Search found 6 matches

by haellowyyn
Sat May 16, 2015 3:03 pm
Forum: Challenges Solved
Topic: Anybody Out There?
Replies: 10
Views: 4025

For me, the whole there-is-an-image-hidden thing was pretty clear right from the beginning, as soon as I had discovered the imagecolorat() warning. Some of the printed values looked like they could be RGB parts (i.e., between 0 and 255), so extracting the image was my first guess. On the other hand,...
by haellowyyn
Fri May 15, 2015 11:36 pm
Forum: Challenges Solved
Topic: Broken Image
Replies: 15
Views: 2539

Actually, brute-force works quite well, since the changed byte is at the beginning of the file. I used Python and the Pillow library which is really great for anything image-related: import io from PIL import Image def fixit(): byts = open('BrokenImage.png', 'rb').read() for i in range(0, len(byts))...
by haellowyyn
Tue Mar 12, 2013 6:51 pm
Forum: Challenges Solved
Topic: Inscrutable
Replies: 14
Views: 1539

I had exactly the same idea as Roogley. Since all three challenges are on the same database server, you can simply retrieve the password from one of the former challenges. sqlmap makes that ridiculously easy.
by haellowyyn
Tue Mar 12, 2013 6:24 pm
Forum: Challenges Solved
Topic: Forced Entry
Replies: 17
Views: 3038

I used http://sqlmap.org/. It really is gold.
by haellowyyn
Mon Mar 11, 2013 6:25 pm
Forum: Challenges Solved
Topic: Type fastest
Replies: 14
Views: 2349

Using the jquery-injector extension for Chrome, you can just do

Code: Select all

$('input[name="answer"]').val($('b').text().replace(/FOO/g, '')); $('form').submit()
in the console.
by haellowyyn
Sun Mar 10, 2013 7:29 pm
Forum: Challenges Solved
Topic: Picture this program
Replies: 8
Views: 1730

Compiling and executing the code gives you '3.156'. Then, it's easy to guess ;)