diff --git a/_layouts/allposts.html b/_layouts/allposts.html index 0bd6e24..bc0c4d4 100644 --- a/_layouts/allposts.html +++ b/_layouts/allposts.html @@ -1,4 +1,4 @@ - + +

    {{ post.description }}

+
+ + {% endif %} {% endfor %} diff --git a/_posts/2019-06-23-googlectf.md b/_posts/2019-06-23-googlectf.md new file mode 100644 index 0000000..7f03eb9 --- /dev/null +++ b/_posts/2019-06-23-googlectf.md @@ -0,0 +1,18 @@ +--- +layout: post +title: "I gave Google's CTF a short try and learned a thing or two" +description: "But exams got in the way and took all the fun" +date: 2019-06-23 22:04:00 +categories: ctf +--- + +Honestly, I completely forgot that this was the weekend of Google's online [CTF Qualifications](https://g.co/ctf) for 2019 and was late, unprepared, busy, and did not have a team to work with. + +## What is this event? +Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun. + +## What I learned +Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, `strings`. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. [Ghidra](https://www.nsa.gov/resources/everyone/ghidra/), an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF. + +## Will I do this again? +Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time. \ No newline at end of file diff --git a/_site/all_posts.html b/_site/all_posts.html index ed4abc2..c327ee2 100644 --- a/_site/all_posts.html +++ b/_site/all_posts.html @@ -1,4 +1,4 @@ - + +

    But exams got in the way and took all the fun

+
+ + + + +
+

What I have learned from 2 years of FRC programming

+
+ + +

    Robots are pretty cool

+
+ + - -
-

Blogs I Read

-
- -

2019-06-18 09:18:00 -0400

-

This is a copy-pastable list of rss feeds I subscribe to:

+ +
+

Blogs I Read

+
+ + +

    The constantly updating list

+
+ + - -
-

I made a new song!

-
- -

2019-06-17 06:20:00 -0400

-

I am currently taking a class in school called Music and computers (AMM2M), where as part of the class, whe get together into bands, and produce a song. After taking a break from music production for over a year, we have released our song for the class (we do two songs, but the second is not finished yet).

+ +
+

I made a new song!

+
+ + +

    Releasing a new song with friends at school

+
+ + - -
-

Graphing the relation between wheels and awards for FRC

-
- -

2019-06-16 11:51:00 -0400

-

I was scrolling through reddit the other day, and came across this great post by u/MasterQuacks.

+ +
+

Graphing the relation between wheels and awards for FRC

+
+ + +

    AKA. Why programmer + reddit + matplotlib is a bad idea.

+
+ + - -
-

GitHub's CSS is boring. So I refreshed the design

-
- -

2019-06-12 09:09:00 -0400

-

I have been using GitHub since 2017, and have been getting tired of GitHub’s theme. I didn’t need a huge change, just a small refresh. So, to solve this, I whipped out Stylus and made a nice little CSS file for it.

+ +
+

GitHub's CSS is boring. So I refreshed the design

+
+ + +

    

+
+ + - -
-

Building a safe and easy system for sending computer vision data from a raspberry pi to a roborio

-
- -

2019-05-27 05:22:00 -0400

-

Computer vision on an FRC robot has some problems.

+ +
+

Building a safe and easy system for sending computer vision data from a raspberry pi to a roborio

+
+ + +

    

+
+ + - -
-

The language hunt

-
- -

2019-04-30 14:32:00 -0400

-

Our programming team is looking to switch languages in the 2020 season. Here is the what, why, and how.

+ +
+

The language hunt

+
+ + +

    

+
+ + - -
-

Using a python script to create devRant posts based on the style and content of another user

-
- -

2018-06-27 14:32:00 -0400

-

Ok… The title is slightly wrong. There are actually 2 scripts.. Sorry about that.

+ +
+

Using a python script to create devRant posts based on the style and content of another user

+
+ + +

    

+
+ + diff --git a/_site/ctf/2019/06/23/googlectf.html b/_site/ctf/2019/06/23/googlectf.html new file mode 100644 index 0000000..7f5bd18 --- /dev/null +++ b/_site/ctf/2019/06/23/googlectf.html @@ -0,0 +1,147 @@ + + + + + + Evan Pratten + + + + + + + + + + + +
+ + + + + + + + + +
+ + +
+
+
+

I gave Google's CTF a short try and learned a thing or two

+
+ +

Honestly, I completely forgot that this was the weekend of Google’s online CTF Qualifications for 2019 and was late, unprepared, busy, and did not have a team to work with.

+ +

What is this event?

+

Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.

+ +

What I learned

+

Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, strings. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. Ghidra, an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.

+ +

Will I do this again?

+

Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.

+

+
+
+ +
+ + + + +
+ + + + + + + + + + + + + + + + + \ No newline at end of file diff --git a/_site/feed.xml b/_site/feed.xml index e591c42..36fbcf5 100644 --- a/_site/feed.xml +++ b/_site/feed.xml @@ -1,4 +1,13 @@ -Jekyll2019-06-21T16:12:12-04:00http://localhost:4000/feed.xmlEvan PrattenComputer wizard, student, <a href="https://github.com/frc5024">@frc5024</a> programming team lead, and radio enthusiast.What I have learned from 2 years of FRC programming2019-06-21T11:14:00-04:002019-06-21T11:14:00-04:00http://localhost:4000/frc/2019/06/21/Robot-Experiences<p>Over the past two years (2018 / 2019), I have been a member of my school’s <a href="https://www.firstinspires.org/robotics/frc">FRC</a> team, <a href="frc5024.github.io">Raider Robotics</a>. Specifically, a programmer.</p> +Jekyll2019-06-24T12:06:10-04:00http://localhost:4000/feed.xmlEvan PrattenComputer wizard, student, <a href="https://github.com/frc5024">@frc5024</a> programming team lead, and radio enthusiast.I gave Google’s CTF a short try and learned a thing or two2019-06-23T18:04:00-04:002019-06-23T18:04:00-04:00http://localhost:4000/ctf/2019/06/23/googlectf<p>Honestly, I completely forgot that this was the weekend of Google’s online <a href="https://g.co/ctf">CTF Qualifications</a> for 2019 and was late, unprepared, busy, and did not have a team to work with.</p> + +<h2 id="what-is-this-event">What is this event?</h2> +<p>Google hosts a (yearly?) event where hackers from around the world team up and attempt a variety of tasks like: exploiting machines over a network, reversing firmware, pulling passwords from tcp packets, hacking crypto stuff (something I suck at), breaking compilers. and much more. Generally, this event and others like it are really fun.</p> + +<h2 id="what-i-learned">What I learned</h2> +<p>Many questions I worked on involved extracting a key from a binary. I employed two vastly different tools for this job. First, a standard linux tool, <code class="highlighter-rouge">strings</code>. When passed a filename, it will extract and print all human-readable strings it can find to the terminal. The flag is usually in this dump. If not, I use the second tool. <a href="https://www.nsa.gov/resources/everyone/ghidra/">Ghidra</a>, an open-source reverse engineering tool designed by the NSA. I used this tool a fair amount during my quick attempt at GCTF.</p> + +<h2 id="will-i-do-this-again">Will I do this again?</h2> +<p>Yes! The CTF was very fun to try, and I will definitely give it a proper shot next time.</p>Honestly, I completely forgot that this was the weekend of Google’s online CTF Qualifications for 2019 and was late, unprepared, busy, and did not have a team to work with.What I have learned from 2 years of FRC programming2019-06-21T11:14:00-04:002019-06-21T11:14:00-04:00http://localhost:4000/frc/2019/06/21/Robot-Experiences<p>Over the past two years (2018 / 2019), I have been a member of my school’s <a href="https://www.firstinspires.org/robotics/frc">FRC</a> team, <a href="frc5024.github.io">Raider Robotics</a>. Specifically, a programmer.</p> <h2 id="my-roles">My roles</h2> <p>In my first year, I joined the team as a programmer and had a fun time learning about embedded programming and development with hardware. Then, in my second year, I was promoted to programming co-lead along with <a href="https://github.com/slownie">@slownie</a>. I much preferred my second season because I had a better understanding of the technology I was working with, and we got to play with some cool tools throughout the season.</p> diff --git a/_site/index.html b/_site/index.html index bae85f0..9414a50 100644 --- a/_site/index.html +++ b/_site/index.html @@ -120,6 +120,18 @@
+ + + +