<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>pfs on Security Addict</title><link>https://blog.medarkus.net/tags/pfs/</link><description>Recent content in pfs on Security Addict</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>me@darkus.dev (DeMarcus Williams)</managingEditor><webMaster>me@darkus.dev (DeMarcus Williams)</webMaster><lastBuildDate>Thu, 09 Jul 2020 13:55:08 -0500</lastBuildDate><atom:link href="https://blog.medarkus.net/tags/pfs/index.xml" rel="self" type="application/rss+xml"/><item><title>Hackasat Goodplan Greatplan</title><link>https://blog.medarkus.net/posts/hackasat-goodplan-greatplan/</link><pubDate>Thu, 09 Jul 2020 13:55:08 -0500</pubDate><author>me@darkus.dev (DeMarcus Williams)</author><guid>https://blog.medarkus.net/posts/hackasat-goodplan-greatplan/</guid><description>Category: Space and Things
Description: Help the Launchdotcom team perform a mission on their satellite to take a picture of a specific location on the ground. No hacking here, just good old fashion mission planning!
Connect to the challenge on mission.satellitesabove.me:5023. Using netcat, you might run nc mission.satellitesabove.me 5023
Write-up by medarkus, nafod
This write-up is part of a larger post hosted over at our official blog.
On connection to the service, we&amp;rsquo;re presented with the following instructions:</description></item><item><title>Sarctf2020 Crossw0rd</title><link>https://blog.medarkus.net/posts/sarctf2020-crossw0rd/</link><pubDate>Mon, 11 May 2020 13:54:50 -0500</pubDate><author>me@darkus.dev (DeMarcus Williams)</author><guid>https://blog.medarkus.net/posts/sarctf2020-crossw0rd/</guid><description>This is one of the reversing problems that I solved during SarCTF a couple months back in February of 2020. I decided to write this up since I believe it to a good beginner problem for people looking to get into reverse engineering.
Problem Description While the children were playing toys, Sherlock was solving crosswords in large volumes.
Reversing the Binary Using file we can see we&amp;rsquo;re given an unstripped 64-bit ELF file: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, for GNU/Linux 3.</description></item></channel></rss>