Giter Site home page Giter Site logo

ctf-tasks's Introduction

CTF Challenges

This repository contains an archive of CTF challenges I developed in the last few years for various CTFs organized by my team โ€“ Dragon Sector. They are mostly software exploitation tasks with varying difficulty levels, for the x86/x64 architectures and Windows/Linux operating systems. Each subdirectory contains basic task information, original description, solution in the form of a short summary or a few slides from the post-CTF presentation, exploit code and optionally links to external solutions.

The challenges are as follows:

Name Competition Category Platform Arch. Difficulty
Pipeline Dragon CTF 2018 Exploitation / Programming Linux x64 Easy/medium
Production Dragon CTF 2018 (Teaser) Exploitation Linux x64 Easy/medium
Filesystem CONFidence CTF 2017 Exploitation Linux x64 Medium
Fastcalc-hardened CONFidence CTF 2017 Exploitation Windows x86 Hard
Fastcalc CONFidence CTF 2017 (Teaser) Exploitation Windows x86 Hard
Entree CONFidence CTF 2016 Exploitation Windows x86 Medium
Antipasto CONFidence CTF 2016 Exploitation Linux x86 Easy
Bubblegum CONFidence CTF 2016 (Teaser) Exploitation Windows x86 Hard
Night Sky CONFidence CTF 2015 Exploitation Linux x64 Hard
Quarantine CONFidence CTF 2015 (Teaser) Exploitation Linux x64 Hard
Crypto Machine CONFidence CTF 2014 Exploitation Linux x64 Medium
Memory CONFidence CTF 2014 Reverse Engineering Windows x86 Easy
Multipurpose Calculation Machine CONFidence CTF 2014 (Teaser) Exploitation Linux x86 Medium

Running the tasks

For exploitation problems, if the program listens on a port by default, leave it running and connect to the port to interact with the task. If it reads and writes to/from stdin and stdout, you should bind it to a TCP port of your choice (e.g. with netcat or socat on Linux, and the enclosed AppJailLauncher.exe tool on Windows), and connect to it to exploit the vulnerabilities. The goal is to obtain the contents of the flag.txt (or similar) file in the task's current directory.

For reverse-engineering problems, the goal is to extract the flag from the provided executable file.

About Dragon Sector

Dragon Sector

Dragon Sector is a Polish security Capture The Flag team. It was created in February 2013 and currently has 17 active members. We frequently participate in both online and offline security Capture The Flag competitions, publish write-ups on CTF tasks, and sometimes even organize CTFs.

You can find us on CTFTime, our blog and Twitter.

Contact

Questions, comments? Let me know at [email protected].

ctf-tasks's People

Contributors

j00ru avatar

Watchers

James Cloos avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.