ångstromctf 2022


CTF Archive

Welcome to ångstromCTF 2022

A capture-the-flag (CTF) competition hosted and organized entirely by alumni and current students of Montgomery Blair High School! CTF cybersecurity competitions have become an increasingly popular way for students to learn more about cybersecurity and develop and refine their hacking skills. These competitions are designed to educate and inspire high school students through interactive hacking challenges.
The first ångstromCTF took place April 8-17, 2016. It was a phenomenal success, with almost 500 teams participating and submitting thousands of problem solutions. Since then, we've run a competition every year and grown to host more than 1,500 scoring teams. As we expand our competition to an even wider audience, our chief goal remains making our competition as accessible as possible to students with little to no background knowledge in hacking and cybersecurity.
Students will compete in small teams. Points are given for answering each question (entering the flag). Prizes will be awarded to the top-scoring U.S. high-school teams.
ångstromCTF is intended both for beginners and experienced CTFers and consists of questions ranging from simple to very difficult in various categories. There are five categories of problems:


Original Date: Sat, 30 April 2022, 00:00 UTC — Wed, 04 May 2022, 23:59 UTC
Original URL: https://2022.angstromctf.com/
CTFtime Entry: ångstromCTF 2022
Original Team: ångstromCTF Organizers


Challenges

After making dumb jokes about cryptography to all his classmates, clam got a cease and desist filed against him! When questioned in court, his only comment was "clam's confounding Caesar cipher creates confusing cryptographic challenges." Needless to say, the judge wasn't very happy. Clam was sentenced to 5 years of making dumb Caesar cipher challenges. Here's one of them:

sulx{klgh_jayzl_lzwjw_ujqhlgyjshzwj_kume}.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: aplet123

RSA strikes strikes strikes again again again!

Use the following command to execute the Python file:

sudo python rsa.py

Author: lamchcl

One of these is not like the others.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: JoshDaBosh

My friend was passing notes during class. Can you find them?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: cavocado

Baby friendly!


Author: JoshDaBosh

You know the drill.


Author: JoshDaBosh

Can you guess my name?


Author: JoshDaBosh

Step right up and enter clam's number game! Winners get one (1) free flag!!!


Author: aplet123

Layers and layers of Rust internals. Better know your ABIs too...

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: soucko

clam has no more inspiration :( maybe help him get some?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: aplet123


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score