You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The QR code encodes "longing for you drove me through the stars. Alexei Tolstoy". This entire string was the flag.
50
53
51
-
<aid="joy300"></a>
52
-
Joy 300
53
-
-------
54
+
55
+
<!--more-->
56
+
57
+
### Joy 300
54
58
55
59
CTFy Rocket is a Flappy Bird clone apparently developed in Borland Delphi. The stated goal in the challenge description is to reach the 42nd "parsec".
56
60
@@ -90,9 +94,7 @@ The number of times this occurred also proved difficult to calculate, so we focu
90
94
91
95
After the game began, we patched the binary to set `dword_45CE14` to 256 each time a collision occured. Then, we were able to fly through the level ignoring obstacles. Once we reached the 42nd parsec, the hidden caption was revealed and it contained our flag.
92
96
93
-
<aid="crypto100"></a>
94
-
Crypto 100
95
-
----------
97
+
### Crypto 100
96
98
97
99
Initially, this challenge was very difficult. Though the encoding function was easy to analyze and reimplement, decoding the provided plaintext required some algorithmic skill. Here is the original encoding function:
98
100
@@ -115,14 +117,13 @@ Then, the challenge was updated. The only modification was that primes expressib
This was short enough to solve manually. Rather than calculate the appropriate new primes, I simply encoded A-Z using the service. Examining only prime exponents for now, the solution is `FLUG_NH_IM_R`, leaving `29^2219` unused. `29+241+1949=2219`, so we deduce that the remaining characters are E's. `FLUGENHEIMER` was the flag.
121
123
122
124
(The English Wikipedia wordlist included Flugenheimen, but not Flugenheimer)
123
125
124
-
Exploits 100
125
-
------------
126
+
### Exploits 100
126
127
127
128
We are provided a binary and a host/port to connect to. The meat of the binary is:
128
129
@@ -184,8 +185,7 @@ Then, we test the strings `'baaaaaaaaaaa'`, `'caaaaaaaaaaa'`, and so on until we
184
185
185
186
The password we extracted by this method was `S@nd_will2z0`, and providing this as the password returns the flag `Time_works_for_you`. Perhaps a timing attack was the intended solution?
186
187
187
-
Exploits 300
188
-
------------
188
+
### Exploits 300
189
189
190
190
We're challenged to escape a jail, and a few first submissions return Python-style errors.
0 commit comments