Skip to content

cvestone/CtfCollections

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Ā 

History

22 Commits
Ā 
Ā 
Ā 
Ā 
Ā 
Ā 

Repository files navigation

Introduce

This repository is for collecting the ctf events which our team had joined including official writeups and attachments.And this README's contents are mainly about these challenges' descriptions.OK,let's go!

ctftime

231209_pingctf

web

calc

499 author: essor. Flag format: ping{.*}

Calculators are cool, right? I have made a simple one for you. It's not perfect, but it works. I hope you will like it! Some people say that it's not secure, but I don't know what they mean. I have tested it on my Windows 10 and it works like a charm!

https://calc.knping.pl


double-secret

500 author: essor. Flag format: ping{.*}

Doubly secure double secret double signature file signing application! There is so much secrets you probably will need help from your crypto pals. Please solve challenge locally before trying it on remote.

!!! Please solve challenge locally before trying it on remote !!!

Note: Set this challenge locally and log in with credentials admin:admin on localhost:3000.

https://instancer.knping.pl


internet-explorer

50

author: mobaradev

Flag format: ping{.*}

Can you run Internet Explorer on Linux?

https://internet-explorer.knping.pl


i-see-no-vulnerability

author: tomek7667

With AI we are entering a new era! Join us in this exciting journey with our visionary app!

When solving this challenge a new one will be unlocked which is a sequel to this one.

https://i-see-no-vulnerability.knping.pl/


kubica-shop

491 author: tomek7667

Flag format: ping{.*}

Did you know that Robert J. Kubica has birthday on 7.12?

https://kubica-shop.knping.pl


path-traversal-101

50 author: tomek7667

Flag format: ping{.*}

Can you pass the path traversal exam? šŸ‘€ There might be some requirements tho for your specie...

https://path-traversal-101.knping.pl


pocket-app

499 author: tomek7667

Flag format: ping{.*}

I hate backend so much as it's very hard to write it securely. Fortunately nowadays there are plenty of ready to use and secure out of the box solutions.

https://pocket-app.knping.pl


sanity-check

50 author: tomek7667

Flag format: ping{.*}

Welcome the the 3rd edition of pingCTF! Make sure to read the rules and then grab the first flag! discord link


youtube-trailer

50 author: mobaradev & P1T4G0R45

Flag format: ping{.*}

Watch the PING CTF 2023 official trailer and find the flag!


misc

ping-arcade

500 author: mobaradev

Flag format: ping{.*}

Beat the rigged arcade game and get the flag.


inside-bear

50 author: Dawid Łuszcz

Flag format: ping{.*}

This is the hardest reversing challenge I've ever met!!! Can you please help me? It even has source code attached to it.

31201020812a2cc96988054c9661143d.zip


internet-cat

289 author: tomek7667 Flag format: ping{.*}

I heard that there are is no official nc for windows and I love this OS! Fortunately, my black hat hacker colleague has sent me his forged copy that he intercepted from other hackers which have intercepted it from others and that from others... I don't know how many times it was intercepted but it works! I have tested it on my Windows 10 and it works like a charm!


quiz

500 author: essor

Flag format: ping{.*}

Our university created a new quiz system. It's very secure, so we can't cheat on it. We can't even see the possible answers and the questions don't make sense to me anymore. I suspect that our professor is choosing the answers randomly... Can you help me?

nc quiz.knping.pl 20003

wow

418 author: tomek7667

Flag format: ping{.*}

This game is AWESOME! But I can't win with the opponent.. He simply has too much money. I suspect he cheated in the past.. Can you help me beat him?

nc wow.knping.pl 20001

you-spin-me-round

448 author: tomek7667

Flag format: ping{.*}

That's a quite musical robot! Can you convince it that you are a robot too?

nc you-spin-me-round.knping.pl 20000

crypto

ancient-genius

50 author: P1T4G0R45

Flag format: ping{.*}

In the late 13th century, the renowned mathematician name missing lay on his deathbed. Before his passing, he decided to leave a cryptic message on his grave, an enigmatic sequence of numbers. These numbers appeared to be unrelated, lacking the characteristic pattern.

As time went by, mathematicians and scholars puzzled over these seemingly random numbers, attempting to decipher their meaning. It became a mathematical mystery, a challenge to uncover the hidden message left by the brilliant mind of a mysterious person. Despite numerous attempts, the code remained unbroken.

To this day, the numbers on the grave of this mysterious person continue to perplex and intrigue those who come across them, a testament to the enduring legacy of a mathematical genius who left a final puzzle for the world to unravel.

The photograph of the grave:

grave.png


easy-rsa

495 author: essor.

Flag format: ping{.*}

Breaking RSA is easy - right? Just factorize the N

bb7c2689669cf08f9c315c708ec721ae.zip


hard-work

147 author: P1T4G0R45

Flag format: ping{.*}

You've received a cryptic message from your boss at the company. Apparently, your aggressive demeanor has raised concerns, and your paycheck is on hold until you decipher the hidden magic message.

9cddbd472fe3ad694468f3799cb80e08.zip


lame-lame-loser

50 author: P1T4G0R45

In this challenge, your school teacher dismissed your abilities by calling you a lame loser. Now, you have the chance to prove her wrong by showcasing your skills in solving equations of the form ax + by = 0. You already know x,y! If you get a,b you can decrypt ct.


old-friend-from-the-past

418 author: P1T4G0R45

Flag format: ping{.*}

You've stumbled upon an encrypted message from the past, a mysterious code left behind by a figure from history. Your mission is to unravel the secrets hidden within. The code seems to be a form of ancient encryption, rumored to have been used by historical figures to secure their confidential messages.

Attached to this challenge is an enigmatic image that may provide you with clues to crack the code. Delve into the realm of cryptic communication and use your skills to reveal the hidden message. The encryption method involves the manipulation of alphabetic characters, a technique that has intrigued cryptographers throughout history.

Take a closer look at the accompanying image; it might hold the key to unlocking the encrypted text. Your goal is to decipher the hidden message and discover the wisdom or intrigue concealed within this historical enigma.

Note: The image does not contain anything necessary for the solution.


private-conversation

50 author: P1T4G0R45

Flag format: ping{.*}

Welcome to the "private-conversation" challenge, where you find yourself in the role of a cryptanalyst facing an intriguing encrypted message.

Scenario

In the midst of your cryptographic investigations, you stumble upon a fragment of a conversation that appears to be encoded in a highly unusual and complex manner. The content of this conversation could potentially hold significant information or secrets.

Your challenge is to decrypt the message and reveal its content. The fate of uncovering valuable information lies in your decryption skills. Can you decipher the message and unveil the hidden message within?


scherbius-machine

406 author: P1T4G0R45 Flag format: ping{.*}

Our team intercepted an machine from the enemy, but it suffered damage during transport, causing rotor and plugboard disarray. Your mission is to reconstruct the machine configuration, determine the missing plugboard connection, and decrypt the given ciphertext. Key components:

Rotors: BDFHJLCPRTXVZNYEIWGAKMUSQO, AJDKSIRUXBLHWTMCQGZNPYFVOE, EKMFLGDQVZNTOWYHXUSPAIBRCJ Reflector: EJMZALYXVBWFCRQUONTSPIKHGD Partial plugboard image provided. Ciphertext: dvgs{atrpwb_pxr_mwqlqrxsqggc_crsrv_xiwdtyu_fdp}


shrek

500 author: essor.

Flag format: ping{.*}

Somebody once told me... But I don't get it.

nc shrek.knping.pl 50000

reverse

excellent

500 author: essor.

Flag format: ping{.*}

Can you prove your excel skills? Copy the document and find valid flag!

Checkout my sheet here


gta-6

500 author: lexu

Flag format: ping{.*}

Bajtek, the coding daredevil, stumbled upon semi-legal access to GTA VI's source code. Excitedly attempting to reverse engineer it, he found a digital labyrinth of inefficiency.The loading screen moved at a pace slower than Internet Explorer on a dial-up connection. Help Bajtek get past the loading screen and finaly get to the actual game.


hangover

456 author: lexu

Flag format: ping{.*}

Meet Bajtek, the coding virtuoso at Gdańsk University of Technology. After a wild night of celebrating a successful compile, fueled by too much caffene (and probably something stronger) Bajtek awoke with a colossal hangover. The room echoed with the triumphant cheers of his algorithms from the night before, but there was one tiny hiccupā€”he couldn't remember his password.

As Bajtek squinted at the screen, even the gentle hum of his computer seemed as loud as a rock concert. With a head pounding like a runaway while loop, he asked you for help.


imag-ine-an-elf

482 author: tomek7667

Flag format: ping{.*}

This is no ordinary reversing challenge! As the Christmas season is coming, we thought that a real elf would be a great addition to our team. Unfortunately, the image of the elf got completely smashed and we can't see anything. Can you help us recover the elf? Please DON'T confuse a leprechaun with an elf!


noodle-nightmare

50 author: lexu

Flag format: ping{.*}

In the last programming session, Bajtek unleashed a coding catastrophe ā€“ his spaghetti code was so messy that even the compiler threw up its hands in surrender. Colleagues attempted to debug it, but the code was like a Rubik's Cube on a caffeine overdose. Bajtek proudly declared it an avant-garde programming masterpiece, leaving his coworkers wondering if they should call a programmer's version of an exorcist. In the end, they renamed his file "spaghetti.cpp" to "noodleNightmare.cpp" as a memorial to the chaotic session.


python-rev-for-freaks

500 author: toripizi#0611

Flag format: ping{.*}

My crazy colleague just send me this file and told me to run it with python but i'm scared of running it as he is literally CRAZY. Can you help me figure out what this script does?


ziggarettes

50 author: tomek7667

Flag format: ping{.*}

Don't smoke zigarettes, kids!


pwn

dangle-me

500 author: brzeks

Flag format: ping{.*}

Are you ready to ascend and receive wisdom? If you're worthy enough, the Goddess may even spill some indisputable truths about her world...

nc dangle-me.knping.pl 30000

post-office

500 author: brzeks

Flag format: ping{.*}

Polish Post is trying out a brand new parcel shipping service tailored specifically for CLI enthusiasts. We're almost sure it was made by the lowest bidder though!

nc post-office.knping.pl 30002

without-love-it-cannot-be-seen

499 author: brzeks

Flag format: ping{.*}

Mother, you scooped out my eyes with a spoon so I wouldn't see the filth.

nc without-love-it-cannot-be-seen.knping.pl 30001

231216_wgmyctf

web

myCloud

"Made a myCloud drive website for upload and download files with ChatGPT! Feel free to try it"


Pet Store Viewer

Explore our online pet store for adorable companions ā€“ from playful kittens to charming chickens. Find your perfect pet today. Buy now and bring home a new friend!

Connect here: 13.215.209.185:8222


Report Google

What's wrong with Google?!


misc

Dialect

Languages have dialect, but do you know programming Languages have dialect too?


Sayur

Sayur Kemudian Lebih Latih


Splice

Someone corrupted my QR code! Fortunately I got backup. Someone corrupted my backup!


Warmup - Game

It's cold, we need to warmup


forensic

Can't Snoop

Sending files the safe way


Compromised

Where aRe you?


SeeYou

"Our analysts have discovered that a file has been compromised and transferred to another internal computer. Could you assist us in investigating this incident?"


ppc

None description,all in attachments.

crypto

Hohoho 2

"Santa is coming to town! Send wishes to santa by connect to the netcat service"

Connect here: 13.215.209.185:2000


Hohoho 2 Continue

Someone exploited the service! Disabled the registration for the service

Connect here 13.215.209.1852001


N-less RSA

Endless RSA?


reverse

Defeat the boss

Defeat the boss and you get the flag, probably, maybe, I think, hmmm

Download here: https://www.dropbox.com/scl/fi/cvycpygrq759vqd5lfgsb/Game_boxed-1.exe?rlkey=pmel11rq3xp8m8swaeqelfhgt

Mirror: https://drive.google.com/file/d/1kmAUlT2Mf8myr8XsJYF3liSOfDVgM1e7/view?usp=sharing

If the application stuck on white screen when start, kill it and restart it.

Check SHA1 hash before start: 760e2ac6243bd8e78747f8fdf8bf329ee5da5b47


RmRf

"What happened to my system? It has been working perfectly for more than 20 years."

pass: wgmy


pwn

freejuice

Free food always tastes good. Free drinks even better

Connect here: 13.215.209.185:10001


magic door

Knock Knock open the door please

Connect here: 13.215.209.185:10002


pakmatburger

Delight in Pak Mat's exclusive burger, reserved just for our special customers

Connect here: 13.215.209.185:10003


231217_nitectf

web

caas renewed

352 Author: ravinesPlains

moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo etc moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo etc moo moo moo moo moo etc moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo moo etc moo moo moo moo etc/cowsay/falg.txt

http://caas.web.nitectf.live/


Image Gallery

470 Author: T3mpāˆˆ$+

View your photo gallery using our super Secure image gallery. we offer free 1 terabyte of storage of high-Quality images, showcased in a personalized custom aLbum.

link: https://imgy-gal.nitectf.live/ bakup link: https://imgy-galll.nitectf.live/


Mini Survey

480 Author: Vikaran

Please answer this survey for the better of all

  • Minnesota Dept of Roads & Railways

http://mini-survey.web.nitectf.live/


ERaaS

50 Author: ravinesPlains

Emergency response? Afraid not.

http://eraas.web.nitectf.live/


LiteLibrary

437 Author: ravinesPlains

Testing in prod. No worries are long as we are lighte :)

http://litelibrary.web.nitectf.live/


LiteLibrary v2

500 Author: ravinesPlains

It's done. We are live. Our IT guy barked at stuff. We barked counter stuff back at him. The point is that the lite-ness continues to be maintained.

http://litelibrary-v2.web.nitectf.live/


misc

DecryptaQuest

480 Embark on a silent adventure between a web browser and server. No clues, just mystery. Good luck, detective of the unknown!

"Flag format : NITE{FLAG}"


gacha

496 Author: caligo_phantom

Can you help me pull for the SSR?


least ELOistic fish

499 Authors: YouGuess, D3V4, aRacHn0!D

Welcome to Unfair Chess! You always get to play White, but there's a catch, a couple actually!

For every move you play, Black gets two! Stockfish plays against you!

Really straight forward, survive 50 moves, you win.

You can get your Italians ready by 1. e2e4 or play Queen's Gambit with 1. d2d4

I played 1. d2d4 then 2. c2c4 then 3. d1d4 and lost my Queen :'(

Good luck to you though!

nc 34.93.104.246 1337


porters whistle

500 Author: ravinesPlains

Tuition fees have gotten so pricey. Check out the email this mum's sent.


where is porter

500 Author: ravinesPlains

Porter has gone MIA. Yes there is some action happening. But right now we need to focus on finding her. The following evidence was found at one of the multiple condos she had rented. Can you figure out where she went?

Flag format: nite{}


blindjail

50 Author: aRacHn0!D, D3V4

There is no escape, sometimes going in blind makes other attributes stronger.

nc 34.100.177.188 1337


Game-Theory

425 Author: shreyyyk,spiderdrive is it MatPat , because welcome to GameTheory

If nothing seems to work NOTHING WORKS

nc 35.200.129.176 1337


welcome2

500 Author: ravinesPlains

bored of solitude and lonesomeness we made an ad

yes this is an ad. Isn't it OG enough?

as I said, we were bored so we didn't go for anything too shiny

link: https://welcome2.nitectf.live/ bakup link: https://welcome-to.nitectf.live/

The flag is split into 3 parts. These parts are to be obtained with the same method after a minor modification for each part.


forensics

i give up

500 Author: T3mpāˆˆ$+

John Doe, the admin of a very famous meme page, has been missing for quite a while. I was analysing the last video he was working on, but the frames I extracted are corrupted. I am sending the frames and audio to you; I give up.

Hint:- Do the frames actually lead to the flag, xor it's just another rickroll? Where's the key tho...


Matryoshka

466 Author: YouGuess

: I think we should have a matryoshka challenge..

: Sure! Go ahead.

: Let's make it different this time. HEhe!

: *-+


Phantasmagoria

473 Author: YouGuess, Asturias

Perchance, Professor Paranoid purposefully painted this puzzling picture to prompt his pupils. Perhaps, you can procure the passphrase.


incident_response

cheval de troie

437 Author: SG14

After accessing our private network, the hacker skillfully maneuvered through files, leaving behind a virtual trail of mystery. We managed to capture the packets, exposing the encrypted breadcrumbs scattered across the network. Before slipping away into the digital abyss, the intruder left a deliberate hintā€”a cryptic message that conceals the essence of their next move. Decrypt the message and unveil the obscured 'crypto' to thwart their cunning plan.

Taupe will be visible after this challenge


conqueror

256 Author: unspecialfx

Our company is dealing with a possible case of corporate espionage. The credentials of one of our systems were changed and it was used to gain access to our internal network.

Help us gain access to the system before its too late.

Flag Format: nite{user_password}

coup de rƩseau will be visible after solving this challenge.


coup de rƩseau

384 Author: unspecialfx

Too late. The network admin's system was compromised and we can't access our network anymore. Investigate the memory dump.

Amour Plastique will be visible after solving this challenge.


Taupe

500 Author: unspecialfx

No wonder we were so easily hacked. Our investigation revealed that one of our employees has been communicating with the hacker. However, without any proof, there is no way to take action. Find the secret message.


Amour Plastique

384 Author: unspecialfx

It seems the intruder likes to hack in style. Analysis reveals the hacker was listening to a playlist while destroying the admin's system. Surely they might have left their tracks. Use dump2 to investigate.

cheval de troie will be visible after solving this challenge.


crypto

babyRSA

50 Author : Aditii,Asturias

RSA in haystack


cha-cha-cha

500 Author:Asturias

oracles...hmm..

nc 35.204.210.148 1337


double-whammy

499 Author: Asturias

I need a new admin for my AES encryption service, but sigh, no one seems to make the cut :/

nc 34.90.85.37 1337


Lost in the Spectrum

470 Author: gurmann

Can you find the flag among the noise?(a lone X is unknown )

Wrap flag in nite{ }


PARtly bintastic

495 Author: Aditii

crack your neck for the unimportant bits. mr.hamming might help out iykyk

Wrap flag in nite{}


Quantum Quandary

500 Authors: Definately_Not_A_Bot

Even Antman can't explain how to decrypt this by using the word 'quantum'


Solitaires are pretty

499 Author: D

Panther is engaged in a game of cards, yet it seems that he has not utilized the entire deck.

Wrap flag in nite{}


Unraveling the Patterns

497 Author: D

You have intercepted a message from an encrypted communication channel, but it appears that the sender has implemented additional measures to safeguard the information. Are you able to decrypt it?


reverse

German shell

277 Author: ravinesPlains

Do you have an Albert Einstein in you? If not you better find one cuz you gonna need em else you gunna faint rottin

/var/quantumLava/flag.txt

nc 35.244.43.8 1337


Lipton base

499 Author: 0xB0Z0

decompiling the binary while drinking Lipton Ice Tea, is there anything better? Sips the Tea


Minelogic

499 Author: gurmann

Like everyone in this world, John Doe has a lock and a key. He knows the 3 bit lock is 110 but he has lost all the 8 bit keys. Help him find all the keys.

Flag format: Arrange all keys in ascending order, join with _ and wrap it with nite{}


Top Secret

495 Author: YouGuess, spiderdrive

We were able to intercept a transmission signal to end up getting an image from an criminal firm and one of our spies was able to send us an program which was used to encrypt it but he was caught right after that and lost some part of it before he could send it can u help us decrypt the transmission.


You Collide, You lose - I

483 Author: Valvahen

You find yourself in a strange 2D world and the only way to escape is by finding the flag hidden in your surroundings. Look in every nook and cranny for it and be very patient because even a small slip up lands you back at the beginning.

You Collide, You lose - II will be visible after solving this challenge.


You Collide, You lose - II

495 Author: Valvahen

Turns out one flag ain't gonna be enough. To get out, you need the secret code sung by the mystic P13t P1p3r whose ardent rings can forever be heard in an eerie corner of the world. Best of luck.


Zealot

50 Author:0xB0Z0

Follow the commandments and you shall be worthy enough to lift the sword of Zealot

nc 34.93.183.186 1337


pwn

ARM's race

500 Author: skryptonyte

Note: You may use QEMU userspace emulation for testing your exploit but the way address spaces are created may cause issues.

nc 35.247.159.106 5000


ARMv8-NITE

500 Author: Skryptonyte We are experimenting on a new extension of the ARMv8 spec! Introducing ARMv8-NITE with blazing fast registers to crush those benchmarks!

nc 34.125.89.18 5000


The road not taken

50 Author: spiderdrive

Show me the right path to reach my final destination

nc 34.100.142.216 1337


240114_uoftctf

web

Guestbook

442 I made this cool guestbook for the CTF. Please sign it.

Author: Ido


Jay's Bank

499 My bank is still in pre-alpha-alpha-alpha stage, but I'm sure it's secure enough to keep all of your information safe.

Author: SteakEnthusiast

http://34.123.200.191/


My First App

494 I'm not much of a web developer, so my friends advised me to pay for a very expensive firewall to keep my first app secure from pesky hackers. Come check it out!

Author: SteakEnthusiast

https://uoftctf-my-first-app.chals.io/


No Code

362 I made a web app that lets you run any code you want. Just kidding!

Author: SteakEnthusiast

https://uoftctf-no-code.chals.io/


The Varsity

293 Come read our newspaper! Be sure to subscribe if you want access to the entire catalogue, including the latest issue.

Author: SteakEnthusiast

uoftctf-the-varsity.chals.io


Voice Changer

232 I made a cool app that changes your voice.

Author: Ido

https://uoftctf-voice-changer.chals.io/


misc

Out of the Bucket

100 Check out my flag website!

Author: windex

https://storage.googleapis.com/out-of-the-bucket/src/index.html


Out of the Bucket 2

407 This is a continuation of "Out of the Bucket". Take a look around and see if you find anything!

Author: windex


Prediction API

500 I downloaded a model that performs categorical classification on images. I want to use this model in a web application, but it doesn't seem to be very accurate. Can you check out the weights and see if you can figure out what's wrong?

Author: windex

http://35.209.84.6/

hint: The groundbreaking paper presenting model extraction attacks is listed here: https://arxiv.org/abs/1609.02943

There are other more recent papers that go over this, perhaps you can find it!

Prediction responses are returned in the same order as in Python's sorted(os.listdir()).


Source Code Recovery

500 Oops I deleted the source code, do you mind recovering it?

Author: nullptr

nc 35.202.233.94 1337 < solution.c


forensics

EnableMe

358 You've received a confidential document! Follow the instructions to unlock it.

Note: This is not malware

Author: SteakEnthusiast


Hourglass

481 No EDR agent once again, we imaged this workstation for you to find the evil !

Download Link : https://storage.googleapis.com/hourglass-uoftctf/ctf_vm.zip

( Updated Link, attachments remain the same, nothing was changed. )

Author: 0x157


Illusion

499 Good Luck.

Author: 0x157


No grep

475 Use the VM from Hourglass to find the 2nd flag on the system !

Author: 0x157


Secret Message 1

100 We swiped a top-secret file from the vaults of a very secret organization, but all the juicy details are craftily concealed. Can you help me uncover them?

Author: SteakEnthusiast


Secret Message 2

500 The super secret organization changed their flag again. Can you work your magic again?

Hint: The flag characters contain abcdefghijklmnopqrstuvwxyz_

Author: SteakEnthusiast


osint

Flying High

100 I'm trying to find a flight I took back in 2012. I forgot the airport and the plane, but I know it is the one with an orange/red logo on the right side of this photo I took. Can you help me identify it?

The flag format is UofTCTF{AIRPORT_AIRLINE_AIRCRAFT}. AIRPORT is the 3 letter IATA code, AIRLINE is the name of the airline (dash-separated if required), and AIRCRAFT is the aircraft model and variant (omit manufacturer name). For example, UofTCTF{YYZ_Air-Canada_A320-200} or UofTCTF{YYZ_Delta_767-300}.

Note: The aircraft variant should be of X00 format; ie. there may be models with XYZ-432, but the accepted variant will be XYZ-400.

Author: windex


jail

Baby JS Blacklist

466 I hate functions. I hate them so much, that I made it so that you can never call them!

Note: Solving this challenge will unlock another challenge, "JS Blacklist".

Author: SteakEnthusiast

nc 34.172.149.49 5000


Baby's First Pyjail

100 @windex told me that jails should be sourceless. So no source for you.

Author: SteakEnthusiast

nc 35.226.249.45 5000


JS Blacklist

500 "use really_really_really_strict";

Can you escape my jail now?

Author: SteakEnthusiast

nc 35.239.253.188 5000


JS Evaluator

500 Last year, I found a critical security vulnerability in Babel. I heard path.evaluate() is secure now, but it still wasn't useful enough for me. I added some code to enhance the functionality, without impacting the security!

Author: SteakEnthusiast

nc 35.193.215.35 5000


Zero

494 Zero letters, zero numbers, zero underscores, zero builtins, and zero hope of escaping

Author: SteakEnthusiast

nc 35.222.133.12 5000


crypto

Clever Thinking

442 I think that Diffie-Hellman is better with some curves, maybe elliptic ones. Let's share a secret!

Wrap the secret (which is a point) in uoftctf{(x:y:z)}, where (x:y:z) are homogeneous coordinates.

Author: Phoenix


Export Grade Cipher

500 This "state of the art"ā„¢ cipher can be exported to your enemies without restriction.

Author: nullptr

nc 0.cloud.chals.io 23753


Pianoman

324 Windy, a piano prodigy, believes that RSA encryption may not provide sufficient security to safeguard his invaluable piano mastery secrets. So, he uses his musical talents to add another layer of security to the RSA encryption scheme. Now, no one will be able to figure out his secrets!

Note: The flag is UofTCTF{plaintext}.

Author: XiaoXiangjiao


repeat

100 I'm a known repeat offender when it comes to bad encryption habits. But the secrets module is secure, so you'll never be able to guess my key!

Author: SteakEnthusiast


Wheel Barrow

442 A wheelbarrow ran over the flag. Can you fix it?

Please wrap the flag in uoftctf{}. Please keep the $ in the flag when submitting.

Author: notnotpuns


reverse

All Worbled Up

493 last time we had a worbler, it failed miserably and left everyone sad, and no one got their flags. now we have another one, maybe it'll work this time?

output:


                      _     _             
                     | |   | |            
  __      _____  _ __| |__ | | ___ _ __   
  \ \ /\ / / _ \| '__| '_ \| |/ _ \ '__|  
   \ V  V / (_) | |  | |_) | |  __/ |     
    \_/\_/ \___/|_|  |_.__/|_|\___|_|     
                                          
==========================================
Enter flag: *redacted*
Here's your flag:  a81c0750d48f0750
Author: cartoonraccoon

Unlock Hint for 0 points: try not to byte off more than you can chew! what does your code look like?


CEO's Lost Password

499 Hello there brave programmer!

I am the CEO of TotallySecureBankā„¢, I have a lot of money in my bank account but I forgot my password! My username is admin and I have $100000 in my account.

If you could recover my account you can use my password as a flag (flag would be uoftctf{MyPasswordHere})

You can try the bank software by running java -jar BankChallenge.jar and use the admin user user with the password

Author: Ido


CSS Password

480 My web developer friend said JavaScript is insecure so he made a password vault with CSS. Can you find the password to open the vault?

Wrap the flag in uoftctf{}

Make sure to use a browser that supports the CSS :has selector, such as Firefox 121+ or Chrome 105+. The challenge is verified to work for Firefox 121.0.

Author: notnotpuns


Love Debug

500 If you send this to someone, you'll be dumped... unless it's someone who knows a thing or two about reverse engineering...

Side Note: A love letter (https://en.wikipedia.org/wiki/ILOVEYOU) is what inspired the author to become a hacker.

Unlock Hint for 0 points if you see awww on the output, your input is the correct flag. if you see nope, please try again


Random Maze

499 a little maze for you! just don't get lost! :3 remember, if you end up somewhere that doesn't look right, it probably isn't!

free hint: the entire flag is lower-alphanumeric ASCII.

Author: cartoonraccoon

Unlock Hint for 0 points you're a l33t h4xxor aren't you? i'm sure you can figure it out.


pwn

baby-shellcode

326 This challenge is a test to see if you know how to write programs that machines can understand.

Oh, you know how to code?

Write some code into this program, and the program will run it for you.

What programming language, you ask? Well... I said it's the language that machines can understand.

Author: drec

nc 34.28.147.7 5000


basic-overflow

176 This challenge is simple.

It just gets input, stores it to a buffer.

It calls gets to read input, stores the read bytes to a buffer, then exits.

What is gets, you ask? Well, it's time you read the manual, no?

man 3 gets

Cryptic message from author: There are times when you tell them something, but they don't reply. In those cases, you must try again. Don't just shoot one shot; sometimes, they're just not ready yet.

Author: drec

nc 34.123.15.202 5000 Unlock Hint for 0 points If you don't have the manual in your machine, you can enter the command in google to read it online :)

Unlock Hint for 0 points There are a lot of nice ways to see how the program works!

There's IDA (very expensive software!) Ghidra is a free one, made by the NSA And there's good old objdump, a lightweight disassembler

Why don't you try one of these while you're waiting for output?


nothing-to-return

444 Now this challenge has a binary of a very small size.

"The binary has no useful gadgets! There is just nothing to return to!"

nice try... ntr

Author: drec

nc 34.30.126.104 5000


patched-shell

371 Okay, okay. So you were smart enough to do basic overflow huh...

Now try this challenge! I patched the shell function so it calls system instead of execve... so now your exploit shouldn't work! bwahahahahaha

Note: due to the copycat nature of this challenge, it suffers from the same bug that was in basic-overflow. see the cryptic message there for more information.

Author: drec

nc 34.134.173.142 5000


iot

Baby's First IoT

Flag 1 - Here is an FCC ID, Q87-WRT54GV81, what is the frequency in MHz for Channel 6 for that device? Submit the answer to port 3895.

Flag 2 - What company makes the processor for this device? https://fccid.io/Q87-WRT54GV81/Internal-Photos/Internal-Photos-861588. Submit the answer to port 6318.

Flag 3 - Submit the command used in U-Boot to look at the system variables to port 1337 as a GET request ex. http://35.225.17.48:1337/{command}. This output is needed for another challenge.

Flag 4 ā€“ Submit the full command you would use in U-Boot to set the proper environment variable to a /bin/sh process upon boot to get the flag on the webserver at port 7777. Do not include the ā€˜bootcmdā€™ command. It will be in the format of "something something=${something} something=something" Submit the answer on port 9123.

Flag 5 - At http://35.225.17.48:1234/firmware1.bin you will find the firmware. Extract the contents, find the hidden back door in the file that is the first process to run on Linux, connect to the backdoor, submit the password to get the flag. Submit the password to port 4545.

Flag 6 - At http://35.225.17.48:7777/firmware2.bin you will find another firmware, submit the number of lines in the ā€˜ethertypesā€™ file multiplied by 74598 for the flag on port 8888.

Hint: If there is an issue with submitting an answer with a challenge, try including newlines and null characters. For example: ā€˜printf 'answer\n\0' | nc 35.225.17.48 portā€™


240120_mapnactf

web

Novel Reader 2

Submit the second flag of "Novel Reader" here


Flag Holding

Hopefully you know how web works...

http://18.184.219.56:8080/


Advanced JSON Cutifier

My homework was to write a JSON beautifier. Just Indenting JSON files was too boring that's why I decided to add some features to my project using a popular (More than 1k stars on GitHub!! ) library to make my project more exciting.

Important: You can't read any file other than /flag.txt on the remote environment.

http://3.64.250.135:8005


Novel reader

We have many fun novels for ya...

http://3.64.250.135:9000


Purify

I think I downloaded the wrong DOMPurify.

Website: http://91.107.157.58:7000/ Admin bot: http://91.107.157.58:7001/


Gimme Content Type

I got your csp from asisctf 2023 finals, now gimme your content type!

Hint: app.alert

google-chrome '--unsafely-treat-insecure-origin-as-secure=http://91.107.157.58:8000' website: http://91.107.157.58:8000 admin bot: http://91.107.157.58:8001


forensics

PLC I

The MAPNA CERT team has identified an intrusion into the plant's PLCs, discovering a covert message transferred to the PLC. Can you uncover this secret message?


PLC II

After extensive investigations, the MAPNA forensics team discovered that the attackers attempted to manipulate the PLC time. Please identify the precise time in the following format:

year:month:day:hour:minute:second:millisecond

The flag is MAPNA{sha256(datetime)}.


Tampered

Our MAPNA flags repository was compromised, with attackers introducing one invalid flag. Can you identify the counterfeit flag?

Note: Forgot the flag format in the rules pages, just find the tampered one.

You are not allowed to brute-force the flag in scoreboard, this will result in your team being blocked.


Mitrek

In the MAPNA field, a malicious traffic, was intercepted, with an unidentified protocol. Investigators suspect file transmission. Seek secret message.

Note: The file is updated, please download again.


JigBoy

Jigboy, the superhero, possesses the remarkable ability to reel in colossal fish from the depths of the deep blue sea.


XXG

Welcome to the Forensics XXG challenge! Our investigator stumbled upon a mysterious file. Can you uncover the hidden message?


crypto

What next?

In this task, we explore the realm of cryptographically secure random generators, where predicting the next output is deemed impossible. Are you ready to test your luck and skill?


What next II?

Again, in this task, we explore the realm of cryptographically secure random generators, where predicting the next output is deemed impossible. Are you ready to test your luck and skill this time?


Be Fast

Rapid mastery of breaking symmetric encryption, deciphering codes with precision, and navigating complexities with unprecedented speed and efficiency are requirements for every professional cryptographer. So, be fast.

nc 3.75.180.117 37773


GLNQ

Solving the DLP in matrices over a finite field is no trivial task. What are your thoughts on this GLNQ belief?

Note: flag = MAPNA{m}, Don't convert m to bytes.


Shibs

Dive into a cryptographic maze, untangle intricate codes, and unleash your creativity in this unique CTF experience by conquering the Shibs challenge.


Isogenies

Explore the strange world of isogenies in cryptosystems to uncover the secret flag.


reverse

Compile Me!

Compile the given code and execute the resulting binary, passing the source code file as an argument, to obtain the flag.

Welcome,to,MAPNA,CTF,Year_2k24;main(){for(++CTF;to=-~getchar();Welcome+=11==to,Year_2k24++)CTF=to>0xe^012>to&&'`'^to^65?!to:!CTF?++MAPNA:CTF;printf("MAPNA{%4d__%d__%d_!}\n",(to+20)^(Welcome+24)+1390,MAPNA+=(!CTF&&Year_2k24)+10,Year_2k24+31337);}

Locate Me!

Guys, in this reverse engineering challenge, your task is to skillfully locate me within the intricate digital labyrinth.

nc 95.216.191.248 13770


Time Traveler

Enjoy the vintage with a time traveler!

Note: Do not forget to add MAPNA at the beginning of flag!


Heaverse

Heaverse, a paradoxical binary that defies logic: reverse it without reversing it. Can you navigate its enigmatic depths?

Flag format: MAPNA{CAPITAL_WORDS_THAT_YOU_FIND}


Prism

Prism has implemented a sophisticated anti-reverse engineering technique in the binary. Can you bypass this mechanism to obtain the flag?


Tetim

Begin on a formidable journey into the realm of Zig reverse with tetim, a challenging and intricate reverse engineering task. Unusual for CTFs, it features Zig language binaries and promises a riveting experience, designed for those seeking revenge at MAPNA CTF.


pwn

ninipwn

pwn ^ pwn ^ pwn ^ pwn ^ pwn ^ pwn

nc 3.75.185.198 7000


U2S

I just changed S2U to U2S... This shouldn't lead to scary things right?

nc 3.75.185.198 6666


Protector

my flag is protected! what are you gonna do

nc 3.75.185.198 10000


Buggy Paint

I wrote a paint for myself but It seems kinda buggy

nc 3.75.185.198 2000


240120_knightctf

net

Vicker_IP(the first challenge)

Hi! It's good to see you again in my networking series. There are total 18 challenges in this series & based on real life events of how can a server be compromised. Please download the attachment which will be used to answer all the questions. Don't make it too complex. Just keep it simple. Hope you'll solve them all. Wish you all a very good luck.

Scenario: Recently one of Knight Squad's asset was compromised. We've figured out most but need your help to investigate the case deeply. As a SOC analyst, analyze the pacp file & identify the issues.

So let's start with the basic.


API_Key

What's the API Key?

Please use the attachment of the first challenge.


Admin_Flag

Can you find the Admin Flag of the web server.?

Please use the attachment of the first challenge.


BackDoor

What is the backdoor file name?

Please use the attachment of the first challenge.


Basic_Enum

What tool did the attacker use to do basic enumeration of the server?

Please use the attachment of the first challenge.


CVE_ID

What's the CVE id for the vulnerable service?

Please use the attachment of the first challenge.


Confidential

There's something confidential. Can you find it?

Please use the attachment of the first challenge.


DB_Details

What is the database username & databasename?

Please use the attachment of the first challenge. And keep in mind that the file you have is the backup file. There might be an update to the database.


Famous_Tool

The attacker used a popular tool to gain access of the server. Can you name it?

Please use the attachment of the first challenge.


Famous_Tool_2

What tool did the attacker use to identify the vulnerability of edit task page?

Please use the attachment of the first challenge.


Hidden_File

What's the flag of the hidden file?

Please use the attachment of the first challenge.


Hidden_Page

There was a hidden page which was only accessible to root & was removed from the web app for security purpose. Can you find it?

Please use the attachment of the first challenge.


PORT

What was the port number of the reverse shell of the server?

Please use the attachment of the first challenge.


Something_Interesting

There's something interesting. Can you find it?

Please use the attachment of the first challenge.


Super_Admin

What is the super admin password in the web application?


Vuln

What was the vulnerability on the edit task page & what parameter was vulnerable?

Please use the attachment of the first challenge.


Vulnerable_Service

What service was vulnerable to the main server?

Please use the attachment of the first challenge.


stego

Oceanic

The ocean's beauty is in its clear waters, but its strength lies in its dark depths.


crypto

Random_Shamir_Adleman

This standard cipher comes with a twist!


reverse

Dragons_Binary

In the mystical land of Eldoria, a fierce dragon had captured the kingdom's most precious treasure, hiding it behind a magical binary. The bravest knight of the realm, Sir Emeric, known for both sword and wit, embarked on a quest to retrieve the treasure. To succeed, he must reverse the dragon's binary. As Sir Emeric's trusted apprentice in "Dragon's Binary" you are tasked with solving the cipher to reveal the hidden treasure and help vanquish the dragon's spell. Your journey is filled with mystery and danger, where only the sharpest mind can prevail. . Right Passcode is the flag.


Knight_Armoury

In a realm where magic and technology merge, lies the Knight Armoury, home to the legendary "Sword of Bytes." Forged by Knight Squad, this digital sword holds immense power. Your mission: reverse the ancient binary guarding the Armoury and claim the sword to become the protector of the digital kingdom. Only the wisest and most skilled in reverse engineering can succeed. Are you ready to embark on this epic journey?


Saphira_and_the_Valyrian_Sword

In a land shadowed by the dragon Saphira, legends whispered of a powerful weapon, the Valyrian sword, lost in the mists of time. It was said that only those who could reverse the ancient binary, a mystical code from the forgotten ages, would uncover the sword's location. Brave challengers, your quest beckons you to unravel this riddle. Succeed, and the Valyrian sword shall be yours to wield against Saphira, bringing an end to her reign. The destiny of the land rests in your hands.


pwn

Get_The_Sword

Can you get the sword ?


win..._win..._window...

You are a skilled hacker known for your expertise in binary exploitation. One day, you receive an anonymous message challenging your abilities. The message contains a mysterious binary file. Now you decide to analyze the file.


T-Box

score:500 solve_count:1

Pwn,difficulty:Normal

In the digital realm, three Cyber Boxes existed, which We called Trinity Box or T-Box.
The first jumpbox, the second gatebox, and the final flagbox. Summon a flag when gathered all three box

nc 47.251.11.236 8888

attachment


240126_ctrwctf

web

ChatterBox

score:194 solve_count:21

Web,difficulty:Normal

i wanna inject sth in my Box what should i do?

nc 47.89.225.36 9999

attachment

cn-oss: update attachment

accelerate-oss: update attachmen


minioday

score:290 solve_count:11

Web, difficulty:Baby

Old CVEs, try to pwn it for fun.

nc 47.251.10.169 8888

attachment


blockchain

SafeBridge

score:224 solve_count:17

Blockchain, difficulty:hard

I've crafted what I believed to be an ultra-safe token bridge. Don't believe it?

nc 47.251.56.125 1337

attachment


misc

LLM sanitizer

score:84 solve_count:66

Misc, difficulty:Baby

Show your jailbreaking techniques and get the flag.

nc -v -N 47.89.192.246 1337

attachment


Long Range 2

score:320 solve_count:9

Misc, difficulty:Baby

Of late, whispers doth persist behind mine back. Yesterday, under the studio tower, a peculiar contraption was found by me. I am most intrigued to discover the content of their discourse.

attachment


misc&web

Protected by Java SE

score:338 solve_count:8

Misc, Web, difficulty:Baby

Write down your best, most precise vulnerability-matching CodeQL query here. I will use it to defeat LLM and stop the endless layoffs to save our jobs!

nc 47.254.70.30 9999

attachment


misc&crypto

The truth of Plain

score:87 solve_count:63

Misc, Crypto, difficulty:Baby

You are right, but "CTF" originated from the DEFCON global hacker conference in 1996. It is a competitive game among network security enthusiasts. This game takes place in a competition called "RealWorld", where those who solve the challenge will be awarded a "Flag". You will play a character named "CTFer" and work with your teammates in the game, using knowledge and skills to solve various challenges - and at the same time, gradually discover the truth of "Plain".

Repository: https://github.com/gwuhaolin/lightsocks

attachment


Forensics

Grandma's Laptop

score:500 solve_count:0

Forensics, difficulty: Normal

Unfortunately, my grandma has passed away recently. The photos in her laptop
are the only memory of her that I have. However, I could not remember the
password of her laptop. The photos are protected by BitLocker and cannot be
read out directly from the disk. I am trying to restore the photos. I really
need your help.

Grandma's Laptop is available at https://47.88.103.9:1337/.

Attachment

Hint for Grandma's Laptop: pick your favorite from https://github.com/Wack0/bitlocker-attacks#software-attacks


crypto

reverse

pwn

Corrupted GI

score:500 solve_count:1

Pwn,difficulty:Normal

In the realm of code, where the brave ones dwell,
Seek the treasure hidden, in CGI's shell.
Courageous hackers, let your skills unfold,
Break the chain, let the story be told.
For glory awaits those who unveil the unknown,
In the digital world, let your prowess be shown.

nc 47.88.19.153 12345

attachment


Let's party in the house

score:378 solve_count:6

Pwn, Panasonic (PCSL), difficulty:Schrƶdinger

Oh, no, in the middle of our party, there was a strange baby cry coming from the IP Camera.
There is only one service in the device, can you figure out the baby crying? flag path: /flag

nc 47.88.48.133 7777

attachment


pgsum

score:477 solve_count:2

Pwn, difficulty:Normal

We have added sum support for string to postgresql! Try it out!

nc 47.88.60.165 6666

attachment


RIPTC

score:500 solve_count:1

"Pwn, difficulty:Hard

Lyrics: RIPTC
Composer: Krias aka Digging into kernel

I'm fond of the days that are retro
Hate the future's unpredictable echo
Peep into the kernel, take a look
Revive the code that the attack took
Found one new 0 day, what a magic
Triggering the moment, I've lost the knack
Patching up the class, secrets I pack

Source code added a few files, ain't no pretense
Three characters added in another file, spotted only in vmlinux, no defense

Friends from afar, they arrive
Could you help me thrive, like eating greens, time

nc 47.88.23.76 7788

attachment

Hint1 for RIPTC:

Source code added a few files, ain't no pretense

By learning from CVE-2023-1829, CVE-2023-3776 and CVE-2023-4206, you will find a new bug in cls_tcindex.c"


Router4

score:451 solve_count:3

Pwn, Clone-and-Pwn, difficulty: Hard

The great magician Merlin created this magical device, but accidentally left a vulnerability in it. And you, as an extraordinary hacker, now have this magical device in front of you. Can you discover this vulnerability and use your 'magical skills' to break through it?

** Please select your target from the following: **

nc hk.router4.exp.sh 8888
nc us.router4.exp.sh 8888
nc eu.router4.exp.sh 8888

attachment


ēƒ«ēƒ«ēƒ«

score:500 solve_count:0

Pwn, difficulty:Normal

Make sure to be very very far away from my b"\xCC\xCC\xCC\xCC\xCC\xCC" unless you want to be badly burned.

nc 47.251.60.42 1337

attachment


pwn&misc

PyGhost

score:500 solve_count:0

Pwn, Misc, demo, difficulty: Schrƶdinger

This is an LPE(Local Privilege Escalation) challenge. Your task is to pop a highly-privileged(nt authority\\system) cmd.exe as a low-privileged user. Follow these steps to deploy the challenge locally:

  1. download and install the virtual machine from: https://developer.microsoft.com/en-us/windows/downloads/virtual-machines/
  2. execute the installer (installer.exe in the attachment) as Administrator
  3. the installer will set up the vulnerable component. You can then attempt to find the vulnerability and exploit it

Notes about the demo:

  1. Send your exploit archive file to demo@realworldctf.com and DM @M4x on Discord when you're ready. Meanwhile, the email should also contains your team name and team token
  2. You can choose to demo your exploit publicly or privately, according to your preference. If you choose to demo publicly, the entire process will be visible to everyone, so remember to remove sensitive information. If you choose to demo privately, we will set up a private discord channel that only includes the admin and your team members
  3. Our demo VM is slightly configured, including:
    a. Windows Defender is disabled. You don't have to contend with it.
    b. A standard user(not in the Administrator group, with the username being ctf) is created for demo purposes. We will run your exploit in the context of the standard user.
  4. If your exploit needs multiple steps, please batch them in a single file. We will only execute one of your files and then wait for the result without more user interaction

I will not accept more than 3 emails per team. If you really need more, you will need to explain to me in detail why you messed up your first 3 tries and convince me that you deserve a 4th chance.
The running time for each try cannot exceed 3 minutes.

I will reward you with the flag if the highly-privileged cmd.exe pops up.

attachment


YouKnowHowToFuzz!

score:93 solve_count:57

Misc, Clone-and-Pwn, difficulty:Baby

I like eat domato, it''s excellent for dom fuzz, try to use your rule!

nc 47.251.60.74 9999

attachment


pwn&web

GeoServer Jiveļ€ŗ The RCE Hive

score:500 solve_count:0

Web, Clone-and-Pwn, difficulty:Schr\u00f6dinger

Welcome, seekers of cyber lore,
To a challenge like none before.
In a world where maps are key,
GeoServer's the tool, you see.

It's set on Windows, standing tall,
With Tomcat running, serving all.
But lurking deep, a bug does hide,
An RCE gap, wide and wide.

Your mission, should you choose to play,
Is to exploit in a clever way.
Use your skills, be sharp and keen,
In the code, where not easily seen.

Find the flaw, make your move,
Let your savvy cyber groove
Turn the tide, and gain control,
In this digital escapade role.

So embark on this virtual quest,
Put your hacking skills to the test.
In this GeoServer jive,
Find the hive where RCEs thrive.

Can you dive into the code,
On this cyber treasure road,
And emerge, with flags in hand,
As the finest hacker in the land?

nc 47.89.213.235 1337

attachment

Hints 1:

  • First of ALL: for the expected solution, you MUST following the README.txt file to deploy the geoserver.
  • The expected solution is a combined Pre-auth RCE vulnerability of stable version of geoserver at 2.24.1 (just found that geoserver lastest released version 2.24.2, don't worry, it's is also vulnerable to expected solution), in more detail, it's an pre-auth vulnerability combined with post-auth RCE vulnerability.
  • For the pre-auth vulnerability, your mission is to find an 'abitrary file read' vuln (not a really 'abitrary', but is sufficient for you to obtain admin's privilege), after then, you can seek for post-auth RCE on geoserver 2.24.1 or geoserver 2.24.2 if you want ;)
  • The deployed machine is in an isolated network therefore it is not vulnerable to any oob attacks.

Nightmail

score:500 solve_count:0

Web, Pwn, difficulty:Schrƶdinger

You sent a nightmail in the moon's pale glare, Then in my slumber, nightmares came to snare.

About the challenge:

  • Environment setup: You can use the software installation package provided in the attachment to build a local environment for test. You can follow the default steps during installation, except for the Set up encryption step, you should choose Continue without encryption option.

  • Find the vulnerability: Try to find a Remote Code Execution (RCE) vulnerability in eM Client installed in Windows, the vulnerability should be triggered when the victim clicks the malicious email sent by you.

  • Capture the flag: After your exploit successfully works in your local environment, you can connect to nc 47.89.252.163:1337 to apply for your team's independent vm environment and then try to obtain the flag.

About the vm:

  • OS: Windows Server 2022 x64
  • Software version: eM Client v9.2.2157
  • Path to flag: C:\\flag
  • After the vm starts, an automated script will simulate logging into eM Client with the victim email address. After waiting for 5 minutes, it will click on the most recent email in the inbox.
  • The vm will be destroyed after 15 minutes.
  • If you are sure that your exploit can work locally but keeps failing in the remote vm environment, please contact me (@voidfyoo) on discord channel.

attachment


shellcode

hoshmonster

score:500 solve_count:1

shellcode, difficulty:Hard

Thanks to Qiangwangbei organizers for the gueststolen challenge!

nc 47.89.227.164 1337

attachment


240202_dicectf

web

dicedicegoose

NotDeGhost 445 solves / 105 points

Follow the leader.

ddg.mc.ax


funnylogin

strellic 269 solves / 109 points

can you login as admin?

NOTE: no bruteforcing is required for this challenge! please do not bruteforce the challenge.

funnylogin.mc.ax

Downloads

funnylogin.tar.gz


gpwaf

larry 180 solves / 115 points

i made a ejs renderer, its 100% hack proof im using gpt to check all your queries!

please note that the backend for this challenge is not the same as the one given to avoid leaking our API key, but the queries to the OpenAI API are exactly the same.

(Instancer)[https://instancer.mc.ax/challenge/gpwaf]

Downloads

(gpwaf.tar.gz)[https://static.dicega.ng/uploads/bd158456c1a33a1d574c7df5400636d86739a738b12889e3da13f52d7e2282c1/gpwaf.tar.gz]


calculator

BrownieInMotion 59 solves / 119 points

beep boop

calculator.mc.ax

Admin Bot

Downloads

calculator.tar.gz


calculator-2

BrownieInMotion 33 solves / 135 points

beep boop, again

calculator-2.mc.ax

Admin Bot

Downloads

calculator.tar.gz


another-csp

larry 16 solves / 272 points

i've made too many csp challenges, but every year another funny one comes up.

Instancer

Downloads

another-csp.tar.gz


safestlist

strellic 2 solves / 481 points

safelist had some flaws, but now they're fixed! It's now perfectly secure, perfect for all your list needs!

Hint: Flag is in the format dice{[a-z]+}

Instancer

Downloads

safestlist.tar.gz


burnbin

strellic 1 solve / 500 points

The most secure place to create and store private pastes that can only be read once.

Instancer

Downloads

burnbin.tar.gz


misc

welcome

defund 947 solves / 1 point

Join us at discord.gg/dicectf and read the #rules channel to get the flag!


survey

defund 253 solves / 1 point

Thanks for participating in DiceCTF Quals! Fill out this survey to get the flag here. We hope to see you in NYC for Finals!


zshfuck

arxenix 107 solves / 127 points

may your code be under par. execute the getflag binary somewhere in the filesystem to win

nc mc.ax 31774

Downloads

jail.zsh


unipickle

kmh 68 solves / 144 points

pickle

nc mc.ax 31773

Downloads

unipickle.py


diligent-auditor

aplet123 15 solves / 281 points

I hired an auditor to secure my python interpreter!

nc mc.ax 31130

Downloads

Dockerfile jail.py


spellbound

orion, hpmv 9 solves / 347 points

(adj.) spellā€¢bound (spel'bound') : held by or as if by a spell.

Submit your APK here: spellbound.mc.ax

The evaluation process is as follows. A fresh Android emulator is started using the Docker image us-docker.pkg.dev/android-emulator-268719/images/30-google-x64:30.1.2 and the DictionaryService, DictionaryApp, and your APK are installed. It then launches your APK with the command am start -n com.dicectf2024.attackerapp/com.dicectf2024.attackerapp.MainActivity waits for 20 seconds, and then returns you the output of logcat -d dicectf:V *:S Make sure you sign your APK, or else it will not install.

Your goal is to access the random flag generated by the DictionaryService, and log it to logcat so that you can see the random flag. Then, exchange that flag for a real flag using the "get flag" page. The random flag is different for every submission. You must submit the correct random flag generated for that submission in order to get the real flag.

DO NOT attack anything outside of the Android emulator. This includes the CTF infrastructure, the UI for submitting APKs, viewing the results, etc. Also, the Android emulator does not have any network access. This is purely an Android challenge.

Downloads

spellbound.zip


floordrop

hpmv, orion 8 solves / 362 points

Ever heard of airdrops? Well, we're doing a floordrop. We're dropping the flag on the floor. Go pick it up.

This challenge happens on DiceChain, an Ethereum-compatible network started using go-ethereum with the genesis.json provided to you. You may start a challenge attempt at any time by connecting to the provided nc.

During each challenge attempt,

  • The server will generate a challenge for you to solve and send a transaction that calls setChallenge(the challenge) on the ProofOfWork contract.
  • Two seconds later, the server will send another transaction that calls expireChallenge() on the same contract.
  • Your goal is to solve the challenge and submit the solution by calling solveChallenge(the solution encoded in bigendian bytes, random nonce), before the challenge expires. A script to solve the challenge has been provided to you in solve.py.
  • If you submit the correct solution before the challenge expires, a flag will be printed in the same nc session. You're encouraged to use the mock challenge (menu option 1) to familiarize yourself with the challenge setup. Also, to help with your understanding, an example series of transactions that would yield a successful solve can be found in block 154.

Links:

Block explorer: https://floordrop.hpmv.dev/ RPC: https://floordrop-rpc.hpmv.dev/ Faucet: floordrop-faucet.mc.ax (use to get some free DICE!). nc mc.ax 32123

Downloads

floordrop.zip


what-a-jpeg-is

ireland 6 solves / 396 points

I just want a picture of a god-dang Madagascar cat

nc mc.ax 31373

Downloads

IRS

kmh 2 solves / 481 points

The Internal Restrictedpythonexecution Service has established a new automated auditing pipeline. Can you remain undetected?

nc mc.ax 31337

Downloads

irs.c irs audit.py build.sh run.sh Dockerfile


crypto

winter

defund 169 solves / 116 points

A simple implementation of the Winternitz signature scheme.

nc mc.ax 31001

Downloads

server.py


inversion

ireland 40 solves / 129 points

Have you ever heard of homomorphic encryption?

This is the first part of a two-part challenge.

nc mc.ax 30662

Downloads

server.py generate.py public.key x.ctxt


rps-casino

clam 94 solves / 131 points

We're opening a new casino! The only game is rock-paper-scissors though...

nc mc.ax 31234

Downloads

server.py


yaonet

defund 38 solves / 181 points

Key...no, that's just the letters and numbers that were on that little sheet of paper

ssh -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null yaonet@mc.ax -p 31000 -i id_ecdsa

Downloads

id_ecdsa.pub id_ecdsa


iinversion

ireland 1 solve / 250 points

what if we made it good?

This is the second part of a two-part challenge.

nc mc.ax 30663

Downloads

server.py generate.py public.key x_hard.ctxt


pee-side

gripingberry 10 solves / 334 points

I decided that CSIDH needed a bit more entropy! Now, not only do we have a random starting curve, but also a random point!

nc mc.ax 30893

Downloads

server.py


mea-shor-ment-error

ireland 0 solves / 500 points

My new quantum computer has no issue running Shor's algorithm, but the readout error is still pretty high.

Downloads

publickey.pem ciphertext.bin setup.py mea_shor_ment_error.py shor.txt


dicenet

defund 0 solves / 500 points

AI meets cryptography! DiceNet is a cutting-edge flag checker which leverages multi-party computation to perform secure inference.

There is a bug in the construction described in the papers (see README.txt), which is implemented by swanky. You do not need to comb through the library's code to find the bug. Read the papers!

Hint: what happens when you use a composite modulus?

./client --model model.json --weights dummy_weights.json --file sheep.png mc.ax:31002

Downloads

dicenet.tar.gz


reverse

dicequest

clubby 107 solves / 127 points

Try 2024's hottest game so far - DiceQuest! Can you survive the onslaught? Custom sprites made by Gold

note: the flag matches the regex dice{[a-z_]+}

Downloads

game.zip


pain-plus-plus

solomon-ucko 69 solves / 144 points

Pain++

I'd recommend reading the x86-64 System V ABI documentation and the libstdc++ source code while attempting this.

Downloads

pain-plus-plus


three

BrownieInMotion 34 solves / 191 points

no more, but sometimes less

Downloads

challenge


L'Ɖvasion Fiscale

hgarrereyn 14 solves / 290 points

Just some creative accounting...

Downloads

DiceTax.catala_en Dockerfile tax.py


scrambled up

infuzion 8 solves / 362 points

This flag checker sure looks like it went through a blender.

Note: Run the challenge inside a ubuntu:22.04 docker container if you run into libc issues or crashes inside libc during startup.

Downloads

scrambled-up


neurotic

hgarrereyn 7 solves / 378 points

mushy

Downloads

brain.json neurotic.py


pwn

baby-talk

kfb 80 solves / 137 points

take it easy baby, don't you ever grow up, just stay this simple

nc mc.ax 32526

Downloads

chall Dockerfile


C(OOO)RCPU

chop0 52 solves / 159 points

Can you find a logic flaw in this 3-issue, 5-execute, 1-retire RISC-V CPU?

nc mc.ax 31441

Downloads

cooorcpu.rar


C(OOOO)RCPU

chop0 14 solves / 290 points

Can you exploit a race condition in this 3-issue, 5-execute, 1-retire RISC-V CPU?

nc mc.ax 31442

Downloads

coooorcpu.rar


hop

clubby 29 solves / 205 points

Using 32 bits to encode a short jump is so wasteful... this will surely be betteršŸžšŸ¤“

nc mc.ax 32421

Downloads

hop.zip


boogie-woogie

pepsipu 9 solves / 347 points

i've been watching too much jjk img

due to super bruteforce, we are forced to add POW. this is why we can't have nice things

nc mc.ax 31040

Downloads

boogie-woogie Dockerfile hook.sh run.sh chroot.sh


dicediceotter

NotDeGhost 3 solves / 458 points

Escape the game.

ddg.mc.ax

Submit your URL: adminbot-ddg.mc.ax

Downloads

dicedicegoose.tar.gz solana_prog.so


240301_vishwactf

240308_pearlctf

web

learn_HTTP

web http easy begula

I made a simple web application to teach you guys how HTTP responses work, I hope you enjoy :)


steps_to_success

web php wasm medium begula

A journey only brave can travel.


misc

Circuits

medium n0tsane

My electronics engineer friend is working on some secret project.

However, he deleted the documents containing the circuit designs by mistake and needs to recover them from a set of suitably modified source files. Could you help him in this?

Wrap the flag in pearl{}.


TooRandom

medium kannaya

Looks like they are random, aren't they?


b4by_jail

easy e4stw1nd

Just a baby jail. Nothing special!


i_2_1

medium Masrt

after 4 years of college, I finally got to learn complex analysis. I also took PDE that semester ĀÆ(惄)/ĀÆ


jail_time

medium e4stw1nd

You just need to escape the jail. How hard can that be?


forensic

pcap_busterz_1

packet-analysis easy Pr0meth3u5

I have intercepted a pcap file on the dark web between unknown agents. Help me decrypt it and find out what they're upto!!


pcap_busterz_2

medium drago steg

This time you ran across their activities in an illegal game server using a suspicious protocol, analyze the pcap and get the flag!!


beautiful_song

audio easy begula

I hate frequencies which are multiple of 50, they ruin the song.


WiFi_broken

easy e4stw1nd

I suspect my former friend is upto something wrong. I tried to access his network but for that, I need the password to his wifi. Enclose the password in pearl{} when you find it.


SoundScape

forensics medium Pr0meth3u5 steg

I requested my friend who was just at the beach to send me some photos of the ocean. Instead, he handed me audio files and stated that this was the image. Please find the image for me and in return, I'll give you the flag.


Excel_Mayhem

easy kannaya

This excel sheet is troubling me a lot !! help me find the flag . Enclose the flag in pearl{}


osint

lost_letter

kannaya easy

Now that you've discovered the letter, it falls upon you to ensure its safe journey to its intended destination. Enclose city name and state name in lower case alphabets seperated with underscore in pearl{}


blockchain

Heist

medium SRPG

A notorious hacker group known as ā€œThe Cipher Syndicateā€ has stolen sensitive data and hidden it within a smart contract on the Ethereum blockchain. The stolen information is crucial for a covert operation, and your team has been tasked with retrieving it. Your mission is to crack the safe (smart contract) and extract the concealed data. The smart contract address where the data is stored is 0xE2f01984b5B70d4b1Dae98e060f4eA4D96824120.


Transaction_Hash

SRPG easy

Welcome to Mumbai, the city of crime and chaos. You are a hacker who wants to infiltrate the network of a notorious gang leader, Franklin Clinton. He has deployed a smart contract on a layer-two (L2) scaling platform for the Ethereum blockchain that contains some information about his associates, such as Markus and Trevor Philips. The contract address is 0x9562029A39BF4E0F1e2811a97f0962B70E97e7c8. You need to interact with the contract and decode the output.

Get to this contract address to get the hash value.


crypto

3_spies

4darsh easy

The Government intercepted three spies named Rivest, Shamir, Adleman.The content of these messages could be vital for national security,Decrypt their comms!!


Babys_Message_Out

easy s4ych33se!

"Baby's first steps are important, so I increased the number of primes"


Bit_War

binary cyb3rpunk_b4ddi3

linear feedback shift of bits ?


Moments_in_The_Making

realworld a gopher hard

It's March but its raining like June... anyway, you just found this cool interface

ps: these peeps start their comms with a Good Morning


Rick_Roll

easy SRPG

I hope you know your crypto basics.


Security++

easy n0tsane

More keys = More security. Prove me wrong!


syntelestis

equations Masrt hard

naughtyb0y: This is impossible if you haven't realised.

masrt: It's just equation solving, how hard can it be?


three_letter_acronyms

coding theory medium masrt

I've been delving into Matrix Product Codes and found a novel way to hide intriguing "stuff". Care to uncover the mystery?

Note: flag is lowercase and add underscores between words Example: if you found the words "BIG SUMMER BLOWOUT", then flag is pearl{big_summer_blowout}


game

Baers_Important_Invention

xbox hard masrt

Games are wonderful, aren't they? Here's the first build copy of W.o.W (not World of Warcraft), hope you are able to uncover the secrets. Install any libraries if required~

made with ā™” by Team Orange


Guesso

medium Al13n

My friend is consistently engrossed in reading Google News, and lately, he has been incessantly discussing the concept of dimensionsā€”specifically, a staggering 300 of them. He fervently insists that words can be represented as vectors, a notion that seems perplexing at best. In the midst of his enthusiasm, he has even developed a game centered around guessing words. Can you solve his game?


reverse

Help_Me

medium naughtyb0y

This doesn't make sense at all, How is this file even getting executed? Oh you got something useful? Now keep searching more. Remember the journey matters more than the destination


Notty_Vault_Machine

hard naughtyb0y

Some C + assembly + some Java and you get a super secure vault made Just-In-Time before the CTF.


byteme

python bytecode medium TheAlpha

I know you are a python expert, but can you reverse this?


flensing

reversing docker easy TheAlpha

Process this whale to get floating gold


input_validator

easy v1per

Can you find the correct input?


not_so_easy

rev medium v1per

Reversing a binary is pretty easy innit? But what if there are 200 of them?


rusty_proxy

rev rust hard begula

I developed a proxy for my organisation in rust to complicate things, can you test it's complication?


pwn

Adventure

easy Naughtyb0y

Let us go on a quest for adventure and thrill!


God_of_War

hard v1per

Ares, the God of war has sent his champion to destroy Athens. Destroy his champion with your own heroes and save the city!


Going_Back

easy s4yCh33se

Somedays, I just want to return......


The_Machinist

medium Al13n

Step into the prestigious world of culinary excellence where only the elite prevail. Your culinary prowess is renowned, but now, a challenge awaits that will truly test your skills. Can you create a masterpiece sauce worthy of an elite chef?


babyheap

pwn naughtyb0y easy

Just a normal note taking app...


flag_finder

medium Naughtyb0y

I am wondering can you find the needle in the haystack (Not with your eyes but just binary)???


passphrase

medium v1per

My friend created this security check for a file he didn't want me to see. I need a passphrase to unlock it. I tried everything but it seems impossible. Can you help me get the file?


240316_dubhectf

web

Javolution

A modern java challenge prepared for u ! Bypass it and achieve RCE !


Tagebuch

Ich habe eine Tagebuch-Website von jemand anderem kopiert, wie kƶnnte das ein Problem sein?


Wecat

ę²”ęœ‰äŗŗęÆ”ęˆ‘ę›“ä¼šē½‘聊ļ¼

PoWč„šęœ¬åÆå‚č€ƒļ¼š

https://github.com/KingBridgeSS/ctf-pow-for-docker-compose/blob/main/client.py


misc

Ezswap

Swap is a kind of magical magic, and I am deeply impressed.


authenticated_mess_and_unauthenticated_less

How can things go wrong when using a proxy server?


ezPythonCheckin

å†œåŽ†ę–°å¹“åŽēš„ē¬¬äø€äøŖXCTFē­¾åˆ°


solog

Do you know xlog? I also wrote a solog, but it seems that I forgot to delete some test codeā€¦

ä½ ēŸ„道 xlog 吗ļ¼Ÿęˆ‘也写äŗ†äø€äøŖ sologļ¼Œä½†ę˜Æęˆ‘å„½åƒåæ˜č®°åˆ ęŽ‰äø€äŗ›ęµ‹čƕ代ē äŗ†ć€‚怂怂


crypto

MDH

none


Sign_in

å—Æę²”é”™ čæ˜ę˜ÆCommon Prime RSA


Simple_and_simple

ēœŸę˜Æē®€ē®€åˆå•å•å•Šļ¼Œä½ ä»¬ęœ‰åščæ‡čæ™ę ·ē®€å•ēš„题吗ļ¼Ÿ


ezcrc

just a ezcrc :)


reverse

Destination

äŗŗę­»åŽä¼šåŽ»å‘ä½•ę–¹ļ¼Ÿ


Moon

ā€¦ęœˆč€…ļ¼Œäŗŗä¹‹é­‚ä¹Ÿć€‚ 众äŗ‘ęœˆä¹‹ē¾Žć€‚ ē„¶ę—¶čæ‡å¢ƒčæļ¼Œę±å¤č§†ä¹‹ļ¼Œå…¶é¢å‡ ä½•å“‰ļ¼Ÿ åæƒä¹‹ę‰€å±žļ¼Œé­‚ä¹‹ę‰€å½’ļ¼Œēš†å°½ē “ē¢Žå››ę•£ć€‚ ē»ˆē„‰ä¹‹åˆ»ļ¼Œå¾ē­‰ēš†åŒ–čŗ«äøŗ꜈ļ¼Œę˜Æ仄äøå Ŗ凔čŗÆä¹Ÿć€‚


VMT

Do you know what VMT is? Can you find the strings?


babySTL

A baby Problem


cvm

none


ezVK

A simple vk program


fffffragment

none


pwn

BuggyAllocator

Tiny allocator for memory allocation and remote code execution.


CacheHack

Hack the Cache


DayDream

none


ToySMM

UEFI SMM U know? : )


cvm

A simple VM

Note: This challenge is completely different from reverse-cvm


ggbond

Who am I?


240629_uiuctf

Web

Log Action

431 Passengers 105 Solves Author: Minh

I keep trying to log in, but it's not working :'(

http://log-action.challenge.uiuc.tf/


Fare Evasion

370 Passengers 173 Solves Author: Louis

SIGPwny Transit Authority needs your fares, but the system is acting a tad odd. We'll let you sign your tickets this time!

https://fare-evasion.chal.uiuc.tf/


pwnypass

495 Passengers 9 Solves Author: arxenix

We're working on a cool password manager extension for SIGPwny members. Can you break it?

ncat --ssl pwnypass-bot.chal.uiuc.tf 1337


pwnypass 2

498 Passengers 3 Solves Author: arxenix

This is the second flag for pwnypass.

ncat --ssl pwnypass-bot.chal.uiuc.tf 1337


misc

Picoify (100-500)

-1 Passengers 10 Solves Author: Richard

This is a PIC16 coding challenge. Note: the flag format is <sha256>.<number>.

This challenge is scored differently from other challenges. Competitors receive a score based on their ranking compared to others in a compression contest. See README in attached zip for more information.

ncat --ssl picoify.chal.uiuc.tf 1337


Astea

470 Passengers 52 Solves Author: Cameron

I heard you can get sent to jail for refusing a cup of tea in England.

ncat --ssl astea.chal.uiuc.tf 1337


Slot Machine

453 Passengers 76 Solves Author: Jake

We have onboard entertainment! Try your luck on our newly installed slot machine.

ncat --ssl slot-machine.chal.uiuc.tf 1337


Push and Pickle

468 Passengers 55 Solves Author: Cameron

I love how there are so many different types of pickles. I tried experimenting with two of them.

ncat --ssl push-and-pickle.chal.uiuc.tf 1337


osint

The Weakest Link

393 Passengers 149 Solves Author: Emma

LISA and the secret business partner have a secret Spotify collaboration planned together. Unfortunately, neither of them have the opsec to keep it private. See if you can figure out what it is!

This is part three of a three-part OSINT suite including Hip With the Youth, An Unlikely Partnership, and The Weakest Link. I recommend starting with the other two challenges!


An Unlikely Partnership

100 Passengers 511 Solves Author: Emma

It appears that the Long Island Subway Authority (LISA) has made a strategic business partnership with a surprise influencer! See if you can figure out who.

This is part two of a three-part OSINT suite including Hip With the Youth, An Unlikely Partnership, and The Weakest Link. This challenge is possible without Hip With the Youth but will be easier if you start there.


Hip With the Youth

81 Passengers 567 Solves Author: Emma

The Long Island Subway Authority (LISA), in an attempt to appeal to the younger generations, has begun experimenting with social media! See if you can find a way to a flag through their Instagram.

This is part one of a three-part OSINT suite including Hip With the Youth, An Unlikely Partnership, and The Weakest Link. I recommend starting here!


Night

121 Passengers 466 Solves Author: CBCicada

That was quite a pretty night view, can you find where I took it? Flag format: uiuctf{street name, city name} Example: uiuctf{East Green Street, Champaign}

Some words are blurred out to make the challenge harder, hopefully.

Flag format clarification: Use the full type, e.g. Avenue, Street, Road, etc., and include a space between the comma and city name.


New Dallas

466 Passengers 57 Solves Author: CBCicada

Super wide roads with trains... Is this the new Dallas? Flag format: uiuctf{coordinates of intersection between the rail and the road} Example: uiuctf{41.847, -87.626}

Flag format clarification: Use three decimal points of precision, truncate, and do not round. Use Google Maps location for reference. The last digit of the first cooordinate is odd, and the last digit of the second coordinate is even.


Chunky Boi

319 Passengers 225 Solves Author: CBCicada, Emma

Now that's a BIG plane! I wonder where it is. Flag format: uiuctf{plane type, coordinates of the aircraft} Example: uiuctf{Airbus A380-800, 40.036, -88.264}

For coordinates, just omit the digits, do not round up. Precision is the same as the one in the example. The aircraft name is the same as Wikipedia page title. You can extract enough information from this image to answer this. You DO NOT need to register any accounts, all the information is public.

Flag format clarification: The last digit of the first coordinate is even, and the last digit of the second coordinate is odd.


crypto

Groups

431 Passengers 105 Solves Author: Nikhil

My friend told me that cryptography is unbreakable if moduli are Carmichael numbers instead of primes. I decided to use this CTF to test out this theory.

ncat --ssl groups.chal.uiuc.tf 1337


Key in a Haystack

461 Passengers 65 Solves Author: Husnain

I encrpyted the flag, but I lost my key in an annoyingly large haystack. Can you help me find it and decrypt the flag?

ncat --ssl key-in-a-haystack.chal.uiuc.tf 1337


Snore Signatures

416 Passengers 122 Solves Author: Richard

These signatures are a bore!

ncat --ssl snore-signatures.chal.uiuc.tf 1337


Without a Trace

246 Passengers 298 Solves Author: Anakin

Gone with the wind, can you find my flag?

ncat --ssl without-a-trace.chal.uiuc.tf 1337


Determined

322 Passengers 222 Solves Author: Anakin

"It is my experience that proofs involving matrices can be shortened by 50% if one throws the matrices out."

Emil Artin ncat --ssl determined.chal.uiuc.tf 1337


X Marked the Spot

93 Passengers 531 Solves Author: Anakin

A perfect first challenge for beginners. Who said pirates can't ride trains...


Naptime

363 Passengers 180 Solves Author: Anakin

I'm pretty tired. Don't leak my flag while I'm asleep.


reverse

Time Travel

496 Passengers 7 Solves Author: 32121

I used multithreading to check your flag so much slower that it almost feels like time travel.


Pwnymaps

483 Passengers 30 Solves Author: spicypete

My friend gave me his address, but the coords he gave are n dimensional... Can you help me setup my GPS to find him?

Once you pass all checks, you need to plot all the x, y points in order as a line plot in order to reveal the flag. The flag consists of three valid words seperated by underscores, wrapped in the flag format, and all lowercase.


Summarize

381 Passengers 161 Solves Author: Nikhil

All you have to do is find six numbers. How hard can that be?


tooooo fancy šŸ˜

497 Passengers 6 Solves Author: spicypete

I really hope this challenge TiCkLes your fancy! It is my most cursed challenge yet.


Goose Chase

440 Passengers 93 Solves Author: ronanboyarski

The threat group GREGARIOUS GOOSE has hacked into SIGPwny servers and stolen one of our flags! Can you use the evidence to recover the flag?

WARNING: This challenge contains malware that may read images on your hard disk. Ensure that you do not have anything sensitive present.


Lost Canary

482 Passengers 32 Solves Author: spicypete

Damn, I lost my canary at one of the train stations. Can you help me find it?

ncat --ssl lost-canary.chal.uiuc.tf 1337

This is a rev/pwn challenge, not just rev.


Wild Goose Chase

494 Passengers 12 Solves Author: ronanboyarski

The threat group GREGARIOUS GOOSE has hacked into SIGPwny servers and stolen one of our flags! Can you use the evidence to recover the flag? Now with 100% more goose.

WARNING: This challenge contains malware that may read images on your hard disk. Ensure that you do not have anything sensitive present.


pwn

Rusty Pointers

480 Passengers 36 Solves Author: Surg

The government banned C and C++ in federal software, so we had to rewrite our train schedule management program in Rust. Thanks Joe Biden. Because of government compliance, the program is completely memory safe.

ncat --ssl rustyptrs.chal.uiuc.tf 1337


Syscalls

398 Passengers 143 Solves Author: Nikhil

You can't escape this fortress of security.

ncat --ssl syscalls.chal.uiuc.tf 1337


Syscalls 2

496 Passengers 8 Solves Author: YiFei Zhu

I made it harder ;)

Hint: It's not a bug, it's a feature!

socat file:$(tty),raw,echo=0 openssl:syscalls-2.chal.uiuc.tf:1337


Backup Power

454 Passengers 75 Solves Author: Pete, Julie

Can you turn on the backup generator for the SIGPwny Transit Authority?

ncat --ssl backup-power.chal.uiuc.tf 1337


pwnymalloc

461 Passengers 65 Solves Author: Akhil

i'm tired of hearing all your complaints. pwnymalloc never complains.

ncat --ssl pwnymalloc.chal.uiuc.tf 1337


240705_DownUnderCTF

web

co2

A group of students who don't like to do things the "conventional" way decided to come up with a CyberSecurity Blog post. You've been hired to perform an in-depth whitebox test on their web application. äø€ē¾¤äøå–œę¬¢ē”Ø "ä¼ ē»Ÿ "ę–¹å¼åšäŗ‹ēš„å­¦ē”Ÿå†³å®šę’°å†™äø€ēƇē½‘ē»œå®‰å…Øåšå®¢ę–‡ē« ć€‚你受雇åƹ他们ēš„ē½‘ē»œåŗ”ē”Øē؋åŗčæ›č”Œę·±å…„ēš„ē™½ē›’굋čÆ•ć€‚

Author: n00b.master. ä½œč€…ļ¼šn00b.master.


co2v2

Well the last time they made a big mistake with the flag endpoint, now we don't even have it anymore. It's time for a second pentest for some new functionality they have been working on. äøŠę¬”他们åœØꗗåøœē«Æē‚¹äøŠēŠÆäŗ†å¤§é”™ļ¼ŒēŽ°åœØęˆ‘ä»¬ē”šč‡³čæžę——åøœē«Æē‚¹éƒ½ę²”꜉äŗ†ć€‚ ēŽ°åœØę˜Æåƹ他们äø€ē›“åœØ开发ēš„äø€äŗ›ę–°åŠŸčƒ½čæ›č”Œē¬¬äŗŒę¬”äŗ”é”¹ęµ‹čƕēš„ę—¶å€™äŗ†ć€‚

Author: n00b.master. ä½œč€…ļ¼šn00b.master.


i am confusion

The evil hex bug has taken over our administrative interface of our application. It seems that the secret we used to protect our authentication was very easy to guess. We need to get it back! é‚Ŗꁶēš„å…­č§’å½¢ bug å·²ē»å ę®äŗ†ęˆ‘们åŗ”ē”Øē؋åŗēš„ē®”ē†ē•Œé¢ć€‚ēœ‹ę„ļ¼Œęˆ‘们ē”Øę„äæęŠ¤čŗ«ä»½éŖŒčƁēš„ē§˜åÆ†å¾ˆå®¹ę˜“č¢«ēŒœåˆ°ć€‚ęˆ‘ä»¬éœ€č¦ęŠŠå®ƒę‰¾å›žę„ļ¼

Author: richighimi ä½œč€…ļ¼š richighimi

https://i-am-confusion.2024.ductf.dev:30001


sniffy

Visit our sanctuary to hear the sounds of the Kookaburras! å‚č§‚ęˆ‘ä»¬ēš„äæęŠ¤åŒŗļ¼Œč†å¬ Kookaburras ēš„声音ļ¼

Author: hashkitten ä½œč€…ļ¼šå“ˆåøŒå°ēŒ«

https://web-sniffy-d9920bbcf9df.2024.ductf.dev


hah got em

Deez nutz

Hah got em

...

Oh by the way I love using my new microservice parsing these arrest reports to PDF é”ŗä¾æčÆ“äø€å„ļ¼Œęˆ‘å¾ˆå–œę¬¢ē”Øꈑēš„ę–°å¾®ęœåŠ”将čæ™äŗ›é€®ę•ęŠ„å‘Šč§£ęžęˆ PDF ę ¼å¼

The evil bot (2024) é‚Ŗꁶęœŗå™Øäŗŗļ¼ˆ2024ļ¼‰

Author: ghostccamm ä½œč€…: ghostccamm

https://web-hah-got-em-20ac16c4b909.2024.ductf.dev


waifu

The big bad bot got a bit lonely after a hard day of work and made a Web Artificial Intelligence Firewall Utiliy (WAIFU) to talk with and block hacking attempts. č¾›č‹¦å·„ä½œäŗ†äø€å¤©ēš„å¤§åč›‹ęœŗå™Øäŗŗ꜉ē‚¹åƂåƞļ¼ŒäŗŽę˜Æ制作äŗ†äø€äøŖē½‘ē»œäŗŗå·„ę™ŗčƒ½é˜²ē«å¢™å·„具包ļ¼ˆWAIFUļ¼‰ę„äøŽé»‘客åƹčÆå¹¶é˜»ę­¢é»‘å®¢ēš„å…„ä¾µä¼å›¾ć€‚

Can you bypass the bot's WAIFU? ä½ čƒ½ē»•čæ‡ęœŗå™Øäŗŗēš„ WAIFU 吗ļ¼Ÿ

Important Note é‡č¦čÆ“ę˜Ž

Use 127.0.0.1 (not localhost) instead of container names (the ports the services are listening on are the same). ä½æē”Ø 127.0.0.1 ļ¼ˆč€Œäøę˜Æ localhostļ¼‰ä»£ę›æ容å™Ø名ē§°ļ¼ˆęœåŠ”ē›‘听ēš„ē«Æ口ē›ø同ļ¼‰ć€‚ Author: ghostccamm ä½œč€…: ghostccamm


Prisoner Processor

The bug had a microservice for conveting JSON to YAML to assist with processing prisoners it has captured. čÆ„é”™čÆÆ꜉äø€äøŖå¾®ęœåŠ”ļ¼Œē”ØäŗŽå°† JSON č½¬ę¢äøŗ YAMLļ¼Œä»„协助处ē†ę•čŽ·ēš„囚ēŠÆ怂

Can you try to find a way to hack this microservice so we can get an initial foothold into the bug's prison system? ä½ čƒ½ęƒ³åŠžę³•é»‘čæ›čæ™äøŖå¾®ęœåŠ”å—ļ¼Ÿčæ™ę ·ęˆ‘ä»¬å°±čƒ½åœØč™«å­ēš„ē›‘ē‹±ē³»ē»Ÿäø­ę‰¾åˆ°ęœ€åˆēš„ē«‹č¶³ē‚¹ć€‚

Author: ghostccamm ä½œč€…: ghostccamm


240921_patriotCTF

misc

Emoji Stack

Easy å®¹ę˜“ Welcome to Emoji Stack, the brand new stack based emoji language! Instead of other stack based turing machines that use difficult to read and challenging characters like + - and [], Emoji Stack uses our proprietary patent pending emoji system. ę¬¢čæŽä½æē”Ø Emoji Stackļ¼Œčæ™ę˜Æäø€ē§å…Øꖰēš„åŸŗäŗŽå †ę ˆēš„č”Øꃅē¬¦å·čÆ­č؀ļ¼Emoji Stack ä½æē”Øęˆ‘ä»¬äø“ęœ‰ēš„ę­£åœØē”³čÆ·äø“利ēš„č”Øꃅē¬¦å·ē³»ē»Ÿļ¼Œč€Œäøę˜Æ其他åŸŗäŗŽå †ę ˆēš„图ēµęœŗä½æē”Ø难仄阅čÆ»äø”å…·ęœ‰ęŒ‘ęˆ˜ę€§ēš„å­—ē¬¦ļ¼ˆå¦‚ + - 和 [ļ¼‰ć€‚

The details of our implentation is below: ęˆ‘ä»¬å®žę–½ēš„čƦē»†äæ”ęÆ如äø‹ļ¼š

šŸ‘‰: Move the stack pointer one cell to the right šŸ‘‰ ļ¼šå°†å †ę ˆęŒ‡é’ˆå‘右ē§»åŠØäø€äøŖå•å…ƒę ¼ šŸ‘ˆ: Move the stack pointer one cell to the lef šŸ‘ˆ ļ¼šå°†å †ę ˆęŒ‡é’ˆå‘ lef ē§»åŠØäø€äøŖå•å…ƒę ¼ šŸ‘: Increment the current cell by one, bounded by 255 šŸ‘ ļ¼šå°†å½“å‰å•å…ƒę ¼é€’å¢ž 1ļ¼Œä»„ 255 äøŗē•Œ šŸ‘Ž: Decrement the current cell by one, bounded by 0 šŸ‘Ž ļ¼šå°†å½“å‰å•å…ƒę ¼å‡ 1ļ¼Œä»„ 0 äøŗē•Œ šŸ’¬: Print the ASCII value of the current cell šŸ’¬ ļ¼šę‰“å°å½“å‰å•å…ƒę ¼ēš„ ASCII 值 šŸ”##: Repeat the previous instruction 0x## times šŸ” ##ļ¼šé‡å¤å‰é¢ēš„ęŒ‡ä»¤ 0x## ꬔ The Emoji Stack is 256 cells long, with each cell supporting a value between 0 - 255. č”Øꃅē¬¦å·å †ę ˆé•æåŗ¦äøŗ 256 äøŖå•å…ƒę ¼ļ¼ŒęƏäøŖå•å…ƒę ¼ę”Æꌁ 0 - 255 之闓ēš„å€¼ć€‚

As an example, the program "šŸ‘šŸ”47šŸ’¬šŸ‘‰šŸ‘šŸ”68šŸ’¬šŸ‘‰šŸ‘šŸ”20šŸ’¬" Would output "Hi!" with the following execution flow: 例如ļ¼Œē؋åŗ ā€œšŸ‘šŸ”47šŸ’¬šŸ‘‰šŸ‘šŸ”68šŸ’¬šŸ‘‰šŸ‘šŸ”20šŸ’¬ā€ å°†č¾“å‡ŗ ā€œHiļ¼ā€ļ¼Œę‰§č”Œęµē؋如äø‹ļ¼š

[0, 0, 0, 0] šŸ‘šŸ”47

[0x48, 0, 0, 0] šŸ’¬šŸ‘‰: H

[0x48, 0, 0, 0] šŸ‘šŸ”68

[0x48, 0x69, 0, 0] šŸ’¬šŸ‘‰: i

[0x48, 0x69, 0, 0] šŸ‘šŸ”20

[0x48, 0x69, 0x21, 0] šŸ’¬: !

Flag format: CACI{.} ꠇåæ—ę ¼å¼ļ¼šCACI{.}

Author: CACI ä½œč€…ļ¼š CACI


Making Baking Pancakes

Easy å®¹ę˜“ How many layers are on your pancakes? ä½ ēš„ē…Žé„¼äøŠęœ‰å¤šå°‘层ļ¼Ÿ

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰

nc chal.pctf.competitivecyber.club 9001


RTL Warm up

Beginner åˆå­¦č€… Let's Warm up. Spartan's wanted to create their own ASIC, to secure doors. One of the spy was able to extract the simulation file, can you find the password to the door? č®©ęˆ‘ä»¬ēƒ­čŗ«äø€äø‹ć€‚Spartan's åøŒęœ›åˆ›å»ŗč‡Ŗå·±ēš„ ASICļ¼Œä»„äæęŠ¤é—Øēš„安å…Øć€‚å…¶äø­äø€åé—“č°čƒ½å¤Ÿęå–ä»æēœŸę–‡ä»¶ļ¼Œä½ čƒ½ę‰¾åˆ°é—Ø口ēš„åƆē å—ļ¼Ÿ

Note: The spaces are _ ę³Øꄏļ¼šē©ŗę ¼äøŗ _

Author: Databuoy ä½œč€…ļ¼š Databuoy


Really Only Echo

Easy å®¹ę˜“ Hey, I have made a terminal that only uses echo, can you find the flag? å˜æļ¼Œęˆ‘做äŗ†äø€äøŖåŖē”Ø echo ēš„ē»ˆē«Æļ¼Œä½ čƒ½ę‰¾åˆ° flag 吗ļ¼Ÿ

Author: Ryan Wong (shadowbringer007) ä½œč€…ļ¼š Ryan Wong ļ¼ˆshadowbringer007ļ¼‰

nc chal.competitivecyber.club 3333


Emoji Stack V2

Medium äø­ē­‰ Back by popular demand, V2 of EmojiStack is ready to release! Following user feedback, we've made some changes to how things work: åŗ”å¤§ä¼—éœ€ę±‚ļ¼ŒEmojiStack V2 已准备儽发åøƒļ¼ę ¹ę®ē”Øęˆ·åé¦ˆļ¼Œęˆ‘们åƹčæä½œę–¹å¼čæ›č”Œäŗ†äø€äŗ›ę›“ę”¹ļ¼š

It was pointed out that EmojiStack wasn't actually turing complete, and was instead just "A really dumb markup language." To remedy this, we've added three new commands for execution control, please see details below. Sticking with our philosophy of readability, we figured that hex numbers are too complicated and have decided to switch to easily read emoji representations. Numbers will now be encoded in base 12 from šŸ•› to šŸ•š. Example: šŸ”5f --> šŸ”šŸ•›šŸ•–šŸ•š For our second release, it only seemed fair to add a second stack dimension! Emoji Stack now supports a 255x255 grid of cells. With the addition of two dimensional stacks, a good idea fairy said it might be cool to represent stack states using images. The state of the stack is now saved as a 255x255 8 bit grey scale image to allow for the pre-initialization of the stack. Images are stored raster-scan order with 0,0 being the top left of the image. ꜉äŗŗꌇå‡ŗļ¼ŒEmojiStack 实际äøŠå¹¶äøę˜Æ图ēµå®Œå¤‡ēš„ļ¼Œč€ŒåŖę˜Æā€œäø€ē§éžåøøę„šč ¢ēš„ꠇ记čÆ­č؀ā€ć€‚äøŗäŗ†č§£å†³čæ™äøŖ问题ļ¼Œęˆ‘ä»¬ę·»åŠ äŗ†äø‰äøŖē”ØäŗŽę‰§č”ŒęŽ§åˆ¶ēš„ę–°å‘½ä»¤ļ¼ŒčƷ参阅äø‹é¢ēš„čƦē»†äæ”ęÆć€‚åšęŒęˆ‘ä»¬ēš„åÆčÆ»ę€§ē†åæµļ¼Œęˆ‘们认äøŗ十六čæ›åˆ¶ę•°å­—å¤Ŗå¤ę‚äŗ†ļ¼Œå› ę­¤å†³å®šę”¹ē”ØꘓäŗŽé˜…čÆ»ēš„č”Øꃅē¬¦å·č”Øē¤ŗć€‚ę•°å­—ēŽ°åœØ将仄 12 čæ›åˆ¶ē¼–ē ļ¼Œä»Ž šŸ•› 到 šŸ•š 怂ē¤ŗ例ļ¼ššŸ”5f --> šŸ”šŸ•›šŸ•–šŸ•š åƹäŗŽęˆ‘们ēš„ē¬¬äŗŒäøŖē‰ˆęœ¬ļ¼Œę·»åŠ ē¬¬äŗŒäøŖå †ę ˆē»“åŗ¦ä¼¼ä¹Žę˜Æ公平ēš„ļ¼Emoji Stack ēŽ°åœØę”Æꌁ 255x255 ēš„å•å…ƒę ¼ē½‘ę ¼ć€‚éšē€äŗŒē»“å †ę ˆēš„ę·»åŠ ļ¼Œäø€äøŖ儽äø»ę„ Fairy čÆ“ä½æē”Ø图像č”Øē¤ŗå †ę ˆēŠ¶ę€åÆčƒ½ä¼šå¾ˆé…·ć€‚å †ę ˆēš„ēŠ¶ę€ēŽ°åœØäæå­˜äøŗ 255x255 8 位ē°åŗ¦å›¾åƒļ¼Œä»„允č®øå †ę ˆēš„é¢„åˆå§‹åŒ–ć€‚å›¾åƒęŒ‰å…‰ę …ę‰«ęé”ŗåŗå­˜å‚Øļ¼Œ0,0 ę˜Æ图像ēš„å·¦äøŠč§’怂

Commands 命令

šŸ‘‰: Move the stack pointer one cell to the right šŸ‘‰ ļ¼šå°†å †ę ˆęŒ‡é’ˆå‘右ē§»åŠØäø€äøŖå•å…ƒę ¼ šŸ‘ˆ: Move the stack pointer one cell to the left šŸ‘ˆ ļ¼šå°†å †ę ˆęŒ‡é’ˆå‘å·¦ē§»åŠØäø€äøŖå•å…ƒę ¼ šŸ‘†: Move the stack pointer one cell upwards šŸ‘† ļ¼šå°†å †ę ˆęŒ‡é’ˆå‘äøŠē§»åŠØäø€äøŖå•å…ƒę ¼ šŸ‘‡: Move the stack pointer one cell downwards šŸ‘‡ ļ¼šå°†å †ę ˆęŒ‡é’ˆå‘äø‹ē§»åŠØäø€äøŖå•å…ƒę ¼ šŸ‘: Increment the current cell by one, bounded by 255 šŸ‘ ļ¼šå°†å½“å‰å•å…ƒę ¼é€’å¢ž 1ļ¼Œä»„ 255 äøŗē•Œ šŸ‘Ž: Decrement the current cell by one, bounded by 0 šŸ‘Ž ļ¼šå°†å½“å‰å•å…ƒę ¼å‡ 1ļ¼Œä»„ 0 äøŗē•Œ šŸ’¬: Print the ASCII value of the current cell šŸ’¬ ļ¼šę‰“å°å½“å‰å•å…ƒę ¼ēš„ ASCII 值 šŸ‘‚: Read one character of ASCII and store it in the current cell šŸ‘‚ ļ¼ščƻ取 ASCII ēš„äø€äøŖ字ē¬¦å¹¶å°†å…¶å­˜å‚ØåœØå½“å‰å•å…ƒę ¼äø­ šŸ«ø: If the current cell is zero, jump to the next instruction after the respective šŸ«· šŸ«ø ļ¼šå¦‚ęžœå½“å‰å•å…ƒę ¼äøŗ零ļ¼Œåˆ™č·³č½¬åˆ°ē›øåŗ” šŸ«· šŸ«·: If the current cell is non-zero, jump back to the respective šŸ«ø šŸ«· ļ¼šå¦‚ęžœå½“å‰å•å…ƒę ¼äøŗ非零ļ¼Œåˆ™č·³å›žē›øåŗ”ēš„ šŸ«ø šŸ”###: Repeat the previous instruction ## times šŸ” ###ļ¼š 重复前面ēš„ęŒ‡ä»¤ ## ꬔ Flag format: CACI{.} ꠇåæ—ę ¼å¼ļ¼šCACI{.}

Author: CACI ä½œč€…ļ¼š CACI


RTL Easy

Easy å®¹ę˜“ They said they added a layer of encryption, do you think you can still get in? 他们čƓ他们增加äŗ†äø€å±‚加åƆļ¼Œä½ č§‰å¾—ä½ čæ˜čƒ½čæ›åŽ»å—ļ¼Ÿ

Author: Databuoy ä½œč€…ļ¼š Databuoy


Let's Play [steg]Hide & Seek

Medium äø­ē­‰ Not much of a backstory here... there is an embedded flag in here somewhere, your job is to find it. čæ™é‡Œę²”꜉å¤Ŗ多ēš„čƒŒę™Æꕅäŗ‹......čæ™é‡Œēš„ęŸäøŖåœ°ę–¹ęœ‰äø€äøŖåµŒå…„å¼ę ‡åæ—ļ¼Œä½ ēš„å·„作ę˜Æę‰¾åˆ°å®ƒć€‚

Author: David Morgan (r0m) ä½œč€…ļ¼š David Morgan ļ¼ˆr0mļ¼‰


Make It Rain

Medium äø­ē­‰ We built secure vault to store our secret flag but somehow got the blueprint of the vault leaked.Can you help us to retrieve the secret flag from the vault? ęˆ‘ä»¬ęž„å»ŗäŗ†å®‰å…Øēš„äæé™©åŗ“ę„存å‚Øęˆ‘ä»¬ēš„ē§˜åÆ†ę ‡åæ—ļ¼Œä½†äøēŸ„ä½•ę•…ļ¼Œäæé™©åŗ“ēš„č“å›¾ę³„éœ²äŗ†ć€‚ę‚Øčƒ½åø®ęˆ‘们从äæé™©åŗ“äø­ę£€ē“¢ secret ꠇåæ—吗ļ¼Ÿ

Author: _jungbahadurrana ä½œč€…ļ¼š _jungbahadurrana


Green Eggs and Ham

Medium äø­ē­‰ A disgruntled timekeeper here at Bell Labs recently exfiltrated some data from our network. The crappy network down there might have caused enough errors to make it useless... right? č“å°”å®žéŖŒå®¤ ļ¼ˆBell Labsļ¼‰ ēš„äø€ä½åæƒę€€äøę»”ēš„č®”ę—¶å‘˜ęœ€čæ‘ä»Žęˆ‘ä»¬ēš„ē½‘ē»œäø­ę³„露äŗ†äø€äŗ›ę•°ę®ć€‚那里ēš„č¹©č„šē½‘ē»œåÆčƒ½å·²ē»é€ ęˆäŗ†č¶³å¤Ÿå¤šēš„é”™čÆÆļ¼Œä½æ其ęÆ«ę— ē”Ø处......右ļ¼Ÿ

Author: Shiloh Smiles (arcticx) ä½œč€…ļ¼š Shiloh Smiles ļ¼ˆarcticxļ¼‰


crypto

idk cipher

Beginner åˆå­¦č€… I spent a couple of hours with ???; now I am the world's best cryptographer!!! note: the flag contents will just random chars-- not english/leetspeak ęˆ‘čŠ±äŗ†å‡ äøŖå°ę—¶å’Œ???åœØäø€čµ·;ēŽ°åœØꈑę˜Æäø–ē•ŒäøŠęœ€å„½ēš„åƆē å­¦å®¶!!ę³Øꄏļ¼šę ‡åæ—内容将åŖę˜Æ随ęœŗ字ē¬¦ - 而äøę˜Æ English/LeetSpeak

Cipher Text: QRVWUFdWEUpdXEVGCF8DVEoYEEIBBlEAE0dQAURFD1I= åÆ†ę–‡ļ¼š QRVWUFdWEUpdXEVGCF8DVEoYEEIBBlEAE0dQAURFD1I=

Please wrap the flag with pctf{}. čÆ·ē”Ø pctf{} å°†ę ‡åæ—ę‹¬čµ·ę„怂

Author: sans909 ä½œč€…ļ¼š sans909


Bigger is Better

Beginner åˆå­¦č€… I heard choosing a small value for e when creating an RSA key pair is a bad idea. So I switched it up! ęˆ‘å¬čÆ“åœØ创å»ŗ RSA åƆ钄åÆ¹ę—¶äøŗ e é€‰ę‹©č¾ƒå°ēš„值ę˜Æäø€äøŖ坏äø»ę„ć€‚ę‰€ä»„ęˆ‘ęŠŠå®ƒę¢äŗ†ļ¼

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰


One for you, one for me

Medium äø­ē­‰ You love to order the same flag every day, but I want a flag as well. How about this, I'll split it with you. I'll take half the bits at random and flip them, keeping them all to myself! No worries, you still have half <3 ę‚Øå–œę¬¢ęÆå¤©č®¢č“­åŒäø€é¢ę——åøœļ¼Œä½†ęˆ‘ä¹Ÿęƒ³č¦äø€é¢ę——åøœć€‚čæ™äøŖę€Žä¹ˆę ·ļ¼Œęˆ‘č·Ÿä½ å¹³åˆ†ć€‚ęˆ‘ä¼šéšęœŗę‹æå‡ŗäø€åŠēš„ęƔē‰¹ļ¼Œē„¶åŽēæ»č½¬å®ƒä»¬ļ¼ŒęŠŠå®ƒä»¬éƒ½ē•™ē»™č‡Ŗå·±ļ¼äøē”Øꋅåæƒļ¼Œä½ čæ˜ęœ‰äø€åŠēš„ <3

Author: Samantha Hayden (shayden1337) ä½œč€…ļ¼š Samantha Hayden ļ¼ˆshayden1337ļ¼‰


High Roller

Medium äø­ē­‰ We recieved word that a criminal APT had developed their own method for generating secure asymmetric encryption keys. We were able to intercept emails between the group including encrypted comms, and a 7zip file. All we managed to find in the 7zip file they sent out was their public key, and the key generator. Can you decrypt the comms? ęˆ‘ä»¬ę”¶åˆ°ę¶ˆęÆļ¼Œäø€äøŖēŠÆē½Ŗēš„ APT å·²ē»å¼€å‘äŗ†č‡Ŗå·±ēš„ę–¹ę³•ę„ē”Ÿęˆå®‰å…Øēš„非åƹē§°åŠ åƆåÆ†é’„ć€‚ęˆ‘ä»¬čƒ½å¤Ÿę‹¦ęˆŖčÆ„ē»„之闓ēš„ē”µå­é‚®ä»¶ļ¼ŒåŒ…ę‹¬åŠ åƆ通äæ”和 7zip ę–‡ä»¶ć€‚ęˆ‘ä»¬åœØ他们发送ēš„ 7zip ꖇ件äø­č®¾ę³•ę‰¾åˆ°ēš„åŖę˜Æ他们ēš„公钄和åƆ钄ē”Ÿęˆå™Øć€‚ä½ čƒ½č§£åƆ通äæ”吗ļ¼Ÿ

pycryptodome v3.20.0

Flag format: CACI{} ꠇåæ—ę ¼å¼ļ¼šCACI{}

Author: CACI ä½œč€…ļ¼š CACI


Bit by Bit

Easy å®¹ę˜“ I heard one-time pads are unbreakable. ęˆ‘å¬čÆ“äø€ę¬”ę€§åž«å­ę˜Æē‰¢äøåÆē “ēš„怂

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰


Protected Console

Hard ē”¬ Unfortunately, some bad actor got into our last secure channel. This time we've come up with better implementation. Can you access the secured secure console? äøå¹øēš„ę˜Æļ¼Œäø€äŗ›äøč‰Æč”Œäøŗ者čæ›å…„äŗ†ęˆ‘们ēš„ęœ€åŽäø€äøŖ安å…Ø通道怂čæ™äø€ę¬”ļ¼Œęˆ‘ä»¬ęå‡ŗäŗ†ę›“儽ēš„实ēŽ°ć€‚ę‚Øčƒ½å¦č®æ问安å…ØęŽ§åˆ¶å°ļ¼Ÿ

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰


Textbook Schnorr rightļ¼Ÿļ¼Ÿ

Expert äø“家 Forge your way through cryptographic deception and impersonate with precision in this challenge! 通čæ‡åŠ åƆę¬ŗéŖ—é—Æå‡ŗäø€ę”č·Æļ¼Œå¹¶åœØꭤꌑꈘäø­ē²¾ē”®å†’å……ļ¼

Author: c15c01337 ä½œč€…ļ¼š c15c01337

nc chal.competitivecyber.club 6003


Melting Tux

medium äø­ē­‰ We found this image that was partially encrypted. We were able to recover the script used to encrypt it, but it was partially encrypted too. We have given you the image and the intelligible part of the script. Please decrypt the image. Note: Forensic evidence indicates that the image was created on August 26th, 2024 at 21:43:20 UTC. ęˆ‘ä»¬å‘ēŽ°äŗ†čæ™å¼ éƒØ分加åƆēš„图ē‰‡ć€‚ęˆ‘ä»¬čƒ½å¤Ÿę¢å¤ē”ØäŗŽåŠ åƆ它ēš„č„šęœ¬ļ¼Œä½†å®ƒä¹Ÿč¢«éƒØ分加åƆäŗ†ć€‚ęˆ‘ä»¬å·²ē»äøŗę‚Øęä¾›äŗ†č„šęœ¬ēš„图像和åÆē†č§£ēš„éƒØåˆ†ć€‚čÆ·č§£åÆ†å›¾åƒć€‚ę³Øꄏļ¼šę³•åŒ»čÆę®č”Ø꘎ļ¼ŒčƄ图像创å»ŗäŗŽ 2024 幓 8 ꜈ 26 ę—„ 21ļ¼š43ļ¼š20 UTC怂

Author: James Crowley (zephyrone3956) ä½œč€…ļ¼š James Crowley ļ¼ˆzephyrone3956ļ¼‰


Scrambler V2

Medium äø­ē­‰ I got sick of people breaking our encryption, so I came up with this custom scrambler program. You have a 0% chance of cracking this one! I even encoded the log! ęˆ‘åŽŒå€¦äŗ†äŗŗ们ē “č§£ęˆ‘ä»¬ēš„加åƆļ¼Œę‰€ä»„ęˆ‘ęƒ³å‡ŗäŗ†čæ™äøŖč‡Ŗ定义ēš„ scrambler ē؋åŗć€‚ä½ ęœ‰ 0% ēš„ęœŗ会ē “č§£čæ™äøŖļ¼ęˆ‘ä»€č‡³åÆ¹ę—„åæ—čæ›č”Œäŗ†ē¼–ē ļ¼

Author: salochi ä½œč€…ļ¼š salochi


forensics

Simple Exfiltration

Easy å®¹ę˜“ We've got some reports about information being sent out of our network. Can you figure out what message was sent out. ęˆ‘ä»¬ę”¶åˆ°äŗ†äø€äŗ›å…³äŗŽä»Žęˆ‘们ēš„ē½‘ē»œå‘送å‡ŗ去ēš„äæ”ęÆēš„ęŠ„å‘Šć€‚ę‚Øčƒ½å¼„ęø…ę„šå‘å‡ŗäŗ†ä»€ä¹ˆę¶ˆęÆ吗ļ¼Ÿ

Author: Ryan Wong (shadowbringer007) ä½œč€…ļ¼š Ryan Wong ļ¼ˆshadowbringer007ļ¼‰


Bad Blood

Easy å®¹ę˜“ Nothing is more dangerous than a bad guy that used to be a good guy. Something's going on... please talk with our incident response team. ę²”ęœ‰ä»€ä¹ˆęƔäø€äøŖę›¾ē»ę˜Æ儽äŗŗēš„坏äŗŗę›“å±é™©ēš„äŗ†ć€‚发ē”Ÿäŗ†ä»€ä¹ˆäŗ‹......čÆ·äøŽęˆ‘们ēš„äŗ‹ä»¶å“åŗ”å›¢é˜Ÿč”ē³»ć€‚

Author: elbee3779 ä½œč€…ļ¼š elbee3779

nc chal.competitivecyber.club 10001


Slingshot

Medium äø­ē­‰ We have recently suffered a data breach, and we need help figuring out if any data was stolen. Can you investigate this pcap file and see if there is any evidence of data exfiltration and if possible, what was stolen. ęˆ‘ä»¬ęœ€čæ‘遭受äŗ†äø€ę¬”ę•°ę®ę³„éœ²ļ¼Œęˆ‘ä»¬éœ€č¦åø®åŠ©ę„ē”®å®šę˜Æå¦ęœ‰ä»»ä½•ę•°ę®č¢«ē›—怂ę‚Øčƒ½å¦č°ƒęŸ„ę­¤ pcap ꖇ件ļ¼Œå¹¶ęŸ„ēœ‹ę˜Æå¦ęœ‰ä»»ä½•ę•°ę®ę³„éœ²ēš„čÆę®ļ¼Œå¦‚ęžœåÆčƒ½ļ¼ŒčÆ·ęŸ„ēœ‹č¢«ē›—å†…å®¹ć€‚

Author: AJ Hoepfner (greatvaluerice) ä½œč€…ļ¼š AJ Hoepfner ļ¼ˆgreatvaluericeļ¼‰


Structured Annuity

Hard ē”¬ These J.G. Wentworth ads are getting out of hand! Now we're evem getting reports that they're using malware to try and get people cash for their structured settlements! Luckily, we were able to capture some network traffic of this c2 beacon, along with the binary and a memory capture of the running process. Unfortunately, it seems like the c2 agent contains no static keys and instead generates them at run time. Can you decrypt their comms? čæ™äŗ› J.G. Wentworth ēš„å¹æå‘Šę­£åœØå¤±ęŽ§ļ¼ēŽ°åœØęˆ‘ä»¬ę”¶åˆ°ęŠ„å‘Šļ¼Œä»–ä»¬ę­£åœØä½æē”Øę¶ę„č½Æ件čÆ•å›¾č®©äŗŗ们äøŗ他们ēš„ē»“ęž„åŒ–ē»“ē®—čŽ·å–ēŽ°é‡‘ļ¼å¹øčæēš„ę˜Æļ¼Œęˆ‘ä»¬čƒ½å¤Ÿę•čŽ·ę­¤ c2 äæ”ꠇēš„äø€äŗ›ē½‘ē»œęµé‡ļ¼Œä»„åŠę­£åœØčæč”Œēš„čæ›ē؋ēš„äŗŒčæ›åˆ¶ę–‡ä»¶å’Œå†…å­˜ę•čŽ·ć€‚é—ę†¾ēš„ę˜Æļ¼Œc2 代ē†ä¼¼ä¹ŽäøåŒ…å«é™ę€åƆ钄ļ¼Œč€Œę˜ÆåœØčæč”Œę—¶ē”Ÿęˆå®ƒä»¬ć€‚ä½ čƒ½č§£åƆ他们ēš„通äæ”吗ļ¼Ÿ

Author: Matthew Johnson (meatball5201) ä½œč€…ļ¼š Matthew Johnson ļ¼ˆmeatball5201ļ¼‰


A Dire Situation

Easy å®¹ę˜“ I really need help with my budget. Let's see if there's anything you can do with my current situation! ꈑēœŸēš„éœ€č¦é¢„ē®—ę–¹é¢ēš„åø®åŠ©ć€‚č®©ęˆ‘ä»¬ēœ‹ēœ‹ä½ ę˜Æ否åÆ仄åÆ¹ęˆ‘ē›®å‰ēš„ęƒ…å†µåšäŗ›ä»€ä¹ˆļ¼

Author: Shiloh Smiles (arcticx) ä½œč€…ļ¼š Shiloh Smiles ļ¼ˆarcticxļ¼‰


Suspicious Drive

Hard ē”¬ An overseas branch of our company was almost hit by an attack from a well-known ransomeware group, but it seemed their final payload failed. We found a suspicious drive on premises, as well as a common string in our logs: PCTF{d)zn+d$+zqbb!t+h)!#+if+y)u+zi!l}. Can you help us figure out what this payload might have been? ęˆ‘ä»¬å…¬åøēš„ęµ·å¤–åˆ†å…¬åøå‡ ä¹Žé­åˆ°ę„č‡ŖēŸ„名勒ē“¢č½Æ件ē»„ē»‡ēš„ę”»å‡»ļ¼Œä½†ä»–们ēš„ęœ€ē»ˆęœ‰ę•ˆč½½č·ä¼¼ä¹Žå¤±č“„äŗ†ć€‚ęˆ‘ä»¬åœØęœ¬åœ°å‘ēŽ°äŗ†äø€äøŖåÆē–‘ēš„驱åŠØå™Øļ¼Œå¹¶åœØęˆ‘ä»¬ēš„ę—„åæ—äø­å‘ēŽ°äŗ†äø€äøŖåøø见ēš„å­—ē¬¦äø²ļ¼š PCTF{d)zn+d$+zqbb!t+h)!#+if+y)u+zi!l} 怂ę‚Øčƒ½åø®ęˆ‘们弄ęø…ę„ščæ™äøŖęœ‰ę•ˆč½½č·åÆčƒ½ę˜Æ什么吗ļ¼Ÿ

Author: Shiloh Smiles (arcticx) ä½œč€…ļ¼š Shiloh Smiles ļ¼ˆarcticxļ¼‰


Secret Note

Medium äø­ē­‰ I was told to never write down my passwords on a sticky note, so instead I wrote them down on my computer! ęˆ‘č¢«å‘ŠēŸ„ę°øčæœäøč¦ęŠŠåƆē å†™åœØä¾æåˆ©č““äøŠļ¼Œę‰€ä»„ꈑꊊåƆē å†™åœØäŗ†ē”µč„‘äøŠļ¼

Author: Txnner ä½œč€…ļ¼š Txnner


Abnormal Maybe Illegal

Medium äø­ē­‰ We have recently discovered tons of traffic leaving our network. We have reason to believe they are using an abnormal method. Can you figure out what data they are exfiltrating? ęˆ‘ä»¬ęœ€čæ‘发ēŽ°ęœ‰å¤§é‡ęµé‡ē¦»å¼€ęˆ‘们ēš„ē½‘ē»œć€‚ęˆ‘ä»¬ęœ‰ē†ē”±ē›øäæ”他们ä½æē”Øēš„ę˜Æäøę­£åøøēš„ę–¹ę³•ć€‚ę‚Øčƒ½å¼„ęø…ę„šä»–ä»¬ę³„éœ²äŗ†å“Ŗäŗ›ę•°ę®å—ļ¼Ÿ

Author: Ryan Wong (ShadowBringer) ä½œč€…ļ¼šRyan Wong ļ¼ˆShadowBringerļ¼‰


web

giraffe notes

Easy I bet you can't access my notes on giraffes! ęˆ‘ę•¢ę‰“čµŒä½ ę— ę³•č®æé—®ęˆ‘å…³äŗŽé•æ颈é¹æēš„ē¬”č®°ļ¼

http://chal.competitivecyber.club:8081

Flag format: CACI

Author: CACI


Impersonate

Medium One may not be the one they claim to be. äø€äøŖäŗŗåÆčƒ½äøę˜Æ他们声ē§°ēš„é‚£äøŖäŗŗ怂

http://chal.competitivecyber.club:9999/

Author: _jungbahadurrana


Open Seasame

Easy Does the CLI listen to magic? CLI ę˜Æ否ē›‘听 magicļ¼Ÿ

http://chal.competitivecyber.club:13336

Flag format: CACI{.*}

Author: CACI


DOMDOM

Medium äø­ē­‰ I love face-book and I love to share my photos with my friends. ęˆ‘å–œę¬¢ face-bookļ¼Œęˆ‘å–œę¬¢äøŽęœ‹å‹åˆ†äŗ«ęˆ‘ēš„ē…§ē‰‡ć€‚

http://chal.competitivecyber.club:9090

Author: Kiran Ghimire (sau_12) ä½œč€…ļ¼š Kiran Ghimire ļ¼ˆsau_12ļ¼‰


KIRAN SAU PROBLEM

Expert äø“家 Kiran Ghimire feigned ignorance and said he had no idea what the flag was. Kiran Ghimire å‡č£…äøēŸ„道čæ™é¢ę——åøœę˜Æä»€ä¹ˆć€‚

http://chal.competitivecyber.club:8090

Author: Kiran Ghimire (sau_12) ä½œč€…ļ¼š Kiran Ghimire ļ¼ˆsau_12ļ¼‰


dogdays

Medium äø­ē­‰ Woof woof 呜

http://chal.competitivecyber.club:7777

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰


blob

Medium äø­ē­‰ blob says: blob blob čÆ“ļ¼š blob

http://chal.competitivecyber.club:3000

Flag format: CACI{.} ꠇåæ—ę ¼å¼ļ¼šCACI{.}

Author: CACI ä½œč€…ļ¼š CACI


Secret Door

Medium äø­ē­‰ knock knock... 咚......

http://chal.competitivecyber.club:1337

Author: sans909 ä½œč€…ļ¼š sans909


BDog nom

Medium äø­ē­‰ nom nom nom nom ļ¼ˆäøē®”ļ¼‰

http://chal.competitivecyber.club:3002/

Author: sans909 ä½œč€…ļ¼š sans909


pwn

Not So Shrimple Is It

Beginner åˆå­¦č€… Peel back the shell, unless you eat shrimp with the shell. å‰„ęŽ‰å£³ļ¼Œé™¤éžä½ åƒåø¦å£³ēš„č™¾ć€‚

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰

nc chal.competitivecyber.club 8884


Navigator

Easy å®¹ę˜“ Welcome to navigator! You can change stuff, view stuff and THAT'S IT. ę¬¢čæŽę„到 navigatorļ¼ä½ åÆä»„ę”¹å˜äøœč„æļ¼ŒęŸ„ēœ‹äøœč„æļ¼Œå°±ę˜Æčæ™ę ·ć€‚

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰

nc chal.competitivecyber.club 8887


Shellcrunch

Easy å®¹ę˜“ I hope you're good at shellcoding... ꈑåøŒęœ›ä½ ę“…é•æ shellcoding...

Author: Danyaal (draz0x7) ä½œč€…ļ¼š Danyaal ļ¼ˆdraz0x7ļ¼‰

nc chal.competitivecyber.club 3004


Strings Only

Good luck doing something with just strings. I even got rid of the tcache because I heard that makes things easy. ē„ä½ å„½čæļ¼ŒåŖē”Øē“弦做äø€äŗ›äŗ‹ęƒ…ć€‚ęˆ‘ä»€č‡³åŽ»ęŽ‰äŗ† tcacheļ¼Œå› äøŗęˆ‘å¬čÆ“čæ™č®©äŗ‹ęƒ…变得ē®€å•ć€‚

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰

nc chal.competitivecyber.club 3004


Flight Script

Medium äø­ē­‰ Easy flights just got easier. Add your own logs and scripts to our flight console, now leakless! č½»ę¾ēš„é£žč”Œå˜å¾—ę›“åŠ č½»ę¾ć€‚å°†ę‚Øč‡Ŗå·±ēš„ę—„åæ—å’Œč„šęœ¬ę·»åŠ åˆ°ęˆ‘ä»¬ēš„é£žč”ŒęŽ§åˆ¶å°ļ¼ŒēŽ°åœØę— ę³„ę¼ļ¼

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰

nc chal.competitivecyber.club 8885


sanitizer

Hard ē”¬ We made a project for our Intro to Networking class! I hope you use it to make the internet a more secure place :) ęˆ‘ä»¬äøŗęˆ‘ä»¬ēš„ē½‘ē»œå…„é—Øčƾē؋制作äŗ†äø€äøŖ锹ē›®ļ¼ęˆ‘åøŒęœ›ę‚Øä½æē”Øå®ƒę„ä½æäŗ’联ē½‘ęˆäøŗäø€äøŖę›“å®‰å…Øēš„åœ°ę–¹:)

Author: Shiloh Smiles (arcticx) and Dylan (elbee3779) ä½œč€…ļ¼šShiloh Smiles ļ¼ˆarcticxļ¼‰ 和 Dylan ļ¼ˆelbee3779ļ¼‰

nc chal.competitivecyber.club 5001


DirtyFetch

Expert äø“家 My kernel is your kernel. Well, some of it. Here's ioctl. ꈑēš„内ę øå°±ę˜Æä½ ēš„内ę ø怂å—Æļ¼Œå…¶äø­äø€éƒØåˆ†ć€‚čæ™ę˜Æ ioctl怂

Note: Only one connection per user. Compile off the box. ę³Øꄏļ¼šęƏäøŖē”ØꈷåŖčƒ½ęœ‰äø€äøŖčæžęŽ„ć€‚å¼€ē®±å³ē”Ø怂

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰

nc chal.competitivecyber.club 8886


babyxss

Expert äø“家 XSS is hard! Let's get some practice in with a javascript REPL first XSS 很难ļ¼č®©ęˆ‘们先ē»ƒä¹ äø€äø‹ javascript REPL

(flag is at /flag.txt, d8 is built off tag 11.9.99) ļ¼ˆę ‡åæ—位äŗŽ /flag.txtļ¼ŒD8 åŸŗäŗŽę ‡ē­¾ 11.9.99 Ꞅå»ŗļ¼‰

Author: cursedCTF ä½œč€…ļ¼š cursedCTF

nc chal.competitivecyber.club 8889


reverse

Password Protector

Easy å®¹ę˜“ We've been after a notorious skiddie who took the "Is it possible to have a completely secure computer system" question a little too literally. After he found out we were looking for them, they moved to live at the bottom of the ocean in a concrete box to hide from the law. Eventually, they'll have to come up for air...or get sick of living in their little watergapped world. They sent us this message and executable. Please get their password so we can be ready. ęˆ‘ä»¬äø€ē›“åœØčæ½åÆ»äø€äøŖč‡­åę˜­č‘—ēš„껑ēØ½č€…ļ¼Œä»–åƹā€œę˜Æå¦ęœ‰åÆčƒ½ę‹„ęœ‰äø€äøŖ完å…Ø安å…Øēš„č®”ē®—ęœŗē³»ē»Ÿā€ēš„é—®é¢˜ęœ‰ē‚¹čæ‡äŗŽå­—é¢åŒ–ć€‚åœØ他发ēŽ°ęˆ‘们åœØę‰¾ä»–ä»¬åŽļ¼Œä»–ä»¬ę¬åˆ°äŗ†ęµ·åŗ•ēš„ę··å‡åœŸē›’子里ē”Ÿę“»ļ¼Œä»„čŗ²éæę³•å¾‹ć€‚ęœ€ē»ˆļ¼Œä»–们得äøŠę„呼åøē©ŗ갔......ęˆ–č€…åŽŒå€¦äŗ†ē”Ÿę“»åœØ他们ēš„å°ę°“隙äø–ē•Œé‡Œć€‚ä»–ä»¬å‘ęˆ‘ä»¬å‘é€äŗ†ę­¤ę¶ˆęÆ和åÆę‰§č”Œę–‡ä»¶ć€‚čÆ·čŽ·å–ä»–ä»¬ēš„åƆē ļ¼Œä»„ä¾æęˆ‘ä»¬åšå„½å‡†å¤‡ć€‚

"Mwahahaha you will nOcmu{9gtufever crack into my passMmQg8G0eCXWi3MY9QfZ0NjCrXhzJEj50fumttU0ympword, i'll even give you the key and the executable:::: Zfo5ibyl6t7WYtr2voUEZ0nSAJeWMcN3Qe3/+MLXoKL/p59K3jgV" ā€œå“‡å“ˆå“ˆå“ˆå“ˆļ¼Œä½ ä¼šnOcmu{9gtufeverē “č§£ęˆ‘ēš„é€šč”ŒčƁMmQg8G0eCXWi3MY9QfZ0NjCrXhzJEj50fumttU0ympwordļ¼Œęˆ‘ē”šč‡³ä¼šē»™ä½ åƆ钄和åÆę‰§č”Œę–‡ä»¶ļ¼šļ¼šļ¼šļ¼š Zfo5ibyl6t7WYtr2voUEZ0nSAJeWMcN3Qe3/+MLXoKL/p59K3jgVā€

Author: zephyrone3956 ä½œč€…ļ¼š zephyrone3956


Revioli, Revioli, give me the formeoli

Easy å®¹ę˜“ Can you unlock the secret formula? ä½ čƒ½č§£å¼€ē§˜åÆ†é…ę–¹å—ļ¼Ÿ

Author: Shiloh Smiles (arcticx) ä½œč€…ļ¼š Shiloh Smiles ļ¼ˆarcticxļ¼‰


Puzzle Room

Easy å®¹ę˜“ As you delve deeper into the tomb in search of answers, you stumble upon a puzzle room, its floor entirely covered in pressure plates. The warnings of the great necromancer, who hid his treasure here, suggest that one wrong step could lead to your doom. å½“ä½ ę·±å…„åŸå¢“åÆ»ę‰¾ē­”ę”ˆę—¶ļ¼Œä½ å¶ē„¶å‘ēŽ°äŗ†äø€äøŖč°œé¢˜å®¤ļ¼Œå®ƒēš„地ęæ完å…Øč¢«åŽ‹åŠ›ęæ覆ē›–ć€‚å°†å®č—č—åœØčæ™é‡Œēš„ä¼Ÿå¤§ę­»ēµę³•åøˆēš„č­¦å‘Šč”Ø꘎ļ¼Œäø€ę­„错čÆÆå°±åÆčƒ½åÆ¼č‡“ä½ ēš„厄čæć€‚

You enter from the center of the eastern wall. Although you suspect youā€™re missing a crucial clue to guide your steps, youā€™re confident that everything you need to safely navigate the traps is already within reach. ę‚Ø从äøœå¢™ēš„äø­åæƒčæ›å…„ć€‚å°½ē®”ę‚Øꀀē–‘č‡Ŗå·±ē¼ŗå°‘ęŒ‡åƼę‚Øę­„éŖ¤ēš„关键ēŗæē“¢ļ¼Œä½†ę‚Øē”®äæ”安å…Øē©æč¶Šé™·é˜±ę‰€éœ€ēš„äø€åˆ‡å·²ē»č§¦ę‰‹åÆåŠć€‚

At the center of the room lies the key to venturing further into the tomb, along with the promise of powerful treasures to aid you on your quest. Can you find the path, avoid the traps, and claim the treasure (flag) on the central platform? ęˆæé—“ēš„äø­å¤®ę˜Æčæ›äø€ę­„冒险čæ›å…„坟墓ēš„关键ļ¼Œä»„及å¼ŗ大ēš„å®č—ę„åø®åŠ©ę‚Øå®Œęˆä»»åŠ”ēš„ę‰æčÆŗć€‚ä½ čƒ½ę‰¾åˆ°č·Æ径ļ¼Œéæ开陷阱ļ¼Œå¹¶åœØäø­å¤®å¹³å°äøŠé¢†å–å®č—ļ¼ˆę——åøœļ¼‰å—ļ¼Ÿ

Author: Christopher Roberts (caffix) ä½œč€…ļ¼š Christopher Roberts ļ¼ˆcaffixļ¼‰


Packed Full Of Surprises

Easy å®¹ę˜“ I encrypted a file with a secret flag, but now I can't seem to figure out how to decrypt it, can you help? ꈑē”Øē§˜åÆ†ę ‡åæ—加åƆäŗ†äø€äøŖꖇ件ļ¼Œä½†ēŽ°åœØęˆ‘ä¼¼ä¹ŽäøēŸ„é“å¦‚ä½•č§£åƆ它ļ¼Œä½ čƒ½åø®åæ™å—ļ¼Ÿ

Author: Txnner ä½œč€…ļ¼š Txnner


Rust Lock

Medium äø­ē­‰ Find the flag hidden behind my password protected vault. Sounds easy... right? ę‰¾åˆ°éšč—åœØ受åƆē äæęŠ¤ēš„äæé™©åŗ“后面ēš„ę ‡åæ—ć€‚å¬čµ·ę„å¾ˆå®¹ę˜“......右ļ¼Ÿ

Author: Txnner ä½œč€…ļ¼š Txnner


VM-ception: Layers of the Lost Byte

Expert äø“家 Youā€™ve hacked into a mysterious system, only to find yourself inside a virtual machine, within another virtual machine, like stepping into a never-ending hall of mirrors. The first VM interprets the encrypted bytecode, but every instruction gets passed to a deeper layer. As you explore further, each action plunges you deeper into the abyss, where time and logic twist in ways you've never imagined. 你侵兄äŗ†äø€äøŖē„žē§˜ēš„ē³»ē»Ÿļ¼Œå“发ēŽ°č‡Ŗå·±åœØäø€äøŖ虚ꋟęœŗäø­ļ¼ŒåœØ另äø€äøŖ虚ꋟęœŗäø­ļ¼Œå°±åƒčøå…„äŗ†äø€äøŖę°øę— ę­¢å¢ƒēš„é•œå­å¤§åŽ…ć€‚ē¬¬äø€äøŖ VM č§£é‡ŠåŠ åƆēš„å­—čŠ‚ē ļ¼Œä½†ęÆę”ęŒ‡ä»¤éƒ½ä¼šä¼ é€’åˆ°ę›“ę·±ēš„å±‚ć€‚éšē€ä½ čæ›äø€ę­„ęŽ¢ē“¢ļ¼ŒęƏäø€äøŖåŠØä½œéƒ½ä¼šč®©ä½ ę›“ę·±åœ°é™·å…„ę·±ęøŠļ¼Œę—¶é—“å’Œé€»č¾‘ä»„ä½ ä»ŽęœŖęƒ³č±”čæ‡ēš„ę–¹å¼ę‰­ę›²ć€‚

Will you escape the infinite virtual prison or succumb to its endless loops? The only way out is through... all the layers. 你会逃ē¦»ę— é™ēš„č™šę‹Ÿē›‘ē‹±čæ˜ę˜Æå±ˆęœäŗŽå®ƒēš„ꗠ限å¾ŖēŽÆļ¼Ÿå”Æäø€ēš„å‡ŗč·Æę˜Æ通čæ‡......ę‰€ęœ‰å›¾å±‚ć€‚

Author: Christopher Roberts (caffix) ä½œč€…ļ¼š Christopher Roberts ļ¼ˆcaffixļ¼‰


Not another vm reversing problem

Medium äø­ē­‰ You find yourself locked out of a mysterious terminal in an underground lair thatā€™s rumored to hold the key to a treasure of unimaginable value: the flag. The terminal is powered by an ancient, quirky virtual machine that hasn't been updated since the days of dial-up internet. Your task is simple... on the surface. 你发ēŽ°č‡Ŗå·±č¢«é”åœØäø€äøŖ地äø‹å·¢ē©“ēš„ē„žē§˜ē»ˆē«Æ之外ļ¼Œę®čÆ“čæ™äøŖē»ˆē«ÆęŽŒę”ē€äø€ä»¶ä»·å€¼éš¾ä»„ęƒ³č±”ēš„å®č—ēš„é’„匙ļ¼šę——åøœć€‚čÆ„ē»ˆē«Æē”±äø€äøŖå¤č€ć€å¤ę€Ŗēš„č™šę‹Ÿęœŗęä¾›ę”Æꌁļ¼ŒčÆ„č™šę‹Ÿęœŗč‡Ŗę‹Ø号äŗ’联ē½‘ę—¶ä»£ä»„ę„å°±ę²”ęœ‰ę›“ę–°čæ‡ć€‚ä½ ēš„任劔很ē®€å•......åœØč”Ø面äøŠć€‚

This VM is no ordinary one. Itā€™s got an arcane stack-based architecture, four registers that feel like they've seen better days, and 16KB of memory thatā€™s probably still running on hopes and dreams. But hereā€™s the twist: the terminal was built by a paranoid genius who coded a secret messageā€”hidden deep within the memoryā€”wrapped in layers of logic more convoluted than the plot of a sci-fi novel. čæ™äøŖ VM äøę˜Æꙮ通ēš„ć€‚å®ƒęœ‰äø€äøŖē„žē§˜ēš„åŸŗäŗŽå †ę ˆēš„ꞶꞄļ¼Œå››äøŖę„Ÿč§‰ä»–ä»¬å·²ē»ēœ‹åˆ°äŗ†ę›“儽ēš„ę—„子ļ¼Œä»„及 16KB ēš„内存ļ¼ŒåÆčƒ½ä»åœØ依靠åøŒęœ›å’Œę¢¦ęƒ³čæč”Œć€‚ä½†č½¬ęŠ˜ē‚¹ę˜Æļ¼šē»ˆē«Æę˜Æē”±äø€äøŖåę‰§ēš„å¤©ę‰å»ŗ造ēš„ļ¼Œä»–ē¼–写äŗ†äø€ę”隐藏åœØč®°åæ†ę·±å¤„ēš„ē§˜åƆäæ”ęÆļ¼ŒåŒ…č£¹åœØęƔē§‘幻小čÆ“ēš„ęƒ…čŠ‚ę›“å¤ę‚ēš„é€»č¾‘å±‚äø­ć€‚

Author: Christopher Roberts (caffix) ä½œč€…ļ¼š Christopher Roberts ļ¼ˆcaffixļ¼‰


AI PRNG

Easy å®¹ę˜“ I heard those tech cool buzz words use matrices. Well my (very legit) PRNG also uses matricies, can I slap AI/ML/Deep Learning on it too???? Unless??? ęˆ‘å¬čÆ“é‚£äŗ›å¾ˆé…·ēš„ē§‘ęŠ€ęµč”Œčƍä½æē”ØēŸ©é˜µć€‚儽吧ļ¼Œęˆ‘ēš„ļ¼ˆéžåøøåˆę³•ēš„ļ¼‰PRNG 也ä½æē”Øäŗ† matriciesļ¼Œęˆ‘也åÆ仄åœØäøŠé¢ä½æē”Ø AI/ML/Deep Learning 吗????除非ļ¼Ÿļ¼Ÿļ¼Ÿ

Author: Veryyes ä½œč€…ļ¼š Veryyes


Full Of Bugs

Medium äø­ē­‰ De bugs are in me walls

Author: Txnner ä½œč€…ļ¼š Txnner


GO To Sleep

Hard ē”¬ My friend always sends me random messages before I go to sleep at night. He got tired of me asking what they meant, so he sent me the program used to make them. ꈑēš„ęœ‹å‹ę€»ę˜ÆåœØꈑꙚäøŠē”č§‰å‰éšęœŗē»™ęˆ‘发äæ”ęÆć€‚ä»–åŽŒå€¦äŗ†ęˆ‘问他们ę˜Æä»€ä¹ˆę„ę€ļ¼Œę‰€ä»„ä»–ęŠŠåˆ¶ä½œä»–ä»¬ēš„ē؋åŗå‘ē»™äŗ†ęˆ‘怂

Author: Txnner ä½œč€…ļ¼š Txnner


osint

On The Run

Easy å®¹ę˜“ We've been tracking the adversary for weeks, and he just slipped up and posted this gorgeous high-rise view on his Twitter. His caption was "awesome meeting with a gorgeous view!" Can you track down his location? ęˆ‘ä»¬å·²ē»čæ½čøŖäŗ†åÆ¹ę‰‹ę•°å‘Øļ¼Œä»–åŖę˜Æęŗœčµ°äŗ†ļ¼ŒåœØ他ēš„ Twitter äøŠå‘åøƒäŗ†čæ™å¼ åŽäø½ēš„高层å»ŗē­‘怂他ēš„ę ‡é¢˜ę˜Æā€œå¾ˆę£’ēš„ä¼šč®®ļ¼Œē¾Žäø½ēš„ę™Æč‰²ļ¼ä½ čƒ½čæ½čøŖ他ēš„位ē½®å—ļ¼Ÿ

Flag format will be PCTF{}. Not a street address. If he were in a WeWork space, it would be PCTF{wework}. ꠇåæ—ę ¼å¼å°†äøŗ PCTF{<å…¶ę‰€åœØ地ēš„商名>}怂äøę˜Æč”—é“åœ°å€ć€‚å¦‚ęžœä»–åœØ WeWork ē©ŗé—“ļ¼Œé‚£å°†ę˜Æ PCTF{wework}怂

Author: Shiloh Smiles (arcticx) ä½œč€…ļ¼š Shiloh Smiles ļ¼ˆarcticxļ¼‰


Give me four words, Vasily

Easy å®¹ę˜“ We have been tracking a highly suspicious submarine believed to be harboring many enemy skiddies. Unfortunately, this satellite image is rather out of date. Your mission is to locate the submarines there using a more up-to-date image, and tell us what class they are with their NATO reporting name - a letter from the NATO phonetic alphabet, spelled out. ęˆ‘ä»¬äø€ē›“åœØčæ½čøŖäø€č‰˜é«˜åŗ¦åÆē–‘ēš„ę½œč‰‡ļ¼Œę®äæ”čÆ„ę½œč‰‡č—åŒæäŗ†č®øå¤šę•Œę–¹é˜²ę»‘čˆ¹åŖ怂äøå¹øēš„ę˜Æļ¼Œčæ™å¼ å«ę˜Ÿå›¾åƒē›ø当čæ‡ę—¶ć€‚ä½ ēš„任劔ę˜Æä½æē”Øꛓꖰēš„图ē‰‡ę‰¾åˆ°é‚£é‡Œēš„ę½œč‰‡ļ¼Œå¹¶å‘ŠčÆ‰ęˆ‘ä»¬å®ƒä»¬å±žäŗŽå“ŖäøŖē­‰ēŗ§ļ¼Œå¹¶é™„äøŠå®ƒä»¬ēš„北ēŗ¦ęŠ„告名ē§° - äø€äøŖę„č‡Ŗ北ēŗ¦ę‹¼éŸ³å­—ęƍēš„å­—ęÆć€‚

We want to know precisely where the aft end of northernmost submarine attached to the pier is. Communicate its location in three words. Include the NATO reporting name of the class of submarine in your answer. ęˆ‘ä»¬ęƒ³ēŸ„道čæžęŽ„到ē å¤“ēš„ęœ€åŒ—ę½œč‰‡ēš„å°¾ē«Æēš„ē”®åˆ‡ä½ē½®ć€‚ē”Øäø‰äøŖčÆä¼ č¾¾å®ƒēš„位ē½®ć€‚åœØę‚Øēš„ē­”ę”ˆäø­åŒ…ę‹¬ę½œč‰‡ē±»åˆ«ēš„ NATO ęŠ„å‘Šåē§°ć€‚

Submission format: PCTF{three.position.words.class_name} Example submission: PCTF{employing.broken.imports.sierra} ꏐäŗ¤ę ¼å¼ļ¼šPCTF{three.position.words.class_name}ꏐäŗ¤ē¤ŗ例ļ¼šPCTF{employing.broken.imports.sierra}

Author: James Crowley (@zephyrone3956) ä½œč€…ļ¼š James Crowley ļ¼ˆ@zephyrone3956ļ¼‰


Phase One

Easy å®¹ę˜“ We had one of our agents infiltrate an adversary's lab and photograph a gateway device that can get us access to their network. We need to develop an exploit as soon as possible. Attached is a picture of the device. Get us intel on what MCU the device is utilizing so we can continue with our research. ęˆ‘ä»¬č®©äø€åē‰¹å·„ę½œå…„åÆ¹ę‰‹ēš„实éŖŒå®¤ļ¼Œå¹¶ę‹ę‘„äŗ†äø€äøŖē½‘å…³č®¾å¤‡ļ¼ŒčÆ„č®¾å¤‡åÆä»„č®©ęˆ‘ä»¬č®æ问他们ēš„ē½‘ē»œć€‚ęˆ‘ä»¬éœ€č¦å°½åæ«å¼€å‘äø€äøŖę¼ę“žåˆ©ē”Øē؋åŗć€‚附件ę˜Æč®¾å¤‡ēš„图ē‰‡ć€‚č®©ęˆ‘ä»¬äŗ†č§£čÆ„č®¾å¤‡ę­£åœØä½æē”Øēš„ MCUļ¼Œä»„ä¾æęˆ‘ä»¬ē»§ē»­ęˆ‘们ēš„ē ”ē©¶ć€‚

Flag format: pctf{mcu_vendor_name} (example: pctf{broadcom} ꠇåæ—ę ¼å¼ļ¼špctf{mcu_vendor_name}ļ¼ˆē¤ŗ例ļ¼špctf{broadcom}

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰


Night School

Easy å®¹ę˜“ It's said that a famous geocacher has left a cache on our Fairfax campus. He took this picture before disappearing into the night. Could you help us find where this picture was taken? ę®čÆ“äø€ä½č‘—名ēš„ geocacher åœØęˆ‘ä»¬ēš„č“¹å°”ę³•å…‹ę–Æę ”åŒŗē•™äø‹äŗ†äø€äøŖå®č—ć€‚ä»–åœØę¶ˆå¤±åœØå¤œč‰²äø­ä¹‹å‰ę‹äŗ†čæ™å¼ ē…§ē‰‡ć€‚ę‚Øčƒ½åø®ęˆ‘ä»¬ę‰¾åˆ°čæ™å¼ ē…§ē‰‡ēš„ę‹ę‘„åœ°ē‚¹å—ļ¼Ÿ

The flag is pctf{NAME_OF_STATUE} ꠇåæ—äøŗ pctf{NAME_OF_STATUE}

Author: Dylan (elbee3779) ä½œč€…ļ¼š Dylan ļ¼ˆelbee3779ļ¼‰


Porcelain Throne

Beginner åˆå­¦č€… This toilet gives you the best view in the at sunset, which city is this located in? Flag format will be PCTF{cityname} čæ™äøŖåŽ•ę‰€č®©ä½ åœØę—„č½ę—¶åˆ†ēœ‹åˆ°ęœ€å„½ēš„视野ļ¼Œå®ƒä½äŗŽå“ŖäøŖ城åø‚ļ¼Ÿę ‡åæ—ę ¼å¼å°†äøŗ PCTF{cityname}


Studious

Medium äø­ē­‰ How much was tuition in for GWU graduate per credit hour for the 1998-1999 school year? Flag will be amount with just a period, like PCTF{1050.75} if it were $1,050.75. 1998-1999 学幓 GWU ęƕäøšē”ŸęƏ学分ēš„å­¦č“¹ę˜Æ多少ļ¼ŸFlag 将ę˜ÆåŖ꜉äø€äøŖ叄ē‚¹ēš„金额ļ¼Œä¾‹å¦‚ PCTF{1050.75}ļ¼Œå¦‚ęžœå®ƒę˜Æ $1,050.75怂

NOTE: George Washington University, not George Mason University. ę³Øꄏļ¼šä¹”ę²»åŽē››é”æ大学ļ¼Œč€Œäøę˜Æä¹”ę²»ę¢…ę£®å¤§å­¦ć€‚


sixfeetunder

Easy å®¹ę˜“ There is an American military college that, famously, only has one person buried on its campus. What is the name of that person? Ignore any honorifics (such as Mr.), middle names, and spaces. ꜉äø€ę‰€ē¾Žå›½å†›äŗ‹å­¦é™¢ļ¼Œč‘—名ēš„ę˜Æļ¼Œå®ƒēš„ę ”园里åŖåŸ‹č‘¬äŗ†äø€äøŖäŗŗć€‚é‚£äøŖäŗŗ叫什么名字ļ¼Ÿåæ½ē•„ä»»ä½•ę•¬čÆ­ļ¼ˆå¦‚ Mr.ļ¼‰ć€äø­é—“名和ē©ŗę ¼ć€‚

for example, Mr. John A. Smith would be PCTF{johnsmith}. 例如ļ¼ŒJohn A. Smith 先ē”Ÿå°†ę˜Æ PCTF{johnsmith}怂

author: Shiloh / arcticx ä½œč€…ļ¼š Shiloh / arcticx


Dirty Laundry

Hard ē”¬ We have been tracking the leader of an international crime ring, who we believe is laundering money through his girlfriend's business. We believe he is fleeing the country under the guise of a vacation with her. All we have on her is the name "Adrianna" and some business receipts from a "Patriot Corporation LLC". Can you help us figure out where these two have gone off to? (note: there will be a real flag for this with "PCTF" and all.) ęˆ‘ä»¬äø€ē›“åœØčæ½čøŖäø€äøŖ国际ēŠÆē½Ŗ团伙ēš„夓ē›®ļ¼Œęˆ‘们认äøŗä»–ę­£åœØ通čæ‡ä»–å„³ęœ‹å‹ēš„ē”Ÿę„ę“—é’±ć€‚ęˆ‘ä»¬ē›øäæ”他ę˜Æ仄äøŽå„¹äø€čµ·åŗ¦å‡äøŗ幌子逃ē¦»čÆ„å›½ć€‚ęˆ‘ä»¬ę‰€ę‹„ęœ‰ēš„å…³äŗŽå„¹ēš„åŖę˜Æā€œAdriannaā€čæ™äøŖ名字和äø€äŗ›ę„č‡Ŗā€œPatriot Corporation LLCā€ēš„商äøšę”¶ę®ć€‚ę‚Øčƒ½åø®ęˆ‘们弄ęø…ę„ščæ™äø¤äøŖäŗŗēš„去向吗ļ¼Ÿļ¼ˆę³Øꄏļ¼šå°†ęœ‰äø€äøŖēœŸę­£ēš„ę ‡åæ—ļ¼Œå…¶äø­åŒ…含 ā€œPCTFā€ å’Œę‰€ęœ‰å†…å®¹ć€‚

Author: Shiloh Smiles {arcticx} ä½œč€…ļ¼š Shiloh Smiles {arcticx}


241108_bluehensUDCTF

crypto

Training Problem: Intro to RSA

In [9]: p = getPrime(128) In [10]: q = getPrime(128) In [11]: N = p*q In [12]: bytes_to_long(flag) < N Out[12]: True In [13]: print(pow(bytes_to_long(flag), 65537, N), N) 9015202564552492364962954854291908723653545972440223723318311631007329746475 51328431690246050000196200646927542588629192646276628974445855970986472407007


Nonogram Pt. 1: Simple Enough

nonogram When you get past the puzzle, you now face a classic encryption / old-school stego encoding. Wrap the text you find in UDCTF{TEXTHERE}. å½“ä½ č§£å†³äŗ†čæ™äøŖ难题后ļ¼Œä½ ēŽ°åœØ面äø“ēš„ę˜Æē»å…øēš„加åƆ/č€å¼ēš„隐写ē¼–ē ć€‚å°†ę‚ØåœØUDCTF{TEXTHERE}äø­ę‰¾åˆ°ēš„ę–‡ęœ¬ę¢č”Œć€‚

-Grace http://www.landofcrispy.com/nonogrammer/nonogram.html?mode=play&puzzle=17|15|1x4.1x4,1x2.1x2,1x2.1x2,1x2.1x2,1x2.1x2,1x2.1x8,1x2.1x2.1x4,1x2.1x2.1x2.1x2,1x2.1x2.1x2.1x2,1x6.1x2,1x2.1x2,1x2.1x2,1x2.1x2,1x2.1x2,1x2.1x2,1x2.1x3,1x9|1x1,1x8,1x9,1x1.1x2,1x1.1x1.1x1,1x12,1x12,1x1.1x1.1x1,1x1.1x1.1x2.1x1,1x9.1x1,1x8.1x1,1x1.1x2.1x2,1x2.1x3,1x9,1x6|x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x&palette=white.grey.X,black..&msg=df1b4ee23140ab89541134c295c4d696774c1ec8ddf6550353ef53096152657cc9e79a0300200931353c6e9aaa446c2f55684c39d4


ROTOLACTOR

guess school "Got Milk?"

-JayV


Hand-Made's Tale

guess school She drew this, in a language of her own invention as a puzzle for you. Pretend like you're cracking some knight's templar code in a Dan Brown novel or something. That last symbol is } and it's mirror is {. 儹ē”Ø儹č‡Ŗå·±å‘ę˜Žēš„čÆ­č؀ē”»äŗ†čæ™äøŖļ¼Œä½œäøŗē»™ä½ ēš„č°œé¢˜ć€‚å‡č£…ä½ ę­£åœØē “č§£äø¹Ā·åøƒęœ—小čÆ“ęˆ–å…¶ä»–ä½œå“äø­ēš„圣ę®æéŖ‘士åƆē ć€‚ęœ€åŽäø€äøŖē¬¦å·ę˜Æ} ļ¼Œå®ƒēš„镜像ę˜Æ{ 怂

Made by Lexy with ā¤ļø ē”± Lexy äøŽ ā¤ļø 制作

Note from ProfNinja: after playtesting I decide to photoshop in a very subtle hint, see if you can notice it... ProfNinja ēš„ę³Ø释ļ¼šåœØęøøęˆęµ‹čƕ之后ļ¼Œęˆ‘决定仄非åøø微妙ēš„ę–¹å¼čæ›č”Œ Photoshop 处ē†ļ¼Œēœ‹ēœ‹ę‚Øę˜Æå¦čƒ½ę³Øę„åˆ°å®ƒ......


Oh Baby, A (Pythagorean) Triple!

triangles I bet you never knew about the DNA of right triangles. Found it beautiful; wrote a problem. ęˆ‘ę•¢ę‰“čµŒä½ ä»Žę„äøēŸ„道ē›“角äø‰č§’å½¢ēš„ DNAć€‚å‘ēŽ°å®ƒå¾ˆę¼‚äŗ®ļ¼›å†™äŗ†äø€äøŖé—®é¢˜ć€‚

-ProfNinja https://gist.github.com/AndyNovo/747a027b87924e02202436668382630d


Corkscrew

old-school crypto
guess school

A simple little guessy crypto: Us_lnt10ns}1443{FTCDqsysp0srrr4up_t1 -ProfNinja


HMAC

Thereā€™s a secret message being HMAC-protected, but the implementation has a serious flaw. Can you recover the secret message using a side-channel attack? ꜉äø€ę”ē§˜åÆ†ę¶ˆęÆ受到 HMAC äæęŠ¤ļ¼Œä½†å…¶å®žēŽ°å­˜åœØäø„重ē¼ŗ陷怂ę‚ØåÆ仄ä½æē”Øꗁč·Æę”»å‡»ę¢å¤ē§˜åÆ†ę¶ˆęÆ吗ļ¼Ÿ

SRC: https://gist.github.com/AndyNovo/91e3c51ef47980d32ad1cde26b917ac4 -Tery nc 0.cloud.chals.io 11320


Barcode Crypto

These barcodes seem to be missing something, can you help me figure it out? čæ™äŗ›ę”å½¢ē ä¼¼ä¹Žē¼ŗ少äø€äŗ›äøœč„æļ¼Œä½ čƒ½åø®ęˆ‘ę‰¾å‡ŗę„å—ļ¼Ÿ

-AcerYeung


Simon Says

https://gist.github.com/AndyNovo/7c172b8c5bdfcdce6c66cd0bdae53584 -Lars


forensics

Whispers of the Feathered Messenger

In a world where secrets flutter through the air, the bluehen carries a hidden message. A message that has been salted.... however its still a message... maybe the bluehen ignores the salt. This image holds more than meets the eye. åœØäø€äøŖē§˜åƆåœØē©ŗ갔äø­é£˜ę‰¬ēš„äø–ē•Œé‡Œļ¼Œč“ęƍéø”ęŗåø¦ē€éšč—ēš„äæ”ęÆ怂äø€ę”已加ē›ēš„ę¶ˆęÆā€¦ā€¦ē„¶č€Œå®ƒä»ē„¶ę˜Æäø€ę”궈ęÆā€¦ā€¦ä¹Ÿč®ø蓝ęƍéø”åæ½ē•„äŗ†ē›ć€‚čæ™å¼ å›¾ē‰‡ę‰€č•“含ēš„ę„ä¹‰čæœäøę­¢č”Ø面äøŠę‰€ēœ‹åˆ°ēš„怂

shasum: e717eefe9b41212b017152756b0e640f9a4f3763 bird.jpeg


Inner Demons

guess school

I can't seem to sleep at night... Maybe I need to dig further within. ꈑꙚäøŠä¼¼ä¹Žę— ę³•å…„ē”ā€¦ā€¦ä¹Ÿč®øęˆ‘éœ€č¦čæ›äø€ę­„ꌖꎘ怂 -pleasework.sh


Giraffical Image Format

guess school

A student disagreed with my pronunciation of gif. They said, snarkily, how do you pronounced Graphical Image Format. This problem is my response. äø€åå­¦ē”ŸäøåŒę„ęˆ‘åƹ gif ēš„å‘éŸ³ć€‚ä»–ä»¬å°–åˆ»åœ°čÆ“ļ¼Œå›¾å½¢å›¾åƒę ¼å¼ę€Žä¹ˆå‘éŸ³ć€‚čæ™äøŖ问题ę˜Æꈑēš„回åŗ”怂


RGBinary

guess school

Some planes are flying, some planes are grounded. ꜉äŗ›é£žęœŗę­£åœØé£žč”Œļ¼Œęœ‰äŗ›é£žęœŗåˆ™åœé£žć€‚ (大写UDCTF{}) -AcerYeung


The Immortal Game

dig
guess school

THE IMMORTAL GAME CTF
    184.60.121.146:53
    make your move.

MAKE YOUR MOVE. č”ŒåŠØå§ć€‚ -riiyak - 里雅克 Based on playtesting: I'm prepared to give a clue if there are no solves after 18ish hours. åŸŗäŗŽęøøęˆęµ‹čƕļ¼šå¦‚ęžœ 18 å°ę—¶åŽä»ę²”ęœ‰č§£å†³é—®é¢˜ļ¼Œęˆ‘å‡†å¤‡ęä¾›ēŗæē“¢ć€‚ 184.60.121.146:53


reverse

Training Problem: Intro to Reverse

Just a classic flagchecker. åŖę˜Æäø€äøŖē»å…øēš„ę——åøœę£€ęŸ„å™Ø怂

-ProfNinja -åæč€…ę•™ęŽˆ

(Try using dogbolt.org)


šŸ…±ļørainrot.c

I would like to apologize for the crimes that have been committed upon humanity and the mental trauma that may ensue from the creation of this code. I take full responsibility for my actions and ask only for forgiveness as you struggle in pursuit of the flag. I have provided C source code and omitted the header that serves as the gen-z Rosetta Stone. I wish you all the best in successful completion of this problem. ęˆ‘ęƒ³äøŗåƹäŗŗē±»ēŠÆäø‹ēš„ē½Ŗč”Œä»„åŠå› åˆ¶å®šęœ¬å‡†åˆ™č€ŒåÆčƒ½é€ ęˆēš„ē²¾ē„žåˆ›ä¼¤č”Øē¤ŗꭉꄏ怂ꈑåƹč‡Ŗå·±ēš„č”Œäøŗę‰æꋅå…ØéƒØč“£ä»»ļ¼ŒåŖčÆ·ę±‚ä½ ä»¬åœØäŗ‰å–ę——åøœēš„čæ‡ē؋äø­å¾—åˆ°å®½ę•ć€‚ęˆ‘ęä¾›äŗ† C ęŗä»£ē ļ¼Œå¹¶ēœē•„äŗ†ē”Ø作 gen-z Rosetta Stone ēš„ę ‡å¤“怂ē„ę‚Øäø€åˆ‡é”ŗ利ļ¼Œé”ŗåˆ©å®Œęˆę­¤é—®é¢˜ć€‚

-AZR


Cut The Flag

https://spacegames3.itch.io/cut-the-flag pwd: bluehens

  • Inferno

Texting IRL

esolang How do you even open a WORD file? å¦‚ä½•ę‰“å¼€ WORD ꖇ件ļ¼Ÿ

-ProfNinja

P.S. I would love to see the most beautiful solutions, DM me if you're proud of your work. PS ęˆ‘å¾ˆęƒ³ēœ‹åˆ°ęœ€ę¼‚äŗ®ēš„č§£å†³ę–¹ę”ˆļ¼Œå¦‚ęžœę‚Øåƹč‡Ŗå·±ēš„å·„ä½œę„Ÿåˆ°č‡Ŗč±Ŗļ¼ŒčÆ·ē§äæ”ꈑ怂


Hogwarts Stairs

esolang If you lived in Hogwarts I bet navigating those moving stairs would feel something like this problem. å¦‚ęžœä½ ä½åœØéœę ¼ę²ƒčŒØļ¼Œęˆ‘ę•¢ę‰“čµŒļ¼ŒåœØ那äŗ›ē§»åŠØēš„ę„¼ę¢ÆäøŠč”Œčµ°ä¹Ÿä¼šęœ‰ē±»ä¼¼čæ™äøŖ问题ēš„ę„Ÿč§‰ć€‚

CONTRAINT/HINT: I picked the exit point to be exactly 1337 loops through the big loop. There are nonsense flags that will say correct without that. ēŗ¦ęŸ/ꏐē¤ŗļ¼šęˆ‘选ꋩēš„退å‡ŗē‚¹ę°å„½ę˜Æ大å¾ŖēŽÆēš„ 1337 äøŖå¾ŖēŽÆć€‚å¦‚ęžœę²”ęœ‰čæ™äŗ›ļ¼Œęœ‰äŗ›ę— ę„ä¹‰ēš„ę ‡åæ—也会čÆ“ę˜Æę­£ē”®ēš„怂 -ProfNinja

HTTP not HTTPS HTTP äøę˜Æ HTTPS

('i:5259w_Wn9J_IJD9_L63_q69M6e_bbDyKDJc6S4f', 1330)
('i:5259w_Wn9J_IJD9_L6F_q69M6e_bbDyKDJc6S4f', 1331)
('j:5259w_Wn9J_IJD9_L6F_q69M6e_bbDyKDJc6S4f', 1332)
('j:5259w_Wn9J_IJD9_L6F_q69M6e_bbDyKDJc6S4f', 1333)
('k:5259w_Wn9J_IJD9_L6F_q69M6e_bbDyKDJc6S4f', 1334)
('k:5259n_Wn9J_IJD9_L6F_q69M6e_bbDyKDJc6S4f', 1335)
('l:5259n_Wn9J_IJD9_L6F_q69M6e_bbDyKDJc6S4f', 1336)
('l:5259n_Wn9J_IJD9_L6F_g69M6e_bbDyKDJc6S4f', 1337)

http://yiap.nfshost.com/esoteric/novice/novice.html


G.G.

nes
guess school
Unlock the Power -Codemasters č§£é”åŠ›é‡ - Codemasters

Flag Format altered due to limited character set: UDCTF/UPPERCASE/ ē”±äŗŽå­—ē¬¦é›†ęœ‰é™č€Œę›“ę”¹ēš„ę ‡åæ—ę ¼å¼ļ¼š UDCTF/UPPERCASE/

(Our guest author is a top speedrunner: riiyak)


misc

Welcome Letter

Welcome to the CTF. A few notes:

* I made 10 XOR School problems, we're a uni so teaching will always be part of our CTFs.  These are made as an ode to the beauty of XOR.  

* Some Training problems in the main categories: Reverse, PWN, Web, and Crypto just for first-timers.  Google the problem title + "CTF Writeup" and you'll find similar problems out there that you can mimic I'm sure.

* In playtesting many of the problems were fun puzzles but I can imagine someone calling them "guessy", forgive us now.  I killed any that felt egregious and the others I've labelled as "guess school".  Behind that label is the idea that deductive reasoning within the meta of CTFing is actuallyy a muscle.  Many (very good) teams have a member that specializes in guessy problems.  I think that XOR and the guess school problems cultivate a sort of "escape room" sensibility that often is overlooked in CTF training as too frustrating.  I think it's valuable as a life skill but consider this a trigger warning, stay away from those ones if you tend to get frustrated.

* I tried to make sure the main categories have enough depth to chew on but not all of the main categories are equally as deep.  I think PWN and WEB are maybe a little lighter than perfection but we have a ton of challenges and 12 less hours, so your WEB anchor might need to go help someone else after day 1.

* We're a student club.  Every year students make problems.  They are fun and quirky but this year they made a TON of forensics and misc and problems that maybe crawl over several categories.  The heavy hitting teams might not love that but our deepest problems tend to get deeper and our n00b problems stay light, just the nature of undergrads.  Just have fun with it.

* We pride ourselves on customer service, jump in the discord and ask questions and I'll try to teach you stuff without lessening the competitive integrity of the competition.

* Some authors used udctf{} others used UDCTF{} so bear that in mind when validating your hypotheses.

* We have a long history of a minecraft category, this year we don't.  Sorry.  I miss it.  FSG lives on in ranked.

You're such a Rube

rubiks
šŸ’€
JD (jr.)


AlgebrarbeglA

78! - k = k - !87 Solve for k flag format is udctf{k} -ProfNinja Dedicated to Wrath of Math


Bees in Space

Imagine if the Bee Movie happened in space šŸ¤Æ... okay it probably wouldn't be that great because everyone would die or be wearing astronaut suits the whole time, but either way still cool to imagine!

-AcerYeung


Sticky Keys

guess school
GEJYU?<d0 go.5 Ekrpat 4bf,afZ+ -Malloc


An ode to Alejandro and Kristin

Do you like puzzles? -The Cyber Frat (We went nuts on speed jigsaws this summer)


Scottish Ham

You scream into the void, and it responds with this... ~skyefi
Hint1:Google is your friend! This goes for many CTF problems anyways, but definitely applies here.
If you got the fake flag, you are on the right track. Follow the advice of the text directly under it...


Polar Opposites

guess school
Thres somethin backwards bout this audio... (Wrap what you find in UDCTF{})
-SpiegelHalter


Font-inary

guess school
Have you ever struggled to read someone's handwriting? Well, whoever created this font didn't care, have fun!
-AcerYeung


XOR SCHOOL

XS1: XOR without XOR

2024-11-10-22-49-04 This is how XOR makes me feel.

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja


XS2: Looper

11010210041e125508065109073a11563b1d51163d16060e54550d19

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja


XS3: Roman Xor

xor
https://gist.github.com/AndyNovo/309325b566b2df42b984e2401fedbaab

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja


XS4: Hexy

xor

In [1]: xor(flag + key + hashlib.sha256(flag).hexdigest().encode(), key).hex()
Out[1]: '1a0c43191f5b15485d5a31574e4333141a5d073a0840541f560b515324001d00000c5315000e0a4e0452111618060654080154414b09165147791f1941041b07115816454b060b5e5a20094d135e101516425506420145544c18570d11541a4255125a5a5e5212470f050b5b425d1b434409034c5a19615c46465a424b151906041852415648415b5a44'

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja


XS5: Old School

xor bad prng deduction meta guess school
I used an old, common, prng. Knowledge of the solvability of this problem helps you deduce...
https://gist.github.com/AndyNovo/40adab2061f6b2fd47d6ba7d765fb159

(this flag is udctf{...} not UDCTF{...})

P.S. I would never want you to think of a problem as guessy, if you think this is guessy I encourage you to reserve judgement and do this one AFTER the other ones.

HINT: Out of all the insecure PRNGs this one is the only one that can be broken using just 6 bytes mod 256 without any other insights, and it's the oldest school popular PRNG. If you pretend you have the first byte of the flag at spot i you'll get a byte mod 256 from the PRNG and can check the candidates from the prng and confirm the next character too. I know it's not too tough to validate this PRNG and the location of the flag, which also limits the list of insecure PRNGs. Once you know the prng there's only a couple ways the implementation could be done, still sensible in this context, and reasonable.

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja


XS6: CTR Mode is just XOR

lambda
https://gist.github.com/AndyNovo/23d509307fc55fcebae1fd522ed04295

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja
https://i8fgyps3o2.execute-api.us-east-1.amazonaws.com/default/ctrmode?pt=00

{"ciphertext": "f872c9547798b88e29b8462043948571", "probiv": "475045713653717a7936644c6d654d", "flagenc": "2cbcef061c2c4401d5bcc6c5569dab80c31daf822c0d424b2aadb5775e7c55047dd600fad942d7a32ce019da5c2edb91911cc166748fd5c4888bd030ae598968"}

XS7: Alternating Current

crypto

In [5]: cipher = DES.new(ky, DES.MODE_OFB)

In [6]: cipher.encrypt(msg).hex()
Out[6]: 'ee73f99771135c984db42bc9e3e73148fc60add1484c4bcc1f8269b6e5b06163de5ecfe85e2049975cb333b6e1b06657c570afce64021d9e03b9789dfeea211cf368bcda780d58df00b82b9af7e4371cf375bcd4760c58df04a97881f3ef224fba62f3c237085491'

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja


XS8: CBC Encrypted?

aes crypto
https://gist.github.com/AndyNovo/84580af56a6294ed2576366018dc557c

https://vbbfgwcc6dnuzlawkslmxvlni40zkayu.lambda-url.us-east-1.on.aws/


XS9: ROX LOOHCS

xor rox

In [69]: print(xor(flagmsg, flagmsg[::-1]).hex())
051c1b7f4652001b3008525d1b7f135c32160015453001551a7f0d1707167f1d1c4e0209011144134c5b005b4c1344110109024e1c1d7f1607170d7f1a55013045150016325c137f1b5d5208301b0052467f1b1c05

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja


XS10: PHP XOR

php xor web?
I could have kept going, maybe even make a pure XOR CTF but I think 10 is enough. Hope you enjoyed them.

This series of problems is called the XOR SCHOOL. For whatever reason I just love xor problems and over the years there are many that have charmed my soul. This sequence is an homage to the many many ways that xor shows up in CTFs. I hope you can see some of the beauty that I see through them. -ProfNinja

https://bluehens-phpxor.chals.io/


osint

Training Problem: Intro to OSINT

osint training
A famous person is selling their house. In this market, who wouldn't? Can you tell me who owns this house, and what the license plate of their "tough" car is? äø€ä½åäŗŗę­£åœØå‡ŗ售他们ēš„ęˆæå­ć€‚åœØčæ™äøŖåø‚åœŗäøŠļ¼Œč°äøęƒ³å‘¢ļ¼Ÿä½ čƒ½å‘ŠčÆ‰ęˆ‘čæ™ę ‹ęˆæ子ēš„äø»äŗŗę˜Æč°å—ļ¼Ÿä»–ä»¬é‚£č¾†ā€œē”¬ę“¾ā€ę±½č½¦ēš„č½¦ē‰Œę˜Æ什么ļ¼Ÿ Flag format: udctf{FirstLast_licenseplate} -Donovan


I'm Hungry

guess school north american google... not DHL
Google is your friend. č°·ę­Œę˜Æä½ ēš„ęœ‹å‹ć€‚

-JD (jr.)


web

Training Problem: Intro to Web

training
It's nice to have some training problems. -ProfNinja

https://bluehens-webstuff.chals.io/


lists of JSONs

Web...ish... -ProfNinja https://lists-of-jsons.web.app/


Just a day at the breach

lambda crypto

import os
import json
import zlib

def lambda_handler(event, context):
    try:
        payload=bytes.fromhex(event["queryStringParameters"]["payload"])
        flag = os.environ["flag"].encode()
        message = b"Your payload is: %b\nThe flag is: %b" % (payload, flag)
        compressed_length = len(zlib.compress(message,9))
    except ValueError as e:
        return {'statusCode': 500, "error": str(e)}

    return {
        'statusCode': 200,
        'body': json.dumps({"sniffed": compressed_length})
    }

It's a little more crypto than web, but I know the exploit from a web defcon talk ages ago. This is a common web exploit for network sniffers. -ProfNinja https://55nlig2es7hyrhvzcxzboyp4xe0nzjrc.lambda-url.us-east-1.on.aws/?payload=00


DNS

This DNS server reveals a secret to a special IP. Can you make it think youā€™re connecting from 127.0.0.1?
dig TXT flag @129.153.36.153
-JD (sr.)


Firefun 3

guess school
Our fireplace company was all set to take off for the moon, then we had to shut it all down. All that's left is a simple landing page. -ProfNinja
Dedicated to Nisala
https://fire.prof.ninja/


Nonogram Pt. 2: Disgraced

crypto NOT nonogram
Grace wrote a beautiful nonogram for us. I made a beautiful disaster from it. Nonogram? More like NOTagram, gotem
-ProfNinja

http://www.landofcrispy.com/nonogrammer/nonogram.html?mode=play&puzzle=4|4|2x2,2x2,2x2,2x2|2x2,2x2,2x2,2x2|x,x,x,x,x,x,x,x,x,x,x,x,x,x,x,x&palette=white.grey.X,black..&msg=ebab19591082e96b3db6d083e73b70350b008c5c33950b3b0cbb3bcb0001b643ef875cbecf0622


Snake

wasm rev
To uncover the flag, either win the game or reverse the game.
-JD (sr.)

https://snake-2024.pages.dev/snake.html


pwn

Pure Write-What-Where PWN

Straight to the point. 开é—Øč§å±±ć€‚

-ProfNinja nc 0.cloud.chals.io 16612


ret2bf

I heard an interview with Tame Impala where he said, "for a song to make an album, it has to have been, at some point, my favorite song ever". Well, there was at least one day when this one was my favorite CTF problem ever. -ProfNinja ęˆ‘å¬čæ‡ Tame Impala ēš„采č®æļ¼Œä»–čÆ“ļ¼Œ ā€œåƹäŗŽåˆ¶ä½œäø“č¾‘ēš„ę­Œę›²ę„čÆ“ļ¼Œå®ƒåæ…é”»åœØꟐäøŖę—¶å€™ę˜Æęˆ‘ęœ€å–œę¬¢ēš„ę­Œę›²ā€ć€‚å—Æļ¼Œč‡³å°‘ęœ‰äø€å¤©ļ¼Œčæ™ę˜Æęˆ‘ęœ€å–œę¬¢ēš„ CTF é—®é¢˜ć€‚

nc 0.cloud.chals.io 31782


thetv

The dude at 777 needs some help with his remote, he heard you worked in IT... so make sure you fix it, and don't break anything!! 777 ēš„é‚£äøŖå®¶ä¼™éœ€č¦äø€äŗ›é„ꎧå™Øę–¹é¢ēš„åø®åŠ©ļ¼Œä»–听čÆ“ä½ åœØ IT éƒØé—Ø巄作ā€¦ā€¦ę‰€ä»„äø€å®šč¦äæ®å„½å®ƒļ¼Œäøč¦ē “坏任何äøœč„æļ¼

-Cam nc 0.cloud.chals.io 30658


thelight

It's the same guy again, ugh, this time he needs some help with his light switch, it's been on the frits lately. 又ę˜Æ同äø€äøŖäŗŗļ¼Œå‘ƒļ¼Œčæ™ę¬”ä»–éœ€č¦äø€äŗ›å…³äŗŽē”µēÆ开关ēš„åø®åŠ©ļ¼Œęœ€čæ‘它很ē³Ÿē³•ć€‚

-cam nc 0.cloud.chals.io 24481


Flaming Lips

She likes her hair to, be real orange... å„¹å–œę¬¢å„¹ēš„夓发ļ¼ŒēœŸę­£ēš„ę©™č‰²......

-ProfNinja and printf(name); nc 0.cloud.chals.io 24302


241108_4tCtf

fil-rouge

1 - Pilote

Your friend contacted you to help him with a... "problem". He found something curious when doing he's daily hacking routine. But in order to help him, you're going to need to understand what he found.

The flag follows the format: 4T${<hex_key>}. The flag for this challenge will be annotated P1.


2 - The Website

t should be pretty simple to know what to do from here on out. Find out as much information as you can, there must be something... right?

The flag follows the format: 4T${<hex_key>}. The flag for this challenge will be annotated P2.


3 - The Meeting

A meeting ? When is it happening, can you get more infos ?

The flag follows the format: 4T${<hex_key>}. The flag for this challenge will be annotated P3.


4 - The Alert

An alert has rung on your friend's computer, apparently he's been monitoring for changes on the website. A new message has appeared, can you find out about it and what it means ?

The flag follows the format: 4T${<hex_key>}. The flag for this challenge will be annotated P4.


5 - The Alert 2

Maybe something else can be found with your previous knowledge.

The flag follows the format: 4T${<hex_key>}. The flag for this challenge will be annotated P5.


6 - The Website 2

Another one ? What could this be about ? Please break into it !

Intelligent bruteforcing (your own script) is recommended. The flag follows the format: 4T${<hex_key>}. The flag for this challenge will be annotated P6.


7 - The Final

Go back to the chat room, The Admin is waiting for you.

The flag follows the format: 4T${<hex_key>}. The flag for this challenge will be annotated P6.


blockchains

EVM - Intro

My friend gave me some shiny numbers, something to do with EVM or something like that. He asked me to find the value that avoids self-destructing the contract. Anyway, here what he sent me: 60075634600A5660035661DEAD020264067CCADF1E14601A57FF00

The flag is in this format: 4T${}, if the solution is decimal 4919, the flag will be 4T${0x1337}.


Kitty Kitty Bank

Kitty Kitty Bank is a decentralized bank that allows you to store your kitties in a secure way. The bank works thanks to a smart contract that you can find below. You can now go to the bank and deposit your kitties ! :3

The objective is to steal the kitties of the bank and get more than 1000 ETH on your own account.


EVM - Flattened Vyper

I achieved to obtain this smart contract, but I can't understand what it does. Can you help me? The only information that I have are the followings:

The flag is cut in three parts and each part is emitted once.
The first part is emitted in raw bytes.
The second part is emitted in base85 encoding.
The last part has to be RC4 with the decoded second part.

The flag is in this format: 4T${...}.


blue-team

Plz help me

My friend said that his server is restarting every 10 minutes. He isn't able to find the issue. Can you help him?

This challenge will restart every 10 minutes. You need to find the issue and fix it. So everything made during the last 10 minutes will be lost.


My first website

I just created my first website and add security to my admin panel. But a friend of mine told me that it is not secure at all. Can you help me to find the vulnerability and fix it?

Apparently, he let me a hint somewhere...


crypto

Not so private

So Sam and Mikaela told me why one big big prime is not enough. Don't worry there all there and more now to improve security. And since you all broke my beautiful system I only give you the output this time.

The flag is in this format: 4T${...}.


Gam-Gam

I love prime numbers very much, so today I decided to begin to learn how to use and implement RSA. I have made an implementation of it. My friends Sam and Mikaela are going to review it but you can try it too if you want. I am a beginner so please be kind with me.

The flag is in this format: 4T${...}.


Matematik

Ok, I got carried away. Sam and Mikaela helped me again to improve everything. If this does not work you will have won for this year and I will acknowledge your strength. Good luck.

The flag is in this format: 4T${...}.


docker

A Simple Container

This is a challenge where you must do a simple api request.


Treasure Hunt

Something valuable has been hidden inside this: https://hub.docker.com/repository/docker/unshade/what/general Can you find all the pieces and put them together ?

The flag follows the format 4T${...}


in-sanity

Insanity check 1

I just found this old scroll in my attic. Can you read it? The flag is literally what you see


Insanity check 2

Work harder not smarter... or not We want the nth character of each page where n is the number of the page. Space doesn't count. The character must be in text and not in a picture or logo. For example, The first three characters are : A, a, .

The flag format is : 4T${concatenationOfCharacters}


misc

Trace the Ghost

A server of the company has been compromised. Find any intelligence that could help us to trace the ghost.

The flag is in this format: 4T${}.


Stirling

Someone gave me a nice pair of PDF, can you figure out if there's some hidden data ?

The flag follows the format 4T${<hidden_data>}, if the hidden data is hios, the flag should be 4T${hios}


Discasino

The Discasino is now opened for business! You can play with our Discasino Discord bot today !

The bot will only reply with ephemeral messages, so you can play in the server or in its DMs. Be careful not to play with Discasino 2 now, it's a bit more secure than the first one! The flag is in the format 4T${flag}.


Discasino Two

The Discasino is back at it with a new security! This time, you will not be able to bypass the game so easily. Can you still get the flag?

The bot for this challenge is named Discasino 2. You can play with it in the server or in its DMs. The flag is in the format 4T${flag}.


Water on Mars

Something seems weird with this picture...

The flag should be wrapped with 4T${}


osint

Hoot Hoot

Hello Agent, We are looking to locate a wanted person. We have obtained a photo that may be near their residence. Could you find the name of the city for us? Thank you.

The name of the city must be in lowercase, without accents, and without spaces The flag is in this format: 4T${}. If the solution were New York, the flag would be 4T${newyork}.


Holidays

Hello Agent, Congratulations on finding the city in the previous photo! We are cross-referencing this information with the rest of our data. In the meantime, we have a second mission for you. One of our informants has informed us that the person we are looking for recently went on vacation. Give us the name of a location where this person has actually been, and for which we have visual confirmation. The target's name is: Owen Perkins

There is no need to contact anyone for this challenge, thank you. The name of the location must be in lowercase, without accents, and without spaces. The flag is in this format: 4T${}, if the solution is Central Park, the flag will be 4T${centralpark}.


Targets

Hello Agent, You are doing a great job. We have contacted the local authorities to gather information on our target. We have since discovered that our target is part of an activist group called Hackcorp. They are planning an attack on three locations. For several years, our target has been gathering information on these locations. Attached, you will find three photos of potential locations. You must identify the positions of these locations.

The location we ask you to find are: First picture: It is pretty obviuous... Second picture: The building on the center of background. Third picture: The building where the photo was taken. The flag is the concatenation of the first word of each three word. The flag is in this format: 4T${word1.word2.word3}


Secret meeting

Hello Agent, Congratulations on your recent findings. We narrowly avoided an incident. We managed to intercept a communication and obtained a date, time, and a photo of a meeting location. Find the meeting location, and we will arrest any members found on site.

The flag is three word corresponding to the center of the bridge that we see. The flag is in this format: 4T${word1.word2.word3}


pwn

Pas ouf

In French, "not terrible" can be said as "pas ouf" or "bof"... Perhaps this program would be a good introduction for those "bof" moments?

example: openssl s_client -quiet -verify_quiet -connect main-5000-pwn-pas-ouf-d8f176979c1536e4.ctf.4ts.fr:52525


reverse

Reverse - Readme

I found a random USB key in a train so of course I plugged it :) It contained a binary asking me for a password?! I have no hints so I would like you to help me cracking it!

The flag is in this format: 4T${}, if the password is hello, the flag will be 4T${hello}.


web

My Sky Blog

Welcome to my blog, I hope you find everything you need there. It certainly is a bit empty, but I'm sure you'll find something interesting to post !

The flag format is 4T${...}.


Homelab ? More like Pwnlab !

Your friend just told you that he has a homelab and that he is hosting a website on it. He told you that he is a security expert and that his website is secure. He also gave you SSH access in case you wanted to store file on there, don't fret, you don't have any admin access.

The flag follows the format 4T${...} and is located in the /home/admin directory.


241109_N1CTF

misc

ezAPP

build a app is really interestingļ¼Œso just build it.


crypto

M4sTeriX

I know that the matrix master is always performing tedious and error-prone matrix operations day after day : (


Seashells

Searching for SeashellsšŸš by the seasidešŸļø : )

Noticeļ¼š
Changed alarm(1200) to alarm(1500)

Twisting

Block ciphers always felt too rigid for me, so I gave them a lively upgrade. Take a look at my demo : )


N0TR5A

It's not RSA!


pwn

lucky

lucky pwn. Please read readme.txt in the attachment.

Noticeļ¼š
Pay attention to the GiftNote in the file, as it can help you with later stages of exploitation.
The success rate of the expected exploit is 100%.
Partial source code provided: https://gist.github.com/cs-cat/b89161548286a453042380cba6e7332f

PHP Master

The latest stable PHP (8.3.13) is still pwnable.

Noticeļ¼š
https://github.com/php/php-src/issues/13754
The expected exploit is data-only style.

heap_master

In a time when everyone is a kernel master, this is just a check-in.


mailbox

Xiaoming has put together a bit of a hodgepodge inspired by the SMTP protocol. While it won't quite let you send a real email, it can certainly help an attacker grab a flag without much trouble.

Noticeļ¼š
docker base image for ctfhub/pwn_xinetd
link: https://github.com/ctfhub-team/base_image/tree/master/pwn_xinetd

reverse

BrokenApp

M told me he developed an application and he hide a flag inside. But this application cannot be executed correctly?


ReFantazio

is this real life or is it just fanta seaļ¼Ÿ Only supports Android on arm64. Tested on Android 12 and Android 14, perhaps not supporting old versions of Android.


Txt2AsciiArt

Txt2AsciiArt? MulMulMultiThread?


ezapk

none


Context

flag == N1CTF{input}

Noticeļ¼š
In the global variable, you can discover the stack of the encryption process. (Pay attention to saving and restoring the stack)

web

Esc Error

Error... tips: Enable the test_mod option in Dockerfile to turn the pow check off.


n1stagram

n... what?

---------------------------------------------------------
* To save your time, please test locally before attempting online version.
* There are 2 ports open to the public: the HTTP port for the web challenge and the other TCP port for the SSH server.
* This is an optional SSH server that you can use if you feel that your machine's network connection to the web server is not good.

username:password 
n1ctf:n1ctf!@#
curl http://app
---------------------------------------------------------

faso

The challenge port cannot be accessed directly through HTTP


insane_xss

Is this really XSS?

Important: Remote resources are limited, please test locally first. And it may be unstable to obtain the flag remotely. If you can stably obtain the flag locally but keep failing in remote, please contact the author.

Noticeļ¼šcve-2024-21733