fail0verflow

when success just isn't an option
  • Blog
  • About

Recent Posts

  • PS4 Aux Hax 5: Flawed Instructions Get Optimized

  • PS4 Aux Hax 4: Belize via CEC

  • PS4 Aux Hax 3: Dualshock4

  • PS4 Aux Hax 2: Syscon

  • PS4 Aux Hax 1: Intro & Aeolia

  • ShofEL2, a Tegra X1 and Nintendo Switch exploit

  • Dumping a PS4 Kernel in "Only" 6 Days

  • The First PS4 Kernel Exploit: Adieu

  • Console Hacking 2016: Postscript

  • In Memoriam: Ben “bushing” Byer

  • Console Hacking 2015: Liner Notes

  • 31c3 CTF - pong (pwn30)

  • 31c3 CTF - safelock (signals20)

  • HubCap: pwning the ChromeCast pt. 2

  • HubCap: pwning the ChromeCast pt. 1

  • OpenVizsla OV3 - Hardware

  • RFID hacking preamble: a new peak detection for the proxmark3

  • RFID hacking preamble: designing an FPGA IIR filter for the proxmark3

  • Enhancing the AVIC-5000NEX - part 2

  • Enhancing the AVIC-5000NEX

  • plaidCTF 2014 - reeekeeeeee (web200)

  • plaidCTF 2014 - rsa (for450)

  • plaidCTF 2014 - wheeeee (crypto375)

  • plaidCTF 2014 - bbos (for350)

  • plaidCTF 2014 - graphs (crypto200)

In memory of Ben “bushing“ Byer

Length Extension

2014-04-23

plaidCTF 2014 - parlor (crypto250)

By aDR4eA
Filed under plaidCTF2014 Crypto length extension

For PlaidCTF2014, Eindbazen and fail0verflow joined forces as 0xffa, the Final Fail Alliance. Don't miss out on other write-ups at Eindbazen's site!
The Plague is running a betting service to build up funds for his massive
empire. Can you figure out a way to beat the house? The service is running
at 54.197.195.247:4321.

read more

© fail0verflow, all rights reserved. Not a member of the Cheezburger© Group.