DownUnderCTF 2020


CTF Archive

Welcome to DownUnderCTF 2020

DownUnderCTF is an Australia wide Capture The Flag (CTF) competition aimed at Australian High School and University Students. Its main goal is to try to up-skill the next-generation of potential Cyber Security Professionals, as well as increase the size of the CTF community here in Australia. This event is a cross collaboration between 15 different Cyber Security Societies around the country trying to make a difference in the Cyber Security community by providing a national cyber security competition within Australia.


Original Date: Fri, 18 Sept. 2020, 09:00 UTC — Sun, 20 Sept. 2020, 09:00 UTC
Original URL: http://downunderctf.com/
CTFtime Entry: DownUnderCTF 2020
Original Team: DownUnderCTF 2020


Challenges

*Somebody told me that this program is vulnerable to something called remote code execution?

I'm not entirely sure what that is, but could you please figure it out for me?*


Author: Faith

This will show my friends!

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Faith

My friends kept making fun of me, so I hardened my program even further!

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: Faith

I've been porting C++ vectors to C and I think I've finally hit a flawless implementation! I even made a cool shell for playing with them and everything!

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: B3NNY

Ah finally a memory safe language! now I can sit back and relax knowing that any exploits are impossible... Wait, something's moaning at the door!


Author: B3NNY

ROT13 is boring!


Author: joseph#8210

This is just RSA for babies!


Author: joseph#8210

Hello there! I learnt C last week and already made my own SaaS product, check it out! I even made sure not to use compiler flags like --please-make-me-extremely-insecure, so everything should be swell.

Hint - The challenge server is running Ubuntu 18.04.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: k0wa1ski#6150 and Faith#2563

Everyone knows ECB is broken because it lacks diffusion. That's why I've come up with my own variant that uses IVs and chaining and all that cool stuff! It solves all the problems ECB had... I think


Author: joseph#8210

People say shift ciphers aren't secure. I'm here to prove them wrong!


Author: joseph#8210

I heard that CBC makes a good MAC. Ceebs using a proper implementation though, rolling our own FTW!


Author: k0wa1ski#6150

Can you solve my factorisation problem if I give you a hint?


Use the following command to execute the Sage file:

sudo sage 1337crypt.sage

Author: joseph

Can you crack this flawless ECC signature scheme?


Author: joseph#8210

Can you crack this flawless ECC signature scheme?


Author: joseph#8210

This is really easy, I promise.

Use flagCheck to input the flag you get from the challenge to get the actual flag


Author: h4sh


30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score