ångstromCTF 2024


CTF Archive.

Welcome to ångstromCTF 2024

A capture-the-flag (CTF) competition hosted and organized entirely by alumni and current students of Montgomery Blair High School! CTF cybersecurity competitions have become an increasingly popular way for students to learn more about cybersecurity and develop and refine their hacking skills. These competitions are designed to educate and inspire high school students through interactive hacking challenges.
The first ångstromCTF took place April 8-17, 2016. It was a phenomenal success, with almost 500 teams participating and submitting thousands of problem solutions. Since then, we've run a competition every year and grown to host more than 1,500 scoring teams. As we expand our competition to an even wider audience, our chief goal remains making our competition as accessible as possible to students with little to no background knowledge in hacking and cybersecurity.
Students will compete in small teams. Points are given for answering each question (entering the flag). Prizes will be awarded to the top-scoring U.S. high-school teams.
ångstromCTF is intended both for beginners and experienced CTFers and consists of questions ranging from simple to very difficult in various categories. There are five categories of problems:

  • Binary Exploitation: Apply a range of skills to exploit security vulnerabilities in programs, such as buffer overflows, format string bugs, and heap vulnerabilities.
  • Cryptography: Crack cryptographic systems ranging from classical ciphers to complex protocols with math and logic.
  • Miscellaneous: Use anything from scripting language knowledge to forensic analysis to solve problems that don't fit into a rigorous category.
  • Reverse Engineering: Examine compiled programs given to you and figure out their inner workings. These executables span everything between simple programs and purposely obfuscated code.
  • Web Exploitation: Find various vulnerabilities in web pages, and use them to get access to areas you shouldn't. This topic covers a wide range of vulnerabilities, including SQL injections and cross-site scripting.

Original Date: Sat, 25 May 2024, 00:00 UTC — Tue, 28 May 2024, 00:00 UTC
Original URL: https://2024.angstromctf.com/
CTFtime Entry: ångstromCTF 2024
Organizing Team: ångstromCTF Organizers



Challenges

I thought my tiring AP season was over, but I heard that they're offering a flag in AP Cybersecurity! The proctor seems to have trust issues though...


Author: Peterfun

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

👍


Author: preterite

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

only the ogs remember go


Author: emh + clam

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

:scream:


Author: JoshDaBosh

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

you can't heapsort without heapify


Author: enzocut

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

emh can't come up with any more cool theme ideas for his challenges. Help me come up with ideas pls


Author: emh + clam + JoshDaBosh

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

check out my novel sorting algorithm!


Author: enzocut

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Clam decided to start studying philosophy, and what is the difference between plus one and minus one anyway...


Author: aplet123

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Man? Is that you?

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: cherr7

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Simon says: encrypt three times!

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: defund

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

I implemented a simple threshold signature scheme for Schnorr signatures.


Author: defund

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

This time, no more cheating.


Author: defund

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

layers


Author: BrownieInMotion

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

Anna: Do you wanna build a snowman?

Elsa: Sure if you can open my snowman picture

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: elianabean

Connect with SSH

Link your SSH key, then connect with: ssh [email protected]

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score