37
Online CTF idsecconf Walkthrough Ahmad Maulana <[email protected]>

Ctf online idsecconf2012 walkthrough

Embed Size (px)

DESCRIPTION

CTF online #idsecconf2012 - 8th level walkthorugh by uhuy http://2012.idsecconf.org/p/ctf.html

Citation preview

Page 1: Ctf online idsecconf2012 walkthrough

Online CTF idsecconf Walkthrough

Ahmad Maulana <[email protected]>

Page 2: Ctf online idsecconf2012 walkthrough

CTF? CTF IDSECCONF  atau Capture The Flag adalah salah satu permainan

simulasi hacking yang diadakan tiap tahun berbarengan dengan diadakannya kegiatan IDSECCONF.

CTF ini dilakukan secara online, siapapun bisa menjadi pesertanya dengan cukup melakukan registrasi via web.

Untuk CTF online tahun 2012 beralamat di http://ctf.2012.idsecconf.org dikuti oleh lebih kurang 250 peserta yang valid (divalidasi via email) dan dilaksanakan selama 11 Hari (26 April 2012 - 6 Mei 2012) dengan jumlah level (challenge) sebanyak 8 buah (meliputi 4 level application reverse engineering, 2 level network analysis and hacking, 2 level web hacking).#

Page 3: Ctf online idsecconf2012 walkthrough
Page 4: Ctf online idsecconf2012 walkthrough

Level 1 – Simple Reverse Engineering

Page 5: Ctf online idsecconf2012 walkthrough

Level 1 – Simple Reverse Engineering

Page 6: Ctf online idsecconf2012 walkthrough

Level 2 – Simple Reverse Engineering

Page 7: Ctf online idsecconf2012 walkthrough

Level 2 – Simple Reverse Engineering

Page 8: Ctf online idsecconf2012 walkthrough

Level 2 – Simple Reverse Engineering

Page 9: Ctf online idsecconf2012 walkthrough

Level 3 – Medium Reverse Engineering

Page 10: Ctf online idsecconf2012 walkthrough

Level 3 – Medium Reverse Engineering

Page 11: Ctf online idsecconf2012 walkthrough

Level 3 – Medium Reverse Engineering

Page 12: Ctf online idsecconf2012 walkthrough

Level 3 – Medium Reverse Engineering

Page 13: Ctf online idsecconf2012 walkthrough

Level 3 – Medium Reverse Engineering

Page 14: Ctf online idsecconf2012 walkthrough

Level 3 – Medium Reverse Engineering

Page 15: Ctf online idsecconf2012 walkthrough

Level 4 – Medium Reverse Engineering

Page 16: Ctf online idsecconf2012 walkthrough

Level 4 – Medium Reverse Engineering

Page 17: Ctf online idsecconf2012 walkthrough

Level 4 – Medium Reverse Engineering

Page 18: Ctf online idsecconf2012 walkthrough

Level 4 – Medium Reverse Engineering

Page 19: Ctf online idsecconf2012 walkthrough

Level 4 – Medium Reverse Engineering

Page 20: Ctf online idsecconf2012 walkthrough

Level 5 – Packet Network Analysis #1

Page 21: Ctf online idsecconf2012 walkthrough

Level 5 – Packet Network Analysis #1

Page 22: Ctf online idsecconf2012 walkthrough

Level 5 – Packet Network Analysis #1

Page 23: Ctf online idsecconf2012 walkthrough

Level 5 – Packet Network Analysis #1

Page 24: Ctf online idsecconf2012 walkthrough

Level 5 – Packet Network Analysis #1

Page 25: Ctf online idsecconf2012 walkthrough

Level 6 – Web Application Hacking #1

Page 26: Ctf online idsecconf2012 walkthrough

Level 6 – Web Application Hacking #1

Page 27: Ctf online idsecconf2012 walkthrough

Level 6 – Web Application Hacking #1

Page 28: Ctf online idsecconf2012 walkthrough

Level 7 – Packet Network Analysis #2

Page 29: Ctf online idsecconf2012 walkthrough

Level 7 – Packet Network Analysis #2

Page 30: Ctf online idsecconf2012 walkthrough

Level 7 – Packet Network Analysis #2

Page 31: Ctf online idsecconf2012 walkthrough

Level 8 – Web Application Hacking #2

Page 32: Ctf online idsecconf2012 walkthrough

Level 8 – Web Application Hacking #2

Page 33: Ctf online idsecconf2012 walkthrough

Level 8 – Web Application Hacking #2

Page 34: Ctf online idsecconf2012 walkthrough

Level 8 – Web Application Hacking #2

Page 35: Ctf online idsecconf2012 walkthrough

Level 8 – Web Application Hacking #2

Page 36: Ctf online idsecconf2012 walkthrough

Level 8 – Web Application Hacking #2

Page 37: Ctf online idsecconf2012 walkthrough