p r o c l e a p

explore & exploit

Latest Post

Aug 7, 2019

0ops Website Flag

When searching for new CTFs I come upon a small challenge hosted by the 0ops team from Shanghai Jiao Tong University. In this writeup I show all the steps I took to solve it. The Challenge The challenge is hosted in the team’s website where I was immediately dropped into a nice looking emulated linux shell. By typing help on the command prompt I was then gracefully saluted by a dead cow — a funny joke with the 0xdeadbeef number :-) The cow told me that there were more commands to be found besides the standard cd, ls and cat that one expects to find in any Linux box. Read more

About

Hi, I’m Eduardo. In this page I share some insights and technical stuff about Cybersecurity and Reverse Engineering, two subjects dearer to my heart. You can either find me on Twitter or pushing code to Github. In case I’m hiding or laying low you better drop me an old fashionable email.

Eduardo

procleap@gmail.com