This repository documents my solutions and progress through the embedded security CTF exercises at microcorruption.com.
Microcorruption is a series of embedded security challenges focused on a variant of the MSP430 microcontroller. Each level presents a lock that must be bypassed by finding and exploiting vulnerabilities in the firmware.
Note: the solutions can differ from user-to-user, so the password I post does not necessarily solve the puzzle on your session. Rather you need to follow the same procedures to obtain the password.
├── writeups/ # Individual challenge writeups
├── tools/ # Useful tools and utilities
└── README.md # This file
| Challenge | Status |
|---|---|
| Tutorial | DONE |
| New Orleans | DONE |
| Sydney | DONE |
| Hanoi | DONE |
| Cusco | DONE |
| Reykjavik | DONE |
| Whitehorse | DONE |
| Montevideo | DONE |
| Johannesburg | DONE |
| Santa Cruz | DONE |
| Jakarta | DONE |
| Addis Ababa | DONE |
| Novosibirsk | DONE |
| Algiers | DONE |
| Vladivostok | TODO |
| Bangalore | TODO |
| Lagos | TODO |
| Chernobyl | TODO |
| Hollywood | TODO |
| Vancouver | TODO |
| Cold Lake | TODO |
| Churchill | TODO |
| Baku | TODO |
| St. John's | TODO |
| Halifax | TODO |
- Visit microcorruption.com
- Each writeup in this repo includes:
- Challenge analysis
- Vulnerability identification
- Exploit development
- Final payload
- Screenshots and code snippets