About:
Infosec, travel, hiking, gaming, anime, and everything else in my life
Website:
Incoming Links:
Subscribe to RSS:
The author received an abuse complaint from their hosting provider regarding their server sending SSH connections to the wider internet. After investigation, it was discovered that the server was not actually sending any connectio...
The article is a wishlist for NixOS security in 2024, based on the author's conversations with NixOS contributors. It includes ideas for improving vulnerability tracking, backports, vendoring, faster security patch releases, and b...
The blog post discusses the recent drama between Dolphin, Valve, and Nintendo regarding the distribution of Nintendo's Wii decryption key by emulators. It explores the legality of bundling crypto keys and the copyright and DMCA la...
The text is a writeup of the Boston Key Party crackme300 'hypercube' challenge, which is a GameCube binary that computes a value using unoptimized code. The author disassembles the code, analyzes the loop, and optimizes the slow p...
The article explains the changes in audio processing in Dolphin since the release of Dolphin 3.5. It discusses the differences between synchronous and asynchronous audio emulation, and the issues caused by asynchronous audio proce...
The text is a writeup about the Nuit du Hack CTF 2013 Quals round. The author discusses an exercise called 'Meow' which involved bypassing authentication in a restricted Python shell. The author explains the challenges faced and t...
The text is a writeup of the GITS 2013 MysteryBox challenge, which involved disassembling and running input data for an unknown RISC-like CPU. The author details their process of interacting with the remote MysteryBox service, dis...
The text is a writeup of the GITS 2013 challenge RTFM (re100) which involves decompressing a file compressed by the rtfm binary. The author explains the details of the compression algorithm and how it outputs a bit stream with var...
The text is a writeup of the GITS 2013 challenge HackTheGibson (re250). It describes the 64-bit ELF for Linux using OpenSSL (libcrypto) and FFTW to analyze the spectrum of samples coming from /dev/dsp. The program uses MD5_Final t...
The text is about the author's work on enhancing and fixing audio processing in the Dolphin Emulator for Gamecube/Wii games. It explains the components involved in audio processing in a Gamecube, the challenges in emulating the DS...
The author describes their interest in reverse engineering and how they analyzed the virtual machine used in the game Tales of Symphonia 2. They discovered that other games also use the same virtual machine and started analyzing s...
The article discusses the Nuit du Hack 2012 Prequals contest and the process of remote exploiting services running in a custom VM. The authors describe the methods used to bypass security and execute shell commands on the remote s...
...
0delroth's homepage - My Stripe CTF writeup
2012-02-29 •
The text is a writeup of the Stripe CTF challenge, where the author shares their solutions to the security exercises. The author explains the exploits for each level of the challenge, detailing the methods used to bypass security ...
0delroth's homepage - Reading Wii discs with Python
2011-06-09 •
The text is about reading Wii discs with Python. It explains how to decrypt the disc clusters to access the raw partition data, parse the filesystem to access files and directories, and presents wiiodfs, a software to mount Wii di...
The text discusses the process of reverse engineering a Wii game script interpreter for the game 'Tales of Symphonia: Dawn of the New World'. The author describes the process of analyzing the game's files, including the bytecode f...
The text is a writeup of the DEFCON 19 CTF Binary L33tness 300 (b300) challenge. It describes the process of solving the challenge, which involved decompiling bytecode, finding encryption methods, and decrypting images. The key fo...
The text is a writeup about the DEFCON 19 CTF Grab Bag 100 problem, which was a simple problem that took a lot of time to solve. The problem involved connecting to a server, which initially closed any incoming connections on the s...
Eri HaKawai is a new exploit for PAL Wiis, released in source format under the GPLv2. It works by using a bug in the savegame loading code of Tales of Symphonia: Dawn of the New World. The post provides instructions on how to use ...
The author received a Nintendo Wii as a gift and became interested in understanding how the console works and running their own code on it. They discuss the process of jailbreaking the Wii, the vulnerabilities in the games, and th...