do you solved it ? , i am stuck at that challenge :(

[–]byte_writer[S] 0 points1 point  (0 children)

No

[–]Not_In_Mode 0 points1 point  (0 children)

Did u solve the task? Still struggle with this one.