0x41414141 CTF 2021


CTF Archive

Welcome to 0x41414141 CTF 2021

0x41414141 CTF is a cybersecurity capture the flag event consisting of the main challenge categories plus some solidity hacking.

This event is sponsored by offshift a new crypto protocol aiming into anonymously storing cryptocurrency on the ethereum network , you can read more about them over at https://offshift.io


Original Date: Sat, 23 Jan. 2021, 17:00 UTC — Sat, 30 Jan. 2021, 17:00 UTC
Original URL: https://ctf.offshift.io/
CTFtime Entry: 0x41414141 CTF
Organizing Team: xor and the half adder


Challenges

We don't like giving binaries that contain loads of information, so we decided that a small program should do for this challenge. Even written in some custom assembly. I wonder how this could be exploited.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Tango

ROP External

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: M_alpha

As we know that crypto is a hot potato right now, we wanted to welcome you to a safe place, The Pwn Inn. We've had many famous faces stay in our Inn, with gets() and printf() rating us 5 stars. We've decided to start making an app, and wanted you guys to be our beta testers!

Welcome!

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Tango

Is ROP dead? God no. But it returns from a long awaited time, this time in a weird fashion. Three instructions ... can you pwn it?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Tango

Use flagCheck to input the flag you get from the challenge to get the actual flag

Author: M_Alpha

My plaintext has been encrypted by an innocent friend of mine while playing around cryptographic libraries, can you help me to recover the plaintext , remembers it's just numbers and there's a space between some numbers which you need to remove the space and submit the recovered plain text as a flag.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: ElementalX

I received a corrupted program the keys are probably lost within the game can you just find it for me to get the flag?.

Flag format : flag{key1+key2}

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: ElementalX

My key has been missing inside these two binaries can you help me to find it out ,as per my friend the key is divided in two parts between the two binaries so, remember you need to join them up before submitting as a flag.


Author: ElementalX

A mix of reversing and web written in Go.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: xor and the half adder

Original Challenge-

c: `17830167351685057470426148820703481112309475954806278304600862043185650439097181747043204885329525211579732614665322698426329449125482709124139851522121862053345527979419420678255168453521857375994190985370640433256068675028575470040533677286141917358212661540266638008376296359267047685745805295747215450691069703625474047825597597912415099008745060616375313170031232301933185011013735135370715444443319033139774851324477224585336813629117088332254309481591751292335835747491446904471032096338134760865724230819823010046719914443703839473237372520085899409816981311851296947867647723573368447922606495085341947385255`

n: `23135514747783882716888676812295359006102435689848260501709475114767217528965364658403027664227615593085036290166289063788272776788638764660757735264077730982726873368488789034079040049824603517615442321955626164064763328102556475952363475005967968681746619179641519183612638784244197749344305359692751832455587854243160406582696594311842565272623730709252650625846680194953309748453515876633303858147298846454105907265186127420148343526253775550105897136275826705375222242565865228645214598819541187583028360400160631947584202826991980657718853446368090891391744347723951620641492388205471242788631833531394634945663`

Run the file in the challenge to get n and c pwn.college{flag}.


Author: Soul

c = 3708354049649318175189820619077599798890688075815858391284996256924308912935262733471980964003143534200740113874286537588889431819703343015872364443921848

e = 16

p = 75000325607193724293694446403116223058337764961074929316352803137087536131383

q = 69376057129404174647351914434400429820318738947745593069596264646867332546443

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Soul

hello guys, I started this new service check note.txt file for a sanity check.


Author: pop_eax & Tango

hello guys, I started this new service check note.txt file for a sanity check.


Author: xor and the half adder

In Jail!


Author: Tango


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score