Category: Forensics Score: 80

I participated in this CTF with VulnHub’s CTF team.

Description

Halp! I lost my cheezburger and I can’t find it! It’s in this file somewere, can you be finds it? K Thx m8 much appreciat.

Category: Crypto Score: 15

I participated in this CTF with VulnHub’s CTF team.

Description

Decode using hex and see what you get…
6236343a20615735305a584a755a58526659323975646d567963326c76626c3930623239736331397962324e72

Solving the challenge

Only needed my terminal for this.

First I decoded the hex encoded string.

$ echo "6236343a20615735305a584a755a58526659323975646d567963326c76626c3930623239736331397962324e72" | xxd -r -p
b64: aW50ZXJuZXRfY29udmVyc2lvbl90b29sc19yb2Nr

Then I decoded the base64 encoded string

$ echo aW50ZXJuZXRfY29udmVyc2lvbl90b29sc19yb2Nr | base64 -d
internet_conversion_tools_rock

Flag: internet_conversion_tools_rock

Category: Web Score: 30

I participated in this CTF with VulnHub’s CTF team.

Description

Jason made a new SuperSecure™ website, but lost his password. It’s displayed on the admin page. Can you login?

Category: Crypto Score: 10

I participated in this CTF with VulnHub’s CTF team.

Description

We found this message written on a piece of parchment in the ruins of ancient Rome. What could it mean?
uxptkx_max_bwxl_hy_ftkva

Solving the challenge

This is just a basic substitution cipher.

To find the offset I used http://rumkin.com/tools/cipher/caesar.php

Caesarian Shift cipher - N:7

Flag: beware_the_ides_of_march

Category: Binary Score: 50

I participated in this CTF with VulnHub’s CTF team.

Description

This program is vulnerable to a buffer overflow! Can you exploit it to run a shell and get the flag? You can solve this problem on our shell server at /problems/overflow1, and the binary and source are provided.

Category: Web Score: 40

I participated in this CTF with VulnHub’s CTF team.

Description

We’ve discovered a mysterious website. Can you retrieve the flag?

Category: Forensics Score: 120

I participated in this CTF with VulnHub’s CTF team.

Description

Our Wordpress blog has been hacked! Fortunately, the network capture from our intrusion detection system may provide some clues. Can you help us figure out what the hacker did?

Category: Reversing Score: 50

I participated in this CTF with VulnHub’s CTF team.

Description

What kind of input makes this program happy?

Category: Binary Score: 100

I participated in this CTF with VulnHub’s CTF team.

Description

This program is vulnerable to a format string attack! Try supplying a format string to overwrite a global variable and get a shell! You can exploit the binary on our shell server at /problems/format1/. Download the binary here, and source code is available here

Category: Binary Score: 40

I participated in this CTF with VulnHub’s CTF team.

Description

The end of the world is nigh! Dr. Doomsday has created an evil contraption to destroy the planet, and only a single password can stop it! We were able to recover the source code for the password check. Find the shortest password that will stop Dr. Doomsday’s machine and save the world! The program is available on the shell server at /problems/endian_of_the_world/, and the binary and source are provided.