Compete against the best security experts in these 3 challenges, requiring diverse skills such as reverse-engineering, web, pwning and cryptography.
Place yourself among the best and attempt to win free conference tickets!
Infra sponsored by goo.gle/ctfsponsorship.
/!\ The challenge is now over but you can still download the files and try the different stages locally!
Everything is provided for you to reproduce each challenge locally, use it!
Remote instances of the challenges are delivered by our Discord bot (HexaBot#0421). Use them to exploit the real target and obtain the flag.
Send $help to HexaBot in private message. Make sure the bot is also allowed to send you private messages ;-)
Some challenges will require you to compute a Proof of Work using hashcash.
Here is an example of a standard request for instance:
If you're a student, don't forget to inform the bot with: $status student
This pwn2own-style challenge will allow you to remotely compromise an ARM router.
Files: files.tgz
Have you ever analyzed a java application with some viewstate mechanisms? How can someone protect themselves against deserialization while allowing it? Anyway, take a deep look at our application. Be careful, some security mechanisms are present.
Sources: sources.7z
Pre-configured VM: vm.7z
A secure database service application has been ported to Linux, but it may not be as secure as it seems. Can you crack the communication protocol and find a flaw in the code that will let you access the flag? This challenge requires reverse engineering and exploitation skills.
Files: files.zip
Solving the 3 challenges among the first places will grant you the following prizes. In order to help those who do not have a company that could provide for expenses, accommodations will also be offered to the first student.
1st place: One ticket for the conference
2nd place: One ticket for the conference
3rd place: One ticket for the conference
1st place: One ticket for the conference + accommodations near the conference
2nd place: One ticket for the conference
3rd place: One ticket for the conference
Ranking 1
Ranking 2
We're sharing the write-ups made by contestants for the second edition of this challenge. These are generously shared by the authors so feel free to thank them.