gynvael GynvaelEN - Mission 023 - Solution Prefere videos? You can also watch it - if not, continue reading. Mission status: http://gynvael.vexillium.org/ext/43bf753f/mission023.txt We are given the package that consists of
gynvael Gynvael - Mission 22 - Solution This was a hard one. Information about this mission can be found in stream #64 and the mission itself is here. It's in Polish but the most relevant information here
gynvael GynvaelEN - Mission 022 - Solution Blokchain. *Coin. Hot topis for today. The 22nd mission is about blokchain and about coins. SpyCoins. The mission can be found on Stream #49. The SpyCoin center is here: http:
gynvael Gynvael - Mission 021 - Solution The source for this mission can be found in stream 63. It is in Polish but it can be easily spotted that the main source is a PCAP file that
gynvael Finding "Praktyczna Inżyniera Wsteczna" last hidden flag. If you read this blog you can see that from time to time I participate in missions published by Gynvael Coldwind on his English and Polish streams. You might not
solution Assembly job offer... "Follow the white rabbit" solution In a cold Novemeber night I was standing at a bus stop and saw and advertisement on the streets of Wrocław. What was odd about it it was written purely
gynvael Gynvael - Mission 015 - Solution Last time, there was no mission on EN stream, so I've decided to describe the one from PL stream sice it was also quite a nice one. The mission is
gynvael GynvaelEN - Mission 19 - Solution Gynvael is back with streams and with missions. The 39th stream contains mission no 19 that can be found here. In this mission we are given a CHIP-8 ROM image.
ECMS ECSM 2017 CTF I really liked the last year ECSM 2016 CTF created by CERT & p4 team and I was a bit down learning that this year it was scheduled on the
p4 SecurityPWNing 2017 - p4 CTF On 6th & 7th November 2017 there was a 2nd edition of Security Pwning conference held in Warsaw and, like the last time (link1, link2), there was a CTF organized
gynvael GynvaelEN - Mission 018 - Solution This is an another GynvaelEN mission solution. This time, the task is simple. We're given a script and we nned to find the correct password to get the flag. The
gynvael Gynvael - Mission 012 - Solution This mission was on the Polish stream, but it's a nice one so I've decided to describe it anyway. If you don't understand the language let me quickly bring you
ctf How do I approach this ctf debugging program - step by step Another good question from RE on Stack Exchange. I've already posted an answer there, but here let's put a bit more explanation and answer the question in the title. So
gynvael GynvaelEN - Mission 17 - Solution Another stream from Gynvael - another mission. This time we need to extract a message from a restriced admin panel. What we see on the page is a welcome message,
gynvael GynvaelEN - Mission 16 - solution Another week another mission on English side of the youtube channel. This time we are given an info that the transmission was intercepted. You can read more info here. After
gynvael GynvaelEN - Mission 15 - Solution Another Wednesday, another mission. This time we've got a vulnerability that allows leaking any via as a image - link :) So we download the attached image and got this: The
gynvael Gynvael - Mission 010 - Solution This mission is actually published on the Polish stream but I've decided to write the solution here, in English. So what's this mission is about? We are given the PDF
mission GynvaelEN - Mission 13 - Solution “Never stop dreaming, never stop believing, never give up, never stop trying, and never stop learning.” ― Roy T. Bennett, The Light in the Heart Boy, that was a hard one
gynvael GynvaelEN - Mission 12 - Solution In this mission we are given the data from the hardware logger. On the first look we see some printable characters but nothing obvious. To solve this we need to
gynvael GynvaelEN - Mission 11 - Solution If you don't know Gynvael - check his channel where he shows some RE/hacking stuff. After each video he posts some small challenge for solving by viewers. In this