Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

adding byu2022 and ritsec2019 #38

Merged
merged 1 commit into from
Feb 19, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions byuctf2022/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
## Welcome to BYUCTF 2022

A CTF hosted by BYU Cyberia- A CTF Team at BYU.

Challenges will be geared towards beginners, with topics such as Web, Crypto, OSINT, Forensics, Reverse Engineering and more.

---
**Original Date:** Fri, 27 May 2022, 16:00 UTC — Sun, 29 May 2022, 04:00 UTC<br>
**Original URL:** [https://byu.ctfd.io](https://byu.ctfd.io)<br>
**CTFtime Entry:** [BYUCTF 2022](https://ctftime.org/event/1660/)<br>
**Original Team:** [BYU Cyberia](https://ctftime.org/team/155711)<br>
**Original Git Repository:** [https://github.com/BYU-CSA/BYUCTF-2022](https://github.com/BYU-CSA/BYUCTF-2022)<br>
8 changes: 8 additions & 0 deletions byuctf2022/ballgame/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
I like baseball, do you?? I think grand slams are the coolest!!!

`16DLF592KN4KKI9BNJHCM179GML30PB32235B04MDM145GJD04N9NFL`

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/ballgame/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Take Me Out to the Ball Game](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/cryptography/takemeouttotheballgame)

## Challenge Setup
There are no dependency files for this challenge.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
Binary file added byuctf2022/ballgame/flagCheck
Binary file not shown.
6 changes: 6 additions & 0 deletions byuctf2022/basicrev/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
How well do you know assembly? Do you know of any tools that can help you? (Hint, they both start with the letter G)

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/basicrev/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Basic Rev](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/reverse-engineering/basicrev)

## Challenge Setup
There are no dependency files for `basic_rev`.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
Binary file added byuctf2022/basicrev/basic_rev
Binary file not shown.
Binary file added byuctf2022/basicrev/flagCheck
Binary file not shown.
3 changes: 3 additions & 0 deletions byuctf2022/blue/.init
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
#!/usr/bin/bash

/opt/pwn.college/python /challenge/create.py
6 changes: 6 additions & 0 deletions byuctf2022/blue/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
Oh my gosh I'm so sick of the color blue. Hasn't this been done before? Make an original challenge!

Maybe if there's enough of these, someone will make a blue-solving tool...

---
**Author:** BYU Cyberia
10 changes: 10 additions & 0 deletions byuctf2022/blue/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# REHOSTING

Files can be found here: [Blue 3](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/forensics-steganography/blue-3)

## Challenge Setup
There are no dependency files for `create.py`.

## Flag

Use the `create.py` to create `blue.png` with your own flag or use the `blue.png` from the Source file if you want the `byuctf{}` flag.
22 changes: 22 additions & 0 deletions byuctf2022/blue/create.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
#!/opt/pwn.college/python

from PIL import Image
import random

flag = open("/flag").readlines()[0].strip()

blue = Image.new(mode="RGB", size=(512, 512), color=(64, 77, 205))
pixels = blue.load()


for index, c in enumerate(flag):
width = blue.size[0] // len(flag)
height = blue.size[1] // len(flag)
for _ in range(ord(c)):
p = random.randint(0, width-1)+width*index,random.randint(0, height-1)+height*index
color_index = random.randint(0, 2)
color = list(pixels[p])
color[color_index] += 1
pixels[p] = tuple(color)

blue.save('/challenge/blue.png')
6 changes: 6 additions & 0 deletions byuctf2022/chicken/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
So I tried learning a new sorta-language, but I'm not very good at it and don't know if I got it right. Can you check for me?

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/chicken/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Chicken](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/reverse-engineering/chicken)

## Challenge Setup
There are no dependency files for `chicken.chn`.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
382 changes: 382 additions & 0 deletions byuctf2022/chicken/chicken.chn

Large diffs are not rendered by default.

Binary file added byuctf2022/chicken/flagCheck
Binary file not shown.
8 changes: 8 additions & 0 deletions byuctf2022/funfact/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
This challenge should help you to learn more about reverse engineering Python code. But if not, at least you can learn more about sea creatures!!

Flag format - `byuctf{message}`

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/funfact/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Fun Fact](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/reverse-engineering/fun-fact)

## Challenge Setup
There are no dependency files for `obfuscated.py`.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
Binary file added byuctf2022/funfact/flagCheck
Binary file not shown.
3 changes: 3 additions & 0 deletions byuctf2022/funfact/obfuscated.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
import base64
string = "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"
exec(base64.b64decode(string))
26 changes: 26 additions & 0 deletions byuctf2022/module.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
id: byuctf2022
name: byuctf2022

challenges:
- id: ballgame
name: CRYPTO - 498 - Take Me Out to the Ball Game
- id: truth
name: CRYPTO - 432 - Truth and Falsehood
- id: xqr
name: CRYPTO - 490 - XQR
- id: shift
name: CRYPTO - 50 - Shifting Mindset
- id: qool
name: FORENSICS - 94 - Qool Raster
- id: stickykey
name: FORENSICS - 304 - Sticky Key
- id: blue
name: FORENSICS - 482 - Blue 3
- id: basicrev
name: REV - 50 - Basic Rev
- id: funfact
name: REV - 50 - Fun Fact
- id: chicken
name: REV - 439 - Chicken
- id: murdermystery
name: OSINT - 499 - Murder Mystery
16 changes: 16 additions & 0 deletions byuctf2022/murdermystery/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
While searching for secrets of the past, you find a scrap of paper that contains the following information:

`0110111001110010011010000111000001101001011001000100110001001011110100001111`

`June 29, 1902`

Because you’re great at OSINT, you trace this information back to a famous inscription. What is that inscription?

Flag - `byuctf{inscription_with_underscores}`

Note, the flag will not include the name or dates found in the inscription.

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/murdermystery/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Murder Mystery](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/OSINT/murder-mystery)

## Challenge Setup
There are no dependency files for this challenge.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
Binary file added byuctf2022/murdermystery/flagCheck
Binary file not shown.
6 changes: 6 additions & 0 deletions byuctf2022/qool/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
.

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/qool/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Qool Raster](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/forensics-steganography/qool-raster)

## Challenge Setup
There are no dependency files for `scanme.txt`.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
Binary file added byuctf2022/qool/flagCheck
Binary file not shown.
50 changes: 50 additions & 0 deletions byuctf2022/qool/scanme.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@


















































8 changes: 8 additions & 0 deletions byuctf2022/shift/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
I needed to send my friend an important message about my American computer. But I was too embarrassed for anyone else to read it. So I encrypted it with a new mindset. That way no will ever know.

Flag format - `byuctf{message}`

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/shift/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Shifting Mindset](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/cryptography/shifting-mindset)

## Challenge Setup
There are no dependency files for `cipher.txt`.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
1 change: 1 addition & 0 deletions byuctf2022/shift/cipher.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
( @) * ( !$ !! !# @% !( * ( ^ @) !! % @% ( !( !( @) @! # !!
Binary file added byuctf2022/shift/flagCheck
Binary file not shown.
9 changes: 9 additions & 0 deletions byuctf2022/stickykey/DESCRIPTION.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
I just got this email from my friend. I think he was trying to tell me something important, but it just looks like random symbols.

Subject: ˆ ˇ˙ˆ˜˚ Â¥ ´¥∫øå®∂ ˆß ∫®ø˚´˜
Contents: ˆ †˙ˆ˜˚ µ¥ ˚´¥∫øå®∂ ˆß ∫®ø˚´˜≥ ˆ ∑åß π¬å˜˜ˆ˜© †ø †´¬¬ ¥ø¨ †˙ˆß ∫¨† ˆæµ ˜ø† ß¨®´ ˙ø∑ ¥ø¨ ∑ˆ¬¬ ®´å∂ ˆ†≥ Óøπ´ƒ¨¬¬¥ ¥ø¨ ç嘠ƒˆ˜∂ å ∑å¥≥ ∫¥¨ç†ƒ”∂ø˜†—¬´å√´—ßø∂å—∫¥—¥ø¨®—˚´¥∫øå®∂’

``Use flagCheck to input the flag you get from the challenge to get the actual flag``

---
**Author:** BYU Cyberia
13 changes: 13 additions & 0 deletions byuctf2022/stickykey/REHOST.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# REHOSTING

Files can be found here: [Sticky Key](https://github.com/BYU-CSA/BYUCTF-2022/tree/main/forensics-steganography/sticky-key)

## Challenge Setup
There are no dependency files for this challenge.

## Flag Check

As this challenge has its own custom flag so we use a simple flag check binary where the hacker can input the challenge flag and get the pwn.college flag. Command to run flag check-
```
/challenge/flagcheck
```
Binary file added byuctf2022/stickykey/flagCheck
Binary file not shown.
Loading