TeamRocketIST

CTF Team

Lisbon, Portugal
  • Home
  • Archives
  • Categories
  • Tags
  • Competitions
  • About
© 2021 TEAMROCKETIST

Board

Behind each exploit there is a history of creativity and incredible knowledge.

Categories

  • Crypto11
  • Electronics1
  • Forensics9
  • Misc6
  • Network2
  • Pwn35
    • Sandbox2
      • Javascript1
      • Python1
    • x6425
      • Format String5
      • Glibc Malloc13
        • Fast Bin Dup1
        • House of Force2
        • House of Orange1
        • IO_FILE5
        • Off By One3
        • Tcache5
          • House of Spirit1
          • tcache_dup3
          • tcache_perthread_struct1
          • tcache_poisoning3
        • Unlink1
        • Unsorted Bin Attack1
      • Heap Overflow2
      • Integer Overflow1
      • Stack Issue9
        • Canary Leak2
        • Stack Overflow9
    • x866
      • Format String2
      • Stack Issue3
        • Stack Overflow3
  • Reverse25
  • Stego1
  • Web21

Tags

  • 34C3ctf20171
  • 35C32
  • 36c31
  • 3DS20174
  • InCTF20183
  • LTE1
  • Misc1
  • ROP1
  • RSA3
  • TAMUctf1
  • X-Forwarded-For1
  • aero20201
  • aes3
  • asis20171
  • asisfinals20191
  • assembly1
  • autopsy1
  • backdoorctf3
  • backdoorctf20191
  • base641
  • bgb1
  • binwalk2
  • blackbox1
  • blindSignatures1
  • blindSqli1
  • blindsqli2
  • bmp1
  • boot_sector1
  • bruteforce5
  • bsidesSF3
  • byte2byte1
  • bytebybyte2
  • c++1
  • ccc2019ctf1
  • cgi2
  • circuits1
  • comments1
  • compiled1
  • cookies1
  • cpa1
  • crypto7
  • cryptoApi1
  • csaw8
  • csaw20191
  • dicectf20211
  • dictionaryAttack1
  • differential1
  • directorylisting1
  • discrete log1
  • disk1
  • django1
  • double_free4
  • ecb2
  • electronics1
  • elf1
  • elgamal1
  • encryptCTF1
  • encryption1
  • exceptions1
  • exeResources1
  • fastbindup1
  • file_stream3
  • filterbypass2
  • fireshell20201
  • flask1
  • forensics10
  • format_string1
  • formatstring7
  • gameboy2
  • gdb1
  • ghidra1
  • go2
  • golang1
  • guessing1
  • hacktm20201
  • hash1
  • hashcat2
  • heap6
  • heap_overflow2
  • hex2bin1
  • hitcon20181
  • homomorphic1
  • house_of_spirit1
  • houseoforange1
  • hqli1
  • httpauth1
  • i3861
  • ida4
  • inctf20171
  • index1
  • intel_hex1
  • io_file5
  • io_file_struct5
  • jailescape1
  • java2
  • javascript1
  • jquery1
  • jtr1
  • jump_middle_instruction1
  • kasperskyCtf1
  • keyboard1
  • kidpod20191
  • kipod20191
  • laplace1
  • lcg1
  • led1
  • lfi4
  • logic1
  • login1
  • luks2
  • mailSpoofing1
  • malloc_usable_size1
  • malware3
  • masterkey1
  • mbr2
  • md52
  • memory1
  • misc3
  • mmap1
  • mongodb1
  • mooshak1
  • mouse1
  • multiplexer1
  • n1ctf20191
  • nasm1
  • network2
  • no$gmb2
  • noSql1
  • nodejs1
  • nullcon20202
  • obfuscation1
  • off_by_one2
  • offbyone1
  • orderby1
  • pallier1
  • partitions1
  • passwordreset1
  • pcap3
  • pctf20201
  • perl2
  • php1
  • png1
  • power_analysis1
  • powershell1
  • preload1
  • puzzle1
  • pwn14
  • pwn2win20191
  • pwn2winctf3
  • pwnthybytes20191
  • pyjail1
  • python6
  • python31
  • python_sandbox1
  • pythonserver2
  • qemu1
  • quic1
  • r2script1
  • radare24
  • radare2_script1
  • random1
  • randomness1
  • redpwnctf20172
  • regex2
  • ret2libc3
  • retToLibc1
  • reverse17
  • rop7
  • sandbox2
  • seccon20172
  • seccon20181
  • seccon20191
  • sessionkey1
  • sha2561
  • shellcode3
  • shellshock1
  • sql1
  • sqli4
  • sqlinjection1
  • squarectf2
  • ssti2
  • stack_overflow11
  • stackcanary2
  • stackoverflow1
  • statically_linked1
  • std::string1
  • stegano1
  • steganography1
  • stego3
  • swapaddresses1
  • tcache1
  • tcache_perthread_struct1
  • tcache_poisoning2
  • terminal_characters1
  • tokyoWesterns20171
  • tpctf20173
  • transistor1
  • tshark2
  • tuctf20171
  • tuctf20182
  • unlink1
  • unserialization1
  • usb2
  • use_after_free2
  • utctf20201
  • volatility1
  • volgactf20192
  • vpnssl1
  • wasm1
  • web18
  • whitespace_steganography1
  • windowsBinary1
  • wireshark3
  • xmlqueries1
  • xor7
  • xslt1
  • xss1
  • zip1
  • zip2john1
  • zsteg1

Tag Cloud

34C3ctf2017 35C3 36c3 3DS2017 InCTF2018 LTE Misc ROP RSA TAMUctf X-Forwarded-For aero2020 aes asis2017 asisfinals2019 assembly autopsy backdoorctf backdoorctf2019 base64 bgb binwalk blackbox blindSignatures blindSqli blindsqli bmp boot_sector bruteforce bsidesSF byte2byte bytebybyte c++ ccc2019ctf cgi circuits comments compiled cookies cpa crypto cryptoApi csaw csaw2019 dicectf2021 dictionaryAttack differential directorylisting discrete log disk django double_free ecb electronics elf elgamal encryptCTF encryption exceptions exeResources fastbindup file_stream filterbypass fireshell2020 flask forensics format_string formatstring gameboy gdb ghidra go golang guessing hacktm2020 hash hashcat heap heap_overflow hex2bin hitcon2018 homomorphic house_of_spirit houseoforange hqli httpauth i386 ida inctf2017 index intel_hex io_file io_file_struct jailescape java javascript jquery jtr jump_middle_instruction kasperskyCtf keyboard kidpod2019 kipod2019 laplace lcg led lfi logic login luks mailSpoofing malloc_usable_size malware masterkey mbr md5 memory misc mmap mongodb mooshak mouse multiplexer n1ctf2019 nasm network no$gmb noSql nodejs nullcon2020 obfuscation off_by_one offbyone orderby pallier partitions passwordreset pcap pctf2020 perl php png power_analysis powershell preload puzzle pwn pwn2win2019 pwn2winctf pwnthybytes2019 pyjail python python3 python_sandbox pythonserver qemu quic r2script radare2 radare2_script random randomness redpwnctf2017 regex ret2libc retToLibc reverse rop sandbox seccon2017 seccon2018 seccon2019 sessionkey sha256 shellcode shellshock sql sqli sqlinjection squarectf ssti stack_overflow stackcanary stackoverflow statically_linked std::string stegano steganography stego swapaddresses tcache tcache_perthread_struct tcache_poisoning terminal_characters tokyoWesterns2017 tpctf2017 transistor tshark tuctf2017 tuctf2018 unlink unserialization usb use_after_free utctf2020 volatility volgactf2019 vpnssl wasm web whitespace_steganography windowsBinary wireshark xmlqueries xor xslt xss zip zip2john zsteg

Archive

  • February 20211
  • April 20201
  • March 20204
  • February 20204
  • December 20193
  • November 20192
  • October 20193
  • September 20193
  • August 20193
  • July 20192
  • April 20193
  • March 20196
  • December 20182
  • November 20185
  • October 20185
  • December 201711
  • November 20171
  • October 201710
  • September 201723
  • August 20176
  • July 20173
  • September 20163
  • August 20167
  • July 20161

Recent Posts

  • Pwnx64

    [Pwn] DiceCTF2021 - flippidy

    2021-02-08

  • Misc

    [Misc] PCTF2020 - golf.so

    2020-04-20

  • Pwnx64

    [Pwn] FireShell CTF 2020 - FireHTTPD

    2020-03-23

  • Network

    [Network] UTCTF 2020 - QUICk Servers

    2020-03-11

  • Pwnx64

    [Pwn] UTCTF 2020 - Cancelled

    2020-03-10

Tag: jump_middle_instruction

Total 1 articles

  • All
  • crypto
  • xor
  • csaw
  • aes
  • ecb
  • laplace
  • differential
  • RSA
  • homomorphic
  • blindSignatures
  • volgactf2019
  • lcg
  • randomness
  • electronics
  • circuits
  • transistor
  • led
  • logic
  • multiplexer
  • forensics
  • bsidesSF
  • luks
  • hashcat
  • dictionaryAttack
  • png
  • masterkey
  • partitions
  • disk
  • autopsy
  • pcap
  • bmp
  • keyboard
  • mouse
  • wireshark
  • tshark
  • usb
  • steganography
  • whitespace_steganography
  • InCTF2018
  • terminal_characters
  • squarectf
  • web
  • noSql
  • mongodb
  • shellshock
  • perl
  • sql
  • mailSpoofing
  • misc
  • encryptCTF
  • zip
  • jtr
  • zip2john
  • binwalk
  • guessing
  • stego
  • zsteg
  • comments
  • puzzle
  • stackcanary
  • rop
  • stackoverflow
  • formatstring
  • stack_overflow
  • ROP
  • retToLibc
  • backdoorctf
  • pwn
  • shellcode
  • fireshell2020
  • ret2libc
  • index
  • pwn2winctf
  • python
  • sandbox
  • regex
  • redpwnctf2017
  • jump_middle_instruction
  • tuctf2018
  • tokyoWesterns2017
  • swapaddresses
  • reverse
  • cryptoApi
  • 35C3
  • windowsBinary
  • exeResources
  • malware
  • 3DS2017
  • ida
  • intel_hex
  • radare2
  • hex2bin
  • gdb
  • qemu
  • i386
  • mbr
  • boot_sector
  • compiled
  • bruteforce
  • sha256
  • kasperskyCtf
  • kipod2019
  • gameboy
  • no$gmb
  • bgb
  • r2script
  • bytebybyte
  • tuctf2017
  • tpctf2017
  • python3
  • stegano
  • LTE
  • Misc
  • flask
  • pythonserver
  • ssti
  • lfi
  • sessionkey
  • cookies
  • hash
  • md5
  • django
  • blackbox
  • ccc2019ctf
  • unserialization
  • php
  • sqli
  • blindsqli
  • cgi
  • vpnssl
  • pyjail
  • python_sandbox
  • hqli
  • xmlqueries
  • orderby
  • directorylisting
  • sqlinjection
  • httpauth
  • filterbypass
  • blindSqli
  • xss
  • passwordreset
  • jquery
  • java
  • X-Forwarded-For
  • login
  • elgamal
  • pallier
  • discrete log
  • cpa
  • power_analysis
  • network
  • utctf2020
  • quic
  • golang
  • asis2017
  • file_stream
  • io_file
  • io_file_struct
  • aero2020
  • double_free
  • backdoorctf2019
  • use_after_free
  • fastbindup
  • tcache_poisoning
  • heap
  • dicectf2021
  • heap_overflow
  • kidpod2019
  • unlink
  • offbyone
  • nullcon2020
  • pwn2win2019
  • off_by_one
  • pwnthybytes2019
  • jailescape
  • javascript
  • nodejs
  • c++
  • malloc_usable_size
  • std::string
  • seccon2018
  • tcache
  • house_of_spirit
  • csaw2019
  • tcache_perthread_struct
  • radare2_script
  • mmap
  • 34C3ctf2017
  • wasm
  • 36c3
  • base64
  • volatility
  • memory
  • ghidra
  • go
  • encryption
  • byte2byte
  • powershell
  • obfuscation
  • seccon2017
  • mooshak
  • TAMUctf
  • assembly
  • elf
  • pctf2020
  • nasm
  • preload
  • houseoforange
  • asisfinals2019
  • n1ctf2019
  • seccon2019
  • statically_linked
  • format_string
  • inctf2017
  • hacktm2020
  • random
  • xslt
  • exceptions
  • hitcon2018
2018-11-26

[Pwn] TUCTF 2018 - Shella Hard

rop pwn jump_middle_instruction tuctf2018