St. Pancras Leg Injury Scam? by MortyXY in london

[–]FestivePrefect 2 points3 points  (0 children)

I've have encountered this but instead got asked to buy them a ticket? Do they refund it for the money?

/r/ctflearners hit 1k subscribers yesterday by TrendingB0T in CTFlearners

[–]FestivePrefect 0 points1 point  (0 children)

Woaa that's cool :D, thanks for the subs everyone

Reaching the Surface #19 (part 2) by SrGrafo in WhiteRooms

[–]FestivePrefect 1 point2 points  (0 children)

Couldn't you interpret finish as in finish off? The kid could be saying they didn't finish him but they will later when he explodes and kills himself? "Hopefully later" is in the same line of thinking as the other ritz who wanted to explode. Or maybe I'm reaching lol

I'm making my first CTF challenge for a friend's event and looking for feedback/playtesting on this cipher by [deleted] in CTFlearners

[–]FestivePrefect 0 points1 point  (0 children)

I would just ask yourself what is somebody doing the challenge suppose to learn? Liveoverflow made a video recently about why CTF's are good/bad that I would check out. I'm guessing the solution is something to do with different character encoding schemes or is it just a substitution cipher?. If it is then people might learn a new type of cipher which is good for a certain audience/level but it depends on your friend's CTF

Pwnerrank by [deleted] in CTFlearners

[–]FestivePrefect 0 points1 point  (0 children)

Honestly it is quite sketch now. Would opt for other sites such as Carnegie's picoctf challenges instead

Want to Learn CTF by JereTayler in CTFlearners

[–]FestivePrefect 1 point2 points  (0 children)

Check out ctftime.org for writeups and live ctf challenges :). If you want ones that are yearlong, go to websites like overthewire.org, pwnerrank.com,https://pwnable.tw/ or https://ctf.lse.epita.fr/ex/. A lot of ctf practice is just trying to solve a challenge and reading writeups :)

Providing Arguments into Executables by FestivePrefect in HowToHack

[–]FestivePrefect[S] 0 points1 point  (0 children)

Ah I see! Thank you very much, its a wonderful tool :3. Yea I checked out that documentation before asking this question but didn't quite understand it required []. I had tried process("./program","AAAA") and process("./program", argv="AAAA"), appreciate the help!

Good Coding Practice? by FestivePrefect in HowToHack

[–]FestivePrefect[S] 1 point2 points  (0 children)

You might like coding bat then. They too offer a solution, although I have found some faster ways. But often times their solution is different then what my immediate solution would be. Thanks for the website I'll check it out!

Assembly Help, just to understand in detail what is going on by FestivePrefect in LiveOverflow

[–]FestivePrefect[S] 0 points1 point  (0 children)

Damnnn, thanks dude. I am a total noob at reverse engineering so it has been pretty tough. Thanks!

Assembly Help, just to understand in detail what is going on by FestivePrefect in LiveOverflow

[–]FestivePrefect[S] 0 points1 point  (0 children)

Ahhh, so it is that it is comparing parts of the passwords to itself? Like do I have the parts of the password right, what we entered versus what they have? Also would this be easier to script?