ångstromctf 2022


CTF Archive.

Welcome to ångstromCTF 2022

A capture-the-flag (CTF) competition hosted and organized entirely by alumni and current students of Montgomery Blair High School! CTF cybersecurity competitions have become an increasingly popular way for students to learn more about cybersecurity and develop and refine their hacking skills. These competitions are designed to educate and inspire high school students through interactive hacking challenges.
The first ångstromCTF took place April 8-17, 2016. It was a phenomenal success, with almost 500 teams participating and submitting thousands of problem solutions. Since then, we've run a competition every year and grown to host more than 1,500 scoring teams. As we expand our competition to an even wider audience, our chief goal remains making our competition as accessible as possible to students with little to no background knowledge in hacking and cybersecurity.
Students will compete in small teams. Points are given for answering each question (entering the flag). Prizes will be awarded to the top-scoring U.S. high-school teams.
ångstromCTF is intended both for beginners and experienced CTFers and consists of questions ranging from simple to very difficult in various categories. There are five categories of problems:

  • Binary Exploitation: Apply a range of skills to exploit security vulnerabilities in programs, such as buffer overflows, format string bugs, and heap vulnerabilities.
  • Cryptography: Crack cryptographic systems ranging from classical ciphers to complex protocols with math and logic.
  • Miscellaneous: Use anything from scripting language knowledge to forensic analysis to solve problems that don't fit into a rigorous category.
  • Reverse Engineering: Examine compiled programs given to you and figure out their inner workings. These executables span everything between simple programs and purposely obfuscated code.
  • Web Exploitation: Find various vulnerabilities in web pages, and use them to get access to areas you shouldn't. This topic covers a wide range of vulnerabilities, including SQL injections and cross-site scripting.

Original Date: Sat, 30 April 2022, 00:00 UTC — Wed, 04 May 2022, 23:59 UTC
Original URL: https://2022.angstromctf.com/
CTFtime Entry: ångstromCTF 2022
Original Team: ångstromCTF Organizers



Challenges

Can you guess my name?


Author: JoshDaBosh

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Baby friendly!


Author: JoshDaBosh

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

You know the drill.


Author: JoshDaBosh

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Step right up and enter clam's number game! Winners get one (1) free flag!!!


Author: aplet123

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Layers and layers of Rust internals. Better know your ABIs too...

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: soucko

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

clam has no more inspiration :( maybe help him get some?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: aplet123

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

After making dumb jokes about cryptography to all his classmates, clam got a cease and desist filed against him! When questioned in court, his only comment was "clam's confounding Caesar cipher creates confusing cryptographic challenges." Needless to say, the judge wasn't very happy. Clam was sentenced to 5 years of making dumb Caesar cipher challenges. Here's one of them:

sulx{klgh_jayzl_lzwjw_ujqhlgyjshzwj_kume}.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: aplet123

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

RSA strikes strikes strikes again again again!

Use the following command to execute the Python file:

sudo python rsa.py

Author: lamchcl

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

One of these is not like the others.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: JoshDaBosh

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

My friend was passing notes during class. Can you find them?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: cavocado

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score