Skip to content

Commit 512f8c6

Browse files
committed
correct typos
Signed-off-by: innocentzero <md-isfarul-haque@proton.me>
1 parent 15e4602 commit 512f8c6

File tree

12 files changed

+16
-13
lines changed

12 files changed

+16
-13
lines changed

content/_typos.toml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
[default.extend-words]
2+
# Don't correct the surname "Teh"
3+
IIT = "IIT"

content/resources/2024-09-02-bandit_writeup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ To decode base64, we use it with `-d` flag
5050
We can write a code to decode ROT13 or we can just go to a website(rot13.com) to solve it for us.
5151

5252
## Bandit 12
53-
Creating another directory called `this` in `tmp`, copyting `data.txt` to `new.txt`, then reversing `xxd` by using flag `-r`. We get files that are compressed multiple times. Decompressing them gives our password.
53+
Creating another directory called `this` in `tmp`, copying `data.txt` to `new.txt`, then reversing `xxd` by using flag `-r`. We get files that are compressed multiple times. Decompressing them gives our password.
5454
- `cd /tmp/`
5555
- `mkdir this`
5656
- `touch my_file`

content/writeups/Guild_Selection_CTF/Befunge.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ This challenge gives us this cryptic text, and nothing else
99

1010
Vielaedhc tdtycsus us one xrto. Cra kiryyc ntje prie rv td uzet rd onus uv cra tooedzez one hcmeisehaiuoc hyam's hickor sessurd wZ.btom.ud/qebuktzuyab. U'p faso ctkkudx neie t muo prie sr onto one orry lauklauk gribs etsuyc. Kirks or cra uv cra sryjez onus.
1111

12-
The first thought the comes to mind when I see plaintext encryption is simple `rot` like ceaser cipher. So, I tired rotating the letters for all possible combinations and nothing made sense.
12+
The first thought the comes to mind when I see plaintext encryption is simple `rot` like caeser cipher. So, I tired rotating the letters for all possible combinations and nothing made sense.
1313

1414
The next way to attack this is using frequency analysis. Note that frequency analysis in general, always works. If the plain text has been encoded using a single key and a letter `x` always maps to a letter `y`, then frequency analysis is the way to go.
1515

@@ -18,7 +18,7 @@ So, head over to
1818

1919
https://www.101computing.net/frequency-analysis/
2020

21-
and start guessing and checking. You just want the text to resemble plaintext english, so, make use of all the grammer that you know! (Note that frequency analysis actually means something different, its based off of the idea that some letter are more frequent than other letters and therefore in cases when a text is encrypted while preserving the frequencies, we can determine the original letters using just that).
21+
and start guessing and checking. You just want the text to resemble plaintext english, so, make use of all the grammar that you know! (Note that frequency analysis actually means something different, its based off of the idea that some letter are more frequent than other letters and therefore in cases when a text is encrypted while preserving the frequencies, we can determine the original letters using just that).
2222

2323
I like to do it this way, cause it seems more fun, but you might want to write a program for this (if the text is too big, then sure a python script is necessary).
2424

content/writeups/Guild_Selection_CTF/HuffmanEncoding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Now in the decompiled code, we can see the frequency table, (look carefully!) an
5858
mp['f'] = '2';
5959
mp['m'] = '1';
6060

61-
This means the flag contains these symbols with these frequencies. Thus, we can get a general flag as `5RnK4CTTII0uFM{_}Hffm` and why this is useful, is simply because huffman encoding gives the same encoding for "x" any other permuatation of "x".
61+
This means the flag contains these symbols with these frequencies. Thus, we can get a general flag as `5RnK4CTTII0uFM{_}Hffm` and why this is useful, is simply because huffman encoding gives the same encoding for "x" any other permutation of "x".
6262

6363
Thus, if we encode this flag, we'll get a different binary but it will have the same number of bits. But firstly, we'll have to find the binary form of the fake flag. This is because
6464

content/writeups/Guild_Selection_CTF/Protogame.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ If we calculate, we'll never be able to kill protoboss in 51 rounds, without dyi
4545
}
4646
}
4747

48-
What this is saying is, if the P1.ID != 2 (which will be true as it'll definetly be 1) then we move Proto1, just as we normally would. And if P2.ID is not 2 (which won't be trust as it'll be 2), then we move P2.
48+
What this is saying is, if the P1.ID != 2 (which will be true as it'll definitely be 1) then we move Proto1, just as we normally would. And if P2.ID is not 2 (which won't be trust as it'll be 2), then we move P2.
4949

5050
The cool thing is, when P2.ID is 2, then we move P1 and when P1.ID is 2 we move P2. ID will be 2 for proto2, which heals everyone. Now, the boss damage increases and keeps increasing... when we reach round 30, the boss damage is more than INT32_MAX!
5151

content/writeups/Guild_Selection_CTF/SomethingIsAskew.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,6 @@ Thus to properly escape the query and comment it out, you'll need to take care o
1717
username: admin') or '1'='1'--
1818
password: <any random stuff>
1919

20-
Note that we've used single quotation marks, this is because a double quotation was being interepreted differently by the server (try and check it out!)
20+
Note that we've used single quotation marks, this is because a double quotation was being interpreted differently by the server (try and check it out!)
2121

2222
`flag: iitmCTF{PpP0Oo5tgr85Ql}`

content/writeups/Guild_Selection_CTF/ocaptainmycaptain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Now that it gives us an image, lets open that.
1818

1919
open 5d/9d/9d/lol.png
2020

21-
This is definetly `hydra`! Now, if you know about password cracking then you'd know that **hydra** is a pretty popular tool in that field. However, in this case, its not meant for that. This is another grep search! (again, you might be tempted to "crack" png file using hydra somehow, but you'll soon learn its not worth it).
21+
This is definitely `hydra`! Now, if you know about password cracking then you'd know that **hydra** is a pretty popular tool in that field. However, in this case, its not meant for that. This is another grep search! (again, you might be tempted to "crack" png file using hydra somehow, but you'll soon learn its not worth it).
2222

2323
grep -ir hydra .
2424

content/writeups/Guild_Selection_CTF/shell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ As with all pwn challenges, we run checksec on the binary
2121
```
2222

2323
NX bit is disabled !, we can execute code on the stack!,
24-
let us try dissassembling the binary using GHIDRA
24+
let us try disassembling the binary using GHIDRA
2525
```c
2626

2727
undefined8 main(void)

content/writeups/Guild_Selection_CTF/whatTheCanary.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ What this means is, if we enter 56 bytes, then the next 8 bytes will overwrite t
3636
context.log_level = "critical"
3737
payload = flat([
3838
b"A"*56,
39-
p32(0xdeadbeef) # simply enter the exact address, it will handle the endianess in its default values
39+
p32(0xdeadbeef) # simply enter the exact address, it will handle the endianness in its default values
4040
])
4141
p = remote('10.21.232.38', 7001)
4242
p.sendline(payload)

content/writeups/Guild_Selection_CTF/writeup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ date = 2024-09-11
2323
## Misc
2424

2525
- [Befunge](@/writeups/Guild_Selection_CTF/Befunge.md)
26-
- [Oh Captain My Captian](@/writeups/Guild_Selection_CTF/ocaptainmycaptain.md)
26+
- [Oh Captain My Captain](@/writeups/Guild_Selection_CTF/ocaptainmycaptain.md)
2727
- [Protogame](@/writeups/Guild_Selection_CTF/Protogame.md)
2828

2929
## Forensics

0 commit comments

Comments
 (0)