0CTF/TCTF 2019 Quals


CTF Archive

Welcome to 0CTF/TCTF 2019 Quals

0CTF/TCTF 2019 Quals is an annual online qualifier for the prestigious 0CTF finals, a Capture The Flag (CTF) cybersecurity competition hosted by the 0OPS team and Tencent eee.

CTF games often touch on many other aspects of information security: cryptography, stego, binary analysis, reverse engineering, mobile security and others. Good teams generally have strong skills and experience in all these issues.


Original Date: Sat, 23 March 2019, 06:00 UTC — Mon, 25 March 2019, 06:00 UTC
Original URL: https://ctf.0ops.sjtu.cn/
CTFtime Entry: 0CTF/TCTF 2019 Quals
Organizing Team: 0ops and eee


Challenges

Exploit this arcane task manager, where freeing memory is just the beginning of the magic show!


Author: 0ops and eee

Crack the shielded scribbles of the Aegis Notebook, where each note you add might just unlock a hidden path to cyber glory


Author: 0ops and eee

Author: 0ops and eee

It scans!


Author: 0ops and eee

Let's refresh our ptmalloc exploit techniques in 2019!


Author: 0ops and eee

A sandbox in lua


Author: 0ops and eee

People always say that rop is turing complete, show me by implementing the Floyd-Warshall algorithm


Author: 0ops and eee

Use flagCheck to input the flag you get from the challenge to get the actual flag

Author: 0ops and eee

RSA challs are always easy, right? Even if N is not a integer.

Note: I have a modified rsa version which works woth pwn.college so use rsa.modified.sage instead of rsa.sage

To run the challenge use this command:

sudo sage rsa.modified.sage

Author: 0ops and eee


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score