Like the last challenge, there were 4 parts to the file. Found them with wireshark and the POST filter, just like last time.
Most Recent Articles
This is a writeup of the format string vulnerability in level 4 of the 64bitprimer VM from vulnhu
Installation of the software to make a yubikey 4 work in FIDO U2F mode on Debian Jessie i386
This one stumped me. Overall, it was a great competition for me as I got to learn a whole lot of new things. I had never worked on a Mac, other than as a user, had never used Hopper, lldb or any of the other tools for reversing on a Mac, and haven't got any experience in the Objective C/Swift framework.