├── .gitignore ├── Baby ├── ASIS_CTF_2018_Quals_Warm_up │ ├── README.md │ ├── Warm_up.7z │ └── writeup.md ├── Internetwache_CTF_2016_File_Checker │ ├── File_Checker.7z │ ├── README.md │ └── writeup.md ├── Internetwache_CTF_2016_SPIM │ ├── README.md │ ├── SPIM.7z │ └── writeup.md ├── Internetwache_CTF_2016_ServerfARM │ ├── README.md │ ├── ServerfARM.7z │ └── writeup.md ├── Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_1 │ ├── Matriochka_-_Step_1.7z │ ├── README.md │ └── writeup.md ├── Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_2 │ ├── Matriochka_-_Step_2.7z │ ├── README.md │ └── writeup.md ├── Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_3 │ ├── Matriochka_-_Step_3.7z │ ├── README.md │ └── writeup.md ├── Sharif_University_CTF_2016_Android_App │ ├── Android_App.7z │ ├── README.md │ └── writeup.md ├── Sharif_University_CTF_2016_SRM │ ├── README.md │ ├── SRM.7z │ └── writeup.md ├── Sharif_University_CTF_2016_Serial │ ├── README.md │ ├── Serial.7z │ └── writeup.md └── Sharif_University_CTF_2016_dMd │ ├── README.md │ ├── dMd.7z │ └── writeup.md ├── Easy ├── 0CTF_2016_Quals_boomshakalaka │ ├── README.md │ ├── boomshakalaka.7z │ └── writeup.md ├── Codegate_CTF_2018_Preliminary_RedVelvet │ ├── README.md │ ├── RedVelvet.7z │ └── writeup.md ├── Codegate_CTF_2018_Preliminary_Welcome_to_droid │ ├── README.md │ ├── Welcome_to_droid.7z │ └── writeup.md ├── Codegate_CTF_2018_Preliminary_easy_serial │ ├── README.md │ ├── easy_serial.7z │ └── writeup.md ├── Google_CTF_2018_Quals_Shall_we_play_a_game? │ ├── README.md │ ├── Shall_we_play_a_game?.7z │ └── writeup.md └── SSCTF_2016_Re1 │ ├── README.md │ ├── Re1.7z │ └── writeup.md ├── Hard └── N1CTF_2018_OldDriver_of_Akina │ ├── OldDriver_of_Akina.7z │ ├── README.md │ └── writeup.md ├── Medium_Easy ├── 0CTF_2016_Quals_momo │ ├── README.md │ ├── momo.7z │ └── writeup.md ├── ASIS_CTF_2018_Quals_Density │ ├── Density.7z │ ├── README.md │ └── writeup.md ├── ASIS_CTF_2018_Quals_Echo │ ├── Echo.7z │ ├── README.md │ └── writeup.md ├── ASIS_CTF_2018_Quals_Heavy_makeup │ ├── Heavy_makeup.7z │ ├── README.md │ └── writeup.md ├── ASIS_CTF_2018_Quals_Left_or_Right? │ ├── Left_or_Right?.7z │ ├── README.md │ └── writeup.md ├── ASIS_CTF_2018_Quals_baby_C │ ├── README.md │ ├── baby_C.7z │ └── writeup.md ├── Boston_Key_Party_CTF_2016_Jit_in_my_pants │ ├── Jit_in_my_pants.7z │ ├── README.md │ └── writeup.md ├── PlaidCTF_2016_quick │ ├── README.md │ ├── quick.7z │ └── writeup.md ├── SSCTF_2016_Quals_Re2 │ ├── README.md │ ├── Re2.7z │ └── writeup.md ├── SSCTF_2016_Quals_Re3 │ ├── README.md │ ├── Re3.7z │ └── writeup.md ├── VolgaCTF_2016_Quals_Broken │ ├── Broken.7z │ ├── README.md │ └── writeup.md └── starctf_2018_milktea │ ├── README.md │ ├── milktea.7z │ └── writeup.md ├── Medium_Hard ├── 0CTF_TCTF_2018_Quals_Milk_Tea_Machine │ ├── Milk_Tea_Machine.7z │ ├── README.md │ └── writeup.md ├── 0CTF_TCTF_2018_Quals_Provisioning │ ├── Provisioning.7z │ ├── README.md │ └── writeup.md ├── CSAW_CTF_2018_Quals_1337 │ ├── 1337.7z │ ├── README.md │ └── writeup.md ├── N1CTF_2018_LFI │ ├── LFI.7z │ ├── README.md │ └── writeup.md ├── N1CTF_2018_baby_unity3d │ ├── README.md │ ├── baby_unity3d.7z │ └── writeup.md ├── PlaidCTF_2018_APLunatic │ ├── README.md │ └── writeup.md └── PlaidCTF_2018_Plaid_Adventure │ ├── Plaid_Adventure.7z │ ├── README.md │ └── writeup.md ├── Medium_Medium ├── 0CTF_2016_Quals_trace │ ├── README.md │ ├── trace.7z │ └── writeup.md ├── 0CTF_TCTF_2018_Quals_Baby_VM │ ├── Baby_VM.7z │ ├── README.md │ └── writeup.md ├── 0CTF_TCTF_2018_Quals_g0g0g0 │ ├── README.md │ ├── g0g0g0.7z │ └── writeup.md ├── 0CTF_TCTF_2018_Quals_udp │ ├── README.md │ ├── udp.7z │ └── writeup.md ├── ASIS_CTF_2018_Quals_The_true_origin │ ├── README.md │ ├── The_true_origin.7z │ └── writeup.md ├── Boston_Key_Party_CTF_2016_unholy │ ├── README.md │ ├── unholy.7z │ └── writeup.md ├── CSAW_CTF_2018_Quals_kvm │ ├── README.md │ ├── kvm.7z │ └── writeup.md ├── Codegate_CTF_2018_Preliminary_6051 │ ├── 6051.7z │ ├── README.md │ └── writeup.md ├── Google_CTF_2018_Quals_Back_to_the_BASICs │ ├── Back_to_the_BASICs.7z │ ├── README.md │ └── writeup.md ├── N1CTF_2018_baby_neural_network │ ├── README.md │ ├── baby_neural_network.7z │ └── writeup.md ├── N1CTF_2018_patience │ ├── README.md │ ├── patience.7z │ └── writeup.md ├── Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_4 │ ├── Matriochka_-_Step_4.7z │ ├── README.md │ └── writeup.md ├── PlaidCTF_2016_quite_quixotic_quest │ ├── README.md │ ├── quite_quixotic_quest.7z │ └── writeup.md ├── starctf_2018_BabyDroid │ ├── BabyDroid.7z │ ├── README.md │ └── writeup.md ├── starctf_2018_fans_of_xdd │ ├── README.md │ ├── fans_of_xdd.7z │ └── writeup.md └── starctf_2018_wasm │ ├── README.md │ ├── wasm.7z │ └── writeup.md ├── README.md ├── conf.yaml ├── criterion.md ├── gen_files.py ├── problem_list ├── Baby.yaml ├── Easy.yaml ├── Hard.yaml ├── Medium_Easy.yaml ├── Medium_Hard.yaml └── Medium_Medium.yaml ├── problem_template.md └── writeup_template.md /.gitignore: -------------------------------------------------------------------------------- 1 | TODO/ 2 | -------------------------------------------------------------------------------- /Baby/ASIS_CTF_2018_Quals_Warm_up/README.md: -------------------------------------------------------------------------------- 1 | # ASIS CTF 2018 Quals : Warm up 2 | 3 | - Points : 27 4 | - Solves : 283 5 | - Description : 6 | ``` 7 | Must-Have Pre-Workout Warm up Challenge. 8 | ``` 9 | 10 | ## [attachment](Warm_up.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Baby/ASIS_CTF_2018_Quals_Warm_up/Warm_up.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/ASIS_CTF_2018_Quals_Warm_up/Warm_up.7z -------------------------------------------------------------------------------- /Baby/ASIS_CTF_2018_Quals_Warm_up/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (ASIS CTF 2018 Quals : Warm up) 2 | 3 | flag : `ASIS{hi_all_w31c0m3_to_ASISCTF}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_File_Checker/File_Checker.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Internetwache_CTF_2016_File_Checker/File_Checker.7z -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_File_Checker/README.md: -------------------------------------------------------------------------------- 1 | # Internetwache CTF 2016 : File Checker 2 | 3 | - Points : 60 4 | - Solves : 190 5 | - Description : 6 | ``` 7 | Description: My friend sent me this file. He told that if I manage to reverse it, I'll have access to all his devices. My misfortune that I don't know anything about reversing :/ 8 | Attachment: rev60.zip 9 | ``` 10 | 11 | ## [attachment](File_Checker.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_File_Checker/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Internetwache CTF 2016 : File Checker) 2 | 3 | flag : `IW{FILE_CHeCKa}` 4 | 5 | ## 一言Write up 6 | 1文字ずつ評価して評価結果が全て0の時の入力がflag 7 | 8 | ## Write up 9 | 10 | 11 | -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_SPIM/README.md: -------------------------------------------------------------------------------- 1 | # Internetwache CTF 2016 : SPIM 2 | 3 | - Points : 50 4 | - Solves : 208 5 | - Description : 6 | ``` 7 | Description: My friend keeps telling me, that real hackers speak assembly fluently. Are you a real hacker? Decode this string: "IVyN5U3X)ZUMYCs" 8 | ``` 9 | 10 | ## [attachment](SPIM.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_SPIM/SPIM.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Internetwache_CTF_2016_SPIM/SPIM.7z -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_SPIM/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Internetwache CTF 2016 : SPIM) 2 | 3 | flag : `IW{M1P5_!S_FUN}` 4 | 5 | ## 一言Write up 6 | MIPSのアセンブリを読む.文字列の文字をそれぞれのindexとxorしてる. 7 | 8 | ## Write up 9 | 10 | -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_ServerfARM/README.md: -------------------------------------------------------------------------------- 1 | # Internetwache CTF 2016 : ServerfARM 2 | 3 | - Points : 70 4 | - Solves : 156 5 | - Description : 6 | ``` 7 | Description: Someone handed me this and told me that to pass the exam, I have to extract a secret string. I know cheating is bad, but once does not count. So are you willing to help me? 8 | Attachment: rev70.zip 9 | ``` 10 | 11 | ## [attachment](ServerfARM.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_ServerfARM/ServerfARM.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Internetwache_CTF_2016_ServerfARM/ServerfARM.7z -------------------------------------------------------------------------------- /Baby/Internetwache_CTF_2016_ServerfARM/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Internetwache CTF 2016 : ServerfARM) 2 | 3 | flag : `IW{S.E.R.V.E.R>=F:A:R:M}` 4 | 5 | ## 一言Write up 6 | flagが3つのブロックに分離されて入力のverifyの結果,正しい場合に標準出力に出力される 7 | 8 | ## Write up 9 | 10 | 11 | -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_1/Matriochka_-_Step_1.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_1/Matriochka_-_Step_1.7z -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_1/README.md: -------------------------------------------------------------------------------- 1 | # Nuit du Hack CTF Quals 2016 : Matriochka - Step 1 2 | 3 | - Points : 50 4 | - Solves : 432 5 | - Description : 6 | ``` 7 | Can you help me? 8 | Recently, I found an executable binary. 9 | As I'm a true newbie, 10 | Certainly, to solve it, I will have difficulties. 11 | Keep in mind, the first step is quite easy. 12 | Maybe the last one will be quite tricky. 13 | Emulating it could be a good idea. 14 | The challenge is available at : http://static.quals.nuitduhack.com/stage1.bin 15 | ``` 16 | 17 | ## [attachment](Matriochka_-_Step_1.7z) 18 | 19 | ## [Write up](writeup.md) 20 | -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_1/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Nuit du Hack CTF Quals 2016 : Matriochka - Step 1) 2 | 3 | flag : `Much_secure__So_safe__Wow` 4 | 5 | ## 一言Write up 6 | そのままのkeyと入力をstrcmpで比較している. 7 | 8 | ## Write up 9 | 10 | -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_2/Matriochka_-_Step_2.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_2/Matriochka_-_Step_2.7z -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_2/README.md: -------------------------------------------------------------------------------- 1 | # Nuit du Hack CTF Quals 2016 : Matriochka - Step 2 2 | 3 | - Points : 100 4 | - Solves : 232 5 | - Description : 6 | ``` 7 | Can you help me? 8 | Recently, I found an executable binary. 9 | As I'm a true newbie, 10 | Certainly, to solve it, I will have difficulties. 11 | Keep in mind, the first step is quite easy. 12 | Maybe the last one will be quite tricky. 13 | Emulating it could be a good idea. 14 | You must solve step 1 first. 15 | ``` 16 | 17 | ## [attachment](Matriochka_-_Step_2.7z) 18 | 19 | ## [Write up](writeup.md) 20 | -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_2/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Nuit du Hack CTF Quals 2016 : Matriochka - Step 2) 2 | 3 | flag : `Pandi_panda` 4 | 5 | ## 一言Write up 6 | 入力を四則演算でverifyしている. 7 | 8 | ## Write up 9 | 10 | -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_3/Matriochka_-_Step_3.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_3/Matriochka_-_Step_3.7z -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_3/README.md: -------------------------------------------------------------------------------- 1 | # Nuit du Hack CTF Quals 2016 : Matriochka - Step 3 2 | 3 | - Points : 300 4 | - Solves : 185 5 | - Description : 6 | ``` 7 | Recently, I found an executable binary. 8 | As I'm a true newbie, 9 | Certainly, to solve it, I will have difficulties. 10 | Keep in mind, the first step is quite easy. 11 | Maybe the last one will be quite tricky. 12 | Emulating it could be a good idea. 13 | You must solve steps 1 and 2 first. 14 | ``` 15 | 16 | ## [attachment](Matriochka_-_Step_3.7z) 17 | 18 | ## [Write up](writeup.md) 19 | -------------------------------------------------------------------------------- /Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_3/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Nuit du Hack CTF Quals 2016 : Matriochka - Step 3) 2 | 3 | flag : `Did_you_like_signals?` 4 | 5 | ## 一言Write up 6 | SignalのHandlerがChainして複数の関数で1文字ずつ入力をverifyしている 7 | 8 | ## Write up 9 | 10 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_Android_App/Android_App.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Sharif_University_CTF_2016_Android_App/Android_App.7z -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_Android_App/README.md: -------------------------------------------------------------------------------- 1 | # Sharif University CTF 2016 : Android App 2 | 3 | - Points : 100 4 | - Solves : 58 5 | - Description : 6 | ``` 7 | Find the Flag!! 8 | Download Sharif_CTF.apk 9 | ``` 10 | 11 | ## [attachment](Android_App.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_Android_App/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Sharif University CTF 2016 : Android App) 2 | 3 | flag : `Sharif_CTF{833489ef285e6fa80690099efc5d9c9d}` 4 | 5 | ## 一言Write up 6 | MainActivityがlibadnjni.soをロードし,processObjectArrayFromNativeをインポートしている. 7 | processObjectArrayFromNativeでハードコーディングされた文字列と比較している. 8 | 9 | ## Write up 10 | 11 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_SRM/README.md: -------------------------------------------------------------------------------- 1 | # Sharif University CTF 2016 : SRM 2 | 3 | - Points : 50 4 | - Solves : 173 5 | - Description : 6 | ``` 7 | The flag is : The valid serial number 8 | 9 | Download RM.exe 10 | ``` 11 | 12 | ## [attachment](SRM.7z) 13 | 14 | ## [Write up](writeup.md) 15 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_SRM/SRM.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Sharif_University_CTF_2016_SRM/SRM.7z -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_SRM/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Sharif University CTF 2016 : SRM) 2 | 3 | flag : `CZ9dmq4c8g9G7bAX` 4 | 5 | ## 一言Write up 6 | Emailは適当なEmailを入力すれば良い.Serialは単純なasciiの比較とSerialのある要素と,ある要素の加算結果の比較などでverifyしている. 7 | 8 | ## Write up 9 | 10 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_Serial/README.md: -------------------------------------------------------------------------------- 1 | # Sharif University CTF 2016 : Serial 2 | 3 | - Points : 150 4 | - Solves : 108 5 | - Description : 6 | ``` 7 | Run and capture the flag! 8 | 9 | Download serial 10 | ``` 11 | 12 | ## [attachment](Serial.7z) 13 | 14 | ## [Write up](writeup.md) 15 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_Serial/Serial.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Sharif_University_CTF_2016_Serial/Serial.7z -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_Serial/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Sharif University CTF 2016 : Serial) 2 | 3 | flag : `EZ9dmq4c8g9G7bAV` 4 | 5 | ## 一言Write up 6 | anti disassembleが適用されているが,verifyはSharif University CTF 2016 : SRMと同様. 7 | 8 | ## Write up 9 | 10 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_dMd/README.md: -------------------------------------------------------------------------------- 1 | # Sharif University CTF 2016 : dMd 2 | 3 | - Points : 50 4 | - Solves : 243 5 | - Description : 6 | ``` 7 | Flag is : The valid input 8 | 9 | Download dMd 10 | ``` 11 | 12 | ## [attachment](dMd.7z) 13 | 14 | ## [Write up](writeup.md) 15 | -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_dMd/dMd.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Baby/Sharif_University_CTF_2016_dMd/dMd.7z -------------------------------------------------------------------------------- /Baby/Sharif_University_CTF_2016_dMd/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Sharif University CTF 2016 : dMd) 2 | 3 | flag : `grape` 4 | 5 | ## 一言Write up 6 | 入力のmd5を一文字ずつ比較するだけのバイナリ.md5の結果が分かるので[MD5 Decrypter](http://www.md5online.org)などで元に戻せばフラグが得られる. 7 | 8 | ## Write up 9 | 10 | -------------------------------------------------------------------------------- /Easy/0CTF_2016_Quals_boomshakalaka/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF 2016 Quals : boomshakalaka 2 | 3 | - Points : 3 4 | - Solves : 35 5 | - Description : 6 | ``` 7 | play the game, get the highest score 8 | ``` 9 | 10 | ## [attachment](boomshakalaka.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Easy/0CTF_2016_Quals_boomshakalaka/boomshakalaka.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Easy/0CTF_2016_Quals_boomshakalaka/boomshakalaka.7z -------------------------------------------------------------------------------- /Easy/0CTF_2016_Quals_boomshakalaka/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF 2016 Quals : boomshakalaka) 2 | 3 | flag : `0ctf{C0coS2d_AnDro1d_G0mE_YoU_Kn0w?}` 4 | 5 | ## 一言Write up 6 | 処理の間々でSharedPreferencesに文字列が書き加えられており,base64でデコードするとflagが得られる. 7 | 8 | ## Write up 9 | 10 | 11 | -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_RedVelvet/README.md: -------------------------------------------------------------------------------- 1 | # Codegate CTF 2018 Preliminary : RedVelvet 2 | 3 | - Points : 75 4 | - Solves : 126 5 | - Description : 6 | ``` 7 | Happiness:) 8 | ``` 9 | 10 | ## [attachment](RedVelvet.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_RedVelvet/RedVelvet.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Easy/Codegate_CTF_2018_Preliminary_RedVelvet/RedVelvet.7z -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_RedVelvet/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Codegate CTF 2018 Preliminary : RedVelvet) 2 | 3 | flag : `What_You_Wanna_Be?:)_la_la` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_Welcome_to_droid/README.md: -------------------------------------------------------------------------------- 1 | # Codegate CTF 2018 Preliminary : Welcome to droid 2 | 3 | - Points : 125 4 | - Solves : 71 5 | - Description : 6 | ``` 7 | > o < 8 | ``` 9 | 10 | ## [attachment](Welcome_to_droid.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_Welcome_to_droid/Welcome_to_droid.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Easy/Codegate_CTF_2018_Preliminary_Welcome_to_droid/Welcome_to_droid.7z -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_Welcome_to_droid/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Codegate CTF 2018 Preliminary : Welcome to droid) 2 | 3 | flag : `FLAG{W3_w3r3_Back_70_$3v3n7een!!!}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_easy_serial/README.md: -------------------------------------------------------------------------------- 1 | # Codegate CTF 2018 Preliminary : easy_serial 2 | 3 | - Points : 350 4 | - Solves : 40 5 | - Description : 6 | ``` 7 | Null 8 | ``` 9 | 10 | ## [attachment](easy_serial.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_easy_serial/easy_serial.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Easy/Codegate_CTF_2018_Preliminary_easy_serial/easy_serial.7z -------------------------------------------------------------------------------- /Easy/Codegate_CTF_2018_Preliminary_easy_serial/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Codegate CTF 2018 Preliminary : easy_serial) 2 | 3 | flag : `Flag{S0me0fU5#4r3L00king#AtTh3St4rs}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Easy/Google_CTF_2018_Quals_Shall_we_play_a_game?/README.md: -------------------------------------------------------------------------------- 1 | # Google CTF 2018 Quals : Shall we play a game? 2 | 3 | - Points : 113 4 | - Solves : 111 5 | - Description : 6 | ``` 7 | Win the game 1,000,000 times to get the flag. 8 | ``` 9 | 10 | ## [attachment](Shall_we_play_a_game?.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Easy/Google_CTF_2018_Quals_Shall_we_play_a_game?/Shall_we_play_a_game?.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Easy/Google_CTF_2018_Quals_Shall_we_play_a_game?/Shall_we_play_a_game?.7z -------------------------------------------------------------------------------- /Easy/Google_CTF_2018_Quals_Shall_we_play_a_game?/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Google CTF 2018 Quals : Shall we play a game?) 2 | 3 | flag : `CTF{ThLssOfInncncIsThPrcOfAppls}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Easy/SSCTF_2016_Re1/README.md: -------------------------------------------------------------------------------- 1 | # SSCTF 2016 : Re1 2 | 3 | - Points : 100 4 | - Solves : 83 5 | - Description : 6 | ``` 7 | Null 8 | ``` 9 | 10 | ## [attachment](Re1.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Easy/SSCTF_2016_Re1/Re1.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Easy/SSCTF_2016_Re1/Re1.7z -------------------------------------------------------------------------------- /Easy/SSCTF_2016_Re1/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (SSCTF 2016 : Re1) 2 | 3 | flag : `SSCTF{oty3eaP$g986iwhw32j%OJ)g0o7J.CG:}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Hard/N1CTF_2018_OldDriver_of_Akina/OldDriver_of_Akina.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Hard/N1CTF_2018_OldDriver_of_Akina/OldDriver_of_Akina.7z -------------------------------------------------------------------------------- /Hard/N1CTF_2018_OldDriver_of_Akina/README.md: -------------------------------------------------------------------------------- 1 | # N1CTF 2018 : OldDriver of Akina 2 | 3 | - Points : 1000 4 | - Solves : 1 5 | - Description : 6 | ``` 7 | I have a great image for you. but how to open it? 8 | Hint1 : Do you know how to map the data to an interval in the real axis? 9 | Hint2 : Can you convert the code to a "function"? 10 | ``` 11 | 12 | ## [attachment](OldDriver_of_Akina.7z) 13 | 14 | ## [Write up](writeup.md) 15 | -------------------------------------------------------------------------------- /Hard/N1CTF_2018_OldDriver_of_Akina/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (N1CTF 2018 : OldDriver of Akina) 2 | 3 | flag : `N1CTF{olD_Driv3r_Has_a_1mg_For_you}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/0CTF_2016_Quals_momo/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF 2016 Quals : momo 2 | 3 | - Points : 3 4 | - Solves : 31 5 | - Description : 6 | ``` 7 | I think it's hard winning a war with words. 8 | ``` 9 | 10 | ## [attachment](momo.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/0CTF_2016_Quals_momo/momo.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/0CTF_2016_Quals_momo/momo.7z -------------------------------------------------------------------------------- /Medium_Easy/0CTF_2016_Quals_momo/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF 2016 Quals : momo) 2 | 3 | flag : `0ctf{m0V_I5_tUr1N9_c0P1Et3!}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Density/Density.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/ASIS_CTF_2018_Quals_Density/Density.7z -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Density/README.md: -------------------------------------------------------------------------------- 1 | # ASIS CTF 2018 Quals : Density 2 | 3 | - Points : 148 4 | - Solves : 27 5 | - Description : 6 | ``` 7 | Keep it short and simple 8 | ``` 9 | 10 | ## [attachment](Density.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Density/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (ASIS CTF 2018 Quals : Density) 2 | 3 | flag : `ASIS{01d_4Nd_GoLD_ASIS_1De4_4H4t_g0e5_f0r_ls!}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Echo/Echo.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/ASIS_CTF_2018_Quals_Echo/Echo.7z -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Echo/README.md: -------------------------------------------------------------------------------- 1 | # ASIS CTF 2018 Quals : Echo 2 | 3 | - Points : 80 4 | - Solves : 62 5 | - Description : 6 | ``` 7 | The simplest echo in the world. 8 | Note: flag{whatyoufound}, submit ASIS{sha1(whatyoufound)} 9 | ``` 10 | 11 | ## [attachment](Echo.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Echo/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (ASIS CTF 2018 Quals : Echo) 2 | 3 | flag : `ASIS{7928cc0d0f66530a42d5d3a06f94bdc24f0492ff}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Heavy_makeup/Heavy_makeup.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/ASIS_CTF_2018_Quals_Heavy_makeup/Heavy_makeup.7z -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Heavy_makeup/README.md: -------------------------------------------------------------------------------- 1 | # ASIS CTF 2018 Quals : Heavy makeup 2 | 3 | - Points : 248 4 | - Solves : None 5 | - Description : 6 | ``` 7 | Many women wear facial makeup to accentuate their appeal and attractiveness, but we think faces with light makeup are better than faces with heavy makeup. What's your opinion? 8 | ``` 9 | 10 | ## [attachment](Heavy_makeup.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Heavy_makeup/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (ASIS CTF 2018 Quals : Heavy makeup) 2 | 3 | flag : `ASIS{C3llul4r_mEs5ag3_EncrypT1on_Alg0ri7hm_(CMEA)_is_a_blOck_ciph3r_which_w4S_us3d_for_secUrin9_mobiL3_PhoN35_in_tH3_US!!}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Left_or_Right?/Left_or_Right?.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/ASIS_CTF_2018_Quals_Left_or_Right?/Left_or_Right?.7z -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Left_or_Right?/README.md: -------------------------------------------------------------------------------- 1 | # ASIS CTF 2018 Quals : Left or Right? 2 | 3 | - Points : 88 4 | - Solves : None 5 | - Description : 6 | ``` 7 | Right vs Left vs Right vs Left 8 | ``` 9 | 10 | ## [attachment](Left_or_Right?.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_Left_or_Right?/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (ASIS CTF 2018 Quals : Left or Right?) 2 | 3 | flag : `ASIS{Rust_!s_Right_i5_rust_!5_rust_but_rust_!s_no7_left}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_baby_C/README.md: -------------------------------------------------------------------------------- 1 | # ASIS CTF 2018 Quals : baby C 2 | 3 | - Points : 74 4 | - Solves : 68 5 | - Description : 6 | ``` 7 | This babyc needed swaddling! 8 | flag is ASIS{sha1(input[:14])} 9 | ``` 10 | 11 | ## [attachment](baby_C.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_baby_C/baby_C.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/ASIS_CTF_2018_Quals_baby_C/baby_C.7z -------------------------------------------------------------------------------- /Medium_Easy/ASIS_CTF_2018_Quals_baby_C/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (ASIS CTF 2018 Quals : baby C) 2 | 3 | flag : `ASIS{574a1ebc69c34903a4631820f292d11fcd41b906}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/Boston_Key_Party_CTF_2016_Jit_in_my_pants/Jit_in_my_pants.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/Boston_Key_Party_CTF_2016_Jit_in_my_pants/Jit_in_my_pants.7z -------------------------------------------------------------------------------- /Medium_Easy/Boston_Key_Party_CTF_2016_Jit_in_my_pants/README.md: -------------------------------------------------------------------------------- 1 | # Boston Key Party CTF 2016 : Jit in my pants 2 | 3 | - Points : 3 4 | - Solves : 38 5 | - Description : 6 | ``` 7 | Because reversing an obfuscated jit'ed virtual machine for 3 points is fun! 8 | ``` 9 | 10 | ## [attachment](Jit_in_my_pants.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/Boston_Key_Party_CTF_2016_Jit_in_my_pants/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Boston Key Party CTF 2016 : Jit in my pants) 2 | 3 | flag : `BKPCTF{S1de_Ch4nnel_att4cks_are_s0_1338}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/PlaidCTF_2016_quick/README.md: -------------------------------------------------------------------------------- 1 | # PlaidCTF 2016 : quick 2 | 3 | - Points : 175 4 | - Solves : 49 5 | - Description : 6 | ``` 7 | Why be slow when you can be quick? 8 | ``` 9 | 10 | ## [attachment](quick.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/PlaidCTF_2016_quick/quick.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/PlaidCTF_2016_quick/quick.7z -------------------------------------------------------------------------------- /Medium_Easy/PlaidCTF_2016_quick/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (PlaidCTF 2016 : quick) 2 | 3 | flag : `PCTF{5ur3_a5_5ur3_5w1ft_a5_5w1ft}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/SSCTF_2016_Quals_Re2/README.md: -------------------------------------------------------------------------------- 1 | # SSCTF 2016 Quals : Re2 2 | 3 | - Points : 200 4 | - Solves : 53 5 | - Description : 6 | ``` 7 | Do You Like Bad Apple 8 | ``` 9 | 10 | ## [attachment](Re2.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/SSCTF_2016_Quals_Re2/Re2.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/SSCTF_2016_Quals_Re2/Re2.7z -------------------------------------------------------------------------------- /Medium_Easy/SSCTF_2016_Quals_Re2/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (SSCTF 2016 Quals : Re2) 2 | 3 | flag : `JZZZXZYP{8ZBIzPL0HPAFwdqZ{3ZXRad` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/SSCTF_2016_Quals_Re3/README.md: -------------------------------------------------------------------------------- 1 | # SSCTF 2016 Quals : Re3 2 | 3 | - Points : 300 4 | - Solves : 32 5 | - Description : 6 | ``` 7 | I Am The Prompt。 8 | ``` 9 | 10 | ## [attachment](Re3.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/SSCTF_2016_Quals_Re3/Re3.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/SSCTF_2016_Quals_Re3/Re3.7z -------------------------------------------------------------------------------- /Medium_Easy/SSCTF_2016_Quals_Re3/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (SSCTF 2016 Quals : Re3) 2 | 3 | flag : `f5b760b64D867618fFeF48FdE92B4e5d` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/VolgaCTF_2016_Quals_Broken/Broken.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/VolgaCTF_2016_Quals_Broken/Broken.7z -------------------------------------------------------------------------------- /Medium_Easy/VolgaCTF_2016_Quals_Broken/README.md: -------------------------------------------------------------------------------- 1 | # VolgaCTF 2016 Quals : Broken 2 | 3 | - Points : 200 4 | - Solves : None 5 | - Description : 6 | ``` 7 | This might be a part of GAI, but it must have been broken... Could you fix it? 8 | ``` 9 | 10 | ## [attachment](Broken.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/VolgaCTF_2016_Quals_Broken/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (VolgaCTF 2016 Quals : Broken) 2 | 3 | flag : `VolgaCTF{avoid_de@dl0cks_they_br3akyour@pp}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Easy/starctf_2018_milktea/README.md: -------------------------------------------------------------------------------- 1 | # starctf 2018 : milktea 2 | 3 | - Points : 526 4 | - Solves : 19 5 | - Description : 6 | ``` 7 | Null 8 | ``` 9 | 10 | ## [attachment](milktea.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Easy/starctf_2018_milktea/milktea.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Easy/starctf_2018_milktea/milktea.7z -------------------------------------------------------------------------------- /Medium_Easy/starctf_2018_milktea/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (starctf 2018 : milktea) 2 | 3 | flag : `*ctf{h0w_m4ny_x0r_3qu1v4l3n7_3xpr35510n_y0u_kn0wlol}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Hard/0CTF_TCTF_2018_Quals_Milk_Tea_Machine/Milk_Tea_Machine.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Hard/0CTF_TCTF_2018_Quals_Milk_Tea_Machine/Milk_Tea_Machine.7z -------------------------------------------------------------------------------- /Medium_Hard/0CTF_TCTF_2018_Quals_Milk_Tea_Machine/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF/TCTF 2018 Quals : Milk Tea Machine 2 | 3 | - Points : 647 4 | - Solves : None 5 | - Description : 6 | ``` 7 | I found this milk tea machine, but it requires a coupon. 8 | Do you know what the coupon is? 9 | ``` 10 | 11 | ## [attachment](Milk_Tea_Machine.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Hard/0CTF_TCTF_2018_Quals_Milk_Tea_Machine/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF/TCTF 2018 Quals : Milk Tea Machine) 2 | 3 | flag : `flag{a_m1lkt3a_4_d4y_k33p5_the_d0ct0r_AWAY}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Hard/0CTF_TCTF_2018_Quals_Provisioning/Provisioning.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Hard/0CTF_TCTF_2018_Quals_Provisioning/Provisioning.7z -------------------------------------------------------------------------------- /Medium_Hard/0CTF_TCTF_2018_Quals_Provisioning/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF/TCTF 2018 Quals : Provisioning 2 | 3 | - Points : 785 4 | - Solves : None 5 | - Description : 6 | ``` 7 | password on the air :) 8 | ``` 9 | 10 | ## [attachment](Provisioning.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Hard/0CTF_TCTF_2018_Quals_Provisioning/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF/TCTF 2018 Quals : Provisioning) 2 | 3 | flag : `flag{SmartCfg}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Hard/CSAW_CTF_2018_Quals_1337/1337.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Hard/CSAW_CTF_2018_Quals_1337/1337.7z -------------------------------------------------------------------------------- /Medium_Hard/CSAW_CTF_2018_Quals_1337/README.md: -------------------------------------------------------------------------------- 1 | # CSAW CTF 2018 Quals : 1337 2 | 3 | - Points : 500 4 | - Solves : 4 5 | - Description : 6 | ``` 7 | 1337 hax0rz for the win 8 | Hint: change your system to hebrew 9 | ``` 10 | 11 | ## [attachment](1337.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Hard/CSAW_CTF_2018_Quals_1337/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (CSAW CTF 2018 Quals : 1337) 2 | 3 | flag : `flag{4.\/3ry.1337.|>45$vVp@9/}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Hard/N1CTF_2018_LFI/LFI.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Hard/N1CTF_2018_LFI/LFI.7z -------------------------------------------------------------------------------- /Medium_Hard/N1CTF_2018_LFI/README.md: -------------------------------------------------------------------------------- 1 | # N1CTF 2018 : LFI 2 | 3 | - Points : 833 4 | - Solves : 5 5 | - Description : 6 | ``` 7 | Please use LuaJIT 2.0.5 to run. 8 | Hint1 : T-boxes:11(10 useful+1 null)*16*256 TyiTables:4*256*4 9 | Hint2 : dynamic link version: https://www.dropbox.com/s/jbha9z3b5jxkt43/LFI_DynamicLink.zip?dl=0 10 | Hint: If you can't understand func1, you can reverse func2(which is loaded at runtime) first to get some ideas. 11 | ``` 12 | 13 | ## [attachment](LFI.7z) 14 | 15 | ## [Write up](writeup.md) 16 | -------------------------------------------------------------------------------- /Medium_Hard/N1CTF_2018_LFI/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (N1CTF 2018 : LFI) 2 | 3 | flag : `N1CTF{Lu4F1yIng}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Hard/N1CTF_2018_baby_unity3d/README.md: -------------------------------------------------------------------------------- 1 | # N1CTF 2018 : baby unity3d 2 | 3 | - Points : 909 4 | - Solves : 3 5 | - Description : 6 | ``` 7 | Null 8 | ``` 9 | 10 | ## [attachment](baby_unity3d.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Hard/N1CTF_2018_baby_unity3d/baby_unity3d.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Hard/N1CTF_2018_baby_unity3d/baby_unity3d.7z -------------------------------------------------------------------------------- /Medium_Hard/N1CTF_2018_baby_unity3d/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (N1CTF 2018 : baby unity3d) 2 | 3 | flag : `N1CTF{h4ppy_W1TH_1l2cpp}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Hard/PlaidCTF_2018_APLunatic/README.md: -------------------------------------------------------------------------------- 1 | # PlaidCTF 2018 : APLunatic 2 | 3 | - Points : 125 4 | - Solves : 16 5 | - Description : 6 | ``` 7 | APL (ˌæ'pɪel) n. A Programming Language 8 | See: http://tryapl.org/ 9 | https://tio.run/#apl-dyalog 10 | https://ngn.github.io/apl/ 11 | lunatic (ˈluːnətɪk) n. A person who is insane 12 | See: APL Programmers 13 | aplunatic (ˌæpluːnətɪk) n. This challenge 14 | 4o6VSU/ihpAw4ouEJ0JJRcKwP8K9PklMwr1FLiEhPEUhOkU4NMKlwrjCskUyM8OFOMK7OTY4J3t74o21KH7ijbUpLydzdWNjZXNzJyAnZmFpbCd94oqDKCsv4o26PeKOlVVDUyAxMyt7Ky/ijbUv4oy9MirijbPijbTijbV9wqgsLzMzIDjijbQoOMOX4o204o21KeKNtDfijL3ijYkoLeKMiijijbQnZjB4dHIwdCcpw7cyKeKMveKNiTExIDI04o204oiKe2HiiaA44oaRKDAsYeKGkCg44o20MiniiqTijbUpfcKo4oy94o6VVUNTIOKNtSk94o204o26fSdJTlBVVCBIRVJFJwo= 15 | ``` 16 | 17 | ## [attachment](APLunatic.7z) 18 | 19 | ## [Write up](writeup.md) 20 | -------------------------------------------------------------------------------- /Medium_Hard/PlaidCTF_2018_APLunatic/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (PlaidCTF 2018 : APLunatic) 2 | 3 | flag : `PCTF{APL_code_is_we!rd_t0_l00k_@}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Hard/PlaidCTF_2018_Plaid_Adventure/Plaid_Adventure.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Hard/PlaidCTF_2018_Plaid_Adventure/Plaid_Adventure.7z -------------------------------------------------------------------------------- /Medium_Hard/PlaidCTF_2018_Plaid_Adventure/README.md: -------------------------------------------------------------------------------- 1 | # PlaidCTF 2018 : Plaid Adventure 2 | 3 | - Points : 200 4 | - Solves : 15 5 | - Description : 6 | ``` 7 | It is pitch black. 8 | You are likely to be eaten by a grue. 9 | Hint: "You can find the yellow orb in the maze." 10 | ``` 11 | 12 | ## [attachment](Plaid_Adventure.7z) 13 | 14 | ## [Write up](writeup.md) 15 | -------------------------------------------------------------------------------- /Medium_Hard/PlaidCTF_2018_Plaid_Adventure/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (PlaidCTF 2018 : Plaid Adventure) 2 | 3 | flag : `PCTF{Tw1styL1ttl3Fl4g}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_2016_Quals_trace/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF 2016 Quals : trace 2 | 3 | - Points : 4 4 | - Solves : 33 5 | - Description : 6 | ``` 7 | follow the trace trace.log 8 | update: 9 | the flag is at 0x400D80 10 | (uint32_t)0x00410EA0 == 0x400D80 11 | ``` 12 | 13 | ## [attachment](trace.7z) 14 | 15 | ## [Write up](writeup.md) 16 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_2016_Quals_trace/trace.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/0CTF_2016_Quals_trace/trace.7z -------------------------------------------------------------------------------- /Medium_Medium/0CTF_2016_Quals_trace/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF 2016 Quals : trace) 2 | 3 | flag : `0ctf{tr135m1k5l96551s9l5r}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_Baby_VM/Baby_VM.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/0CTF_TCTF_2018_Quals_Baby_VM/Baby_VM.7z -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_Baby_VM/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF/TCTF 2018 Quals : Baby VM 2 | 3 | - Points : 423 4 | - Solves : None 5 | - Description : 6 | ``` 7 | Flag is in the current directory with name "flag.txt". 8 | ``` 9 | 10 | ## [attachment](Baby_VM.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_Baby_VM/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF/TCTF 2018 Quals : Baby VM) 2 | 3 | flag : `None` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_g0g0g0/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF/TCTF 2018 Quals : g0g0g0 2 | 3 | - Points : 343 4 | - Solves : None 5 | - Description : 6 | ``` 7 | mdZero says that he has tons of excellent tools. However, he has never showed his magic to us before. "They are all stored in my mobile HDD. At home, not here". That's what he told us when we were asking, every time! 8 | Once, we forced him to tell us, or he would be sent to cops. Then he take out this one from his pocket. Could you help me to figure out what is it? 9 | To verify your answer, please visit: 10 | nc 202.120.7.206 13337 11 | ``` 12 | 13 | ## [attachment](g0g0g0.7z) 14 | 15 | ## [Write up](writeup.md) 16 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_g0g0g0/g0g0g0.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/0CTF_TCTF_2018_Quals_g0g0g0/g0g0g0.7z -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_g0g0g0/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF/TCTF 2018 Quals : g0g0g0) 2 | 3 | flag : `269103113846520710198086599018316928810831097261381335767926880507079911347095440987749703663156874995907158014866846058485318408629957749519665987782327830143454337518378955846463785600977, 221855981602380704196804518854316541759883857932028285581812549404634844243737502744011549757448453135493556098964216532950604590733853450272184987603430882682754171300742698179931849310347, 4862378745380642626737318101484977637219057323564658907686653339599714454790559130946320953938197181210525554039710122136086190642013402927952831079021210585653078786813279351784906397934209` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_udp/README.md: -------------------------------------------------------------------------------- 1 | # 0CTF/TCTF 2018 Quals : udp 2 | 3 | - Points : 305 4 | - Solves : None 5 | - Description : 6 | ``` 7 | too many udp 8 | ``` 9 | 10 | ## [attachment](udp.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_udp/udp.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/0CTF_TCTF_2018_Quals_udp/udp.7z -------------------------------------------------------------------------------- /Medium_Medium/0CTF_TCTF_2018_Quals_udp/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (0CTF/TCTF 2018 Quals : udp) 2 | 3 | flag : `flag{12491f295fb0}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/ASIS_CTF_2018_Quals_The_true_origin/README.md: -------------------------------------------------------------------------------- 1 | # ASIS CTF 2018 Quals : The true origin 2 | 3 | - Points : 394 4 | - Solves : None 5 | - Description : 6 | ``` 7 | Find the true origin of this algorithm! 8 | ``` 9 | 10 | ## [attachment](The_true_origin.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/ASIS_CTF_2018_Quals_The_true_origin/The_true_origin.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/ASIS_CTF_2018_Quals_The_true_origin/The_true_origin.7z -------------------------------------------------------------------------------- /Medium_Medium/ASIS_CTF_2018_Quals_The_true_origin/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (ASIS CTF 2018 Quals : The true origin) 2 | 3 | flag : `ASIS{65e05d26ea3f3a2518e29fa77744f2b0}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/Boston_Key_Party_CTF_2016_unholy/README.md: -------------------------------------------------------------------------------- 1 | # Boston Key Party CTF 2016 : unholy 2 | 3 | - Points : 4 4 | - Solves : 61 5 | - Description : 6 | ``` 7 | python or ruby? why not both! 8 | ``` 9 | 10 | ## [attachment](unholy.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/Boston_Key_Party_CTF_2016_unholy/unholy.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/Boston_Key_Party_CTF_2016_unholy/unholy.7z -------------------------------------------------------------------------------- /Medium_Medium/Boston_Key_Party_CTF_2016_unholy/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Boston Key Party CTF 2016 : unholy) 2 | 3 | flag : `BKPCTF{hmmm _why did i even do this}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/CSAW_CTF_2018_Quals_kvm/README.md: -------------------------------------------------------------------------------- 1 | # CSAW CTF 2018 Quals : kvm 2 | 3 | - Points : 500 4 | - Solves : 58 5 | - Description : 6 | ``` 7 | We found a mysterious program that none of our most talented hackers could even begin to figure out. 8 | Author: toshi 9 | ``` 10 | 11 | ## [attachment](kvm.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Medium/CSAW_CTF_2018_Quals_kvm/kvm.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/CSAW_CTF_2018_Quals_kvm/kvm.7z -------------------------------------------------------------------------------- /Medium_Medium/CSAW_CTF_2018_Quals_kvm/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (CSAW CTF 2018 Quals : kvm) 2 | 3 | flag : `flag{who would win? 100 ctf teams or 1 obfuscat3d boi?}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/Codegate_CTF_2018_Preliminary_6051/6051.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/Codegate_CTF_2018_Preliminary_6051/6051.7z -------------------------------------------------------------------------------- /Medium_Medium/Codegate_CTF_2018_Preliminary_6051/README.md: -------------------------------------------------------------------------------- 1 | # Codegate CTF 2018 Preliminary : 6051 2 | 3 | - Points : 880 4 | - Solves : 11 5 | - Description : 6 | ``` 7 | find the flag 8 | ``` 9 | 10 | ## [attachment](6051.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/Codegate_CTF_2018_Preliminary_6051/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Codegate CTF 2018 Preliminary : 6051) 2 | 3 | flag : `FLAG{w0w_w0w_w0w_s1mp13_str1n9_c0mpr3ss10n_1011110100011}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/Google_CTF_2018_Quals_Back_to_the_BASICs/Back_to_the_BASICs.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/Google_CTF_2018_Quals_Back_to_the_BASICs/Back_to_the_BASICs.7z -------------------------------------------------------------------------------- /Medium_Medium/Google_CTF_2018_Quals_Back_to_the_BASICs/README.md: -------------------------------------------------------------------------------- 1 | # Google CTF 2018 Quals : Back to the BASICs 2 | 3 | - Points : 293 4 | - Solves : 21 5 | - Description : 6 | ``` 7 | You won't find any assembly in this challenge, only C64 BASIC. Once you get the password, the flag is CTF{password}. 8 | P.S. The challenge has been tested on the VICE emulator. 9 | ``` 10 | 11 | ## [attachment](Back_to_the_BASICs.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Medium/Google_CTF_2018_Quals_Back_to_the_BASICs/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Google CTF 2018 Quals : Back to the BASICs) 2 | 3 | flag : `CTF{LINKED-LISTS-AND-40-BIT-FLOATS}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/N1CTF_2018_baby_neural_network/README.md: -------------------------------------------------------------------------------- 1 | # N1CTF 2018 : baby_neural_network 2 | 3 | - Points : 740 4 | - Solves : 8 5 | - Description : 6 | ``` 7 | Null 8 | ``` 9 | 10 | ## [attachment](baby_neural_network.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/N1CTF_2018_baby_neural_network/baby_neural_network.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/N1CTF_2018_baby_neural_network/baby_neural_network.7z -------------------------------------------------------------------------------- /Medium_Medium/N1CTF_2018_baby_neural_network/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (N1CTF 2018 : baby_neural_network) 2 | 3 | flag : `N1CTF{N3ural_Network_1s_Really_Fantastic}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/N1CTF_2018_patience/README.md: -------------------------------------------------------------------------------- 1 | # N1CTF 2018 : patience 2 | 3 | - Points : 769 4 | - Solves : 7 5 | - Description : 6 | ``` 7 | You will get the flag...... eventually! 8 | ``` 9 | 10 | ## [attachment](patience.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/N1CTF_2018_patience/patience.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/N1CTF_2018_patience/patience.7z -------------------------------------------------------------------------------- /Medium_Medium/N1CTF_2018_patience/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (N1CTF 2018 : patience) 2 | 3 | flag : `N1CTF{did_cmm_helped?1109ef6af4b2c6fc274ddc16ff8365d1}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_4/Matriochka_-_Step_4.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_4/Matriochka_-_Step_4.7z -------------------------------------------------------------------------------- /Medium_Medium/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_4/README.md: -------------------------------------------------------------------------------- 1 | # Nuit du Hack CTF Quals 2016 : Matriochka - Step 4 2 | 3 | - Points : 500 4 | - Solves : 51 5 | - Description : 6 | ``` 7 | Recently, I found an executable binary. 8 | As I'm a true newbie, 9 | Certainly, to solve it, I will have difficulties. 10 | Keep in mind, the first step is quite easy. 11 | Maybe the last one will be quite tricky. 12 | Emulating it could be a good idea. 13 | You must solve steps 1, 2 and 3 first. 14 | ``` 15 | 16 | ## [attachment](Matriochka_-_Step_4.7z) 17 | 18 | ## [Write up](writeup.md) 19 | -------------------------------------------------------------------------------- /Medium_Medium/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_4/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (Nuit du Hack CTF Quals 2016 : Matriochka - Step 4) 2 | 3 | flag : `Ddr1ml/frf` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/PlaidCTF_2016_quite_quixotic_quest/README.md: -------------------------------------------------------------------------------- 1 | # PlaidCTF 2016 : quite quixotic quest 2 | 3 | - Points : 300 4 | - Solves : 40 5 | - Description : 6 | ``` 7 | Well yes, it certainly is quite quixotic. (Yes, the flag format is PCTF{} ) 8 | ``` 9 | 10 | ## [attachment](quite_quixotic_quest.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/PlaidCTF_2016_quite_quixotic_quest/quite_quixotic_quest.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/PlaidCTF_2016_quite_quixotic_quest/quite_quixotic_quest.7z -------------------------------------------------------------------------------- /Medium_Medium/PlaidCTF_2016_quite_quixotic_quest/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (PlaidCTF 2016 : quite quixotic quest) 2 | 3 | flag : `PCTF{just_a_l1ttle_thing_1_l1ke_t0_call_ropfuscation}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_BabyDroid/BabyDroid.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/starctf_2018_BabyDroid/BabyDroid.7z -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_BabyDroid/README.md: -------------------------------------------------------------------------------- 1 | # starctf 2018 : BabyDroid 2 | 3 | - Points : 645 4 | - Solves : 12 5 | - Description : 6 | ``` 7 | Hint1 : It's not neccessary to run the apk. If you want to run it, we suggest you to use Android with Dalvik on real phone. If you failed to run the apk, pls just try to reverse it statically. 8 | Hint2 : submit *ctf{what_you_input} 9 | ``` 10 | 11 | ## [attachment](BabyDroid.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_BabyDroid/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (starctf 2018 : BabyDroid) 2 | 3 | flag : `*ctf{1nTr3stIng-AnDr0id-A&D!}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_fans_of_xdd/README.md: -------------------------------------------------------------------------------- 1 | # starctf 2018 : fans_of_xdd 2 | 3 | - Points : 952 4 | - Solves : 2 5 | - Description : 6 | ``` 7 | I'm new to ctf. I don't know how to reenigne, so x140dada tell me that, i should learn it by reading this file. Can you help me? 8 | you need a mac, sorry to windows/linux users 9 | ``` 10 | 11 | ## [attachment](fans_of_xdd.7z) 12 | 13 | ## [Write up](writeup.md) 14 | -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_fans_of_xdd/fans_of_xdd.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/starctf_2018_fans_of_xdd/fans_of_xdd.7z -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_fans_of_xdd/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (starctf 2018 : fans_of_xdd) 2 | 3 | flag : `*ctf{i_4m_not_b1G_fAns_0f_M4c5cr1pT>.<}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_wasm/README.md: -------------------------------------------------------------------------------- 1 | # starctf 2018 : wasm 2 | 3 | - Points : 714 4 | - Solves : 9 5 | - Description : 6 | ``` 7 | Webassembly is interesting. 8 | ``` 9 | 10 | ## [attachment](wasm.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_wasm/wasm.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/N4NU/Reversing-Challenges-List/0102b99bac602c72aab479ddad0f6cb44b0bd499/Medium_Medium/starctf_2018_wasm/wasm.7z -------------------------------------------------------------------------------- /Medium_Medium/starctf_2018_wasm/writeup.md: -------------------------------------------------------------------------------- 1 | # Write up (starctf 2018 : wasm) 2 | 3 | flag : `*ctf{web4ss3mbly_1s_god}` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Reversing Challenges List 2 | 3 | If there is no writeup about reversing tasks of past CTF and you need, please make the issue. 4 | 5 | 過去のCTFのrev問でwriteupが無かったり,日本語のwriteupがほしい場合にissueを立ててくれれば出来るだけ解いて日本語のwriteupを書いていこうと思います. 6 | 7 | ## Baby 8 | * [Sharif University CTF 2016 : dMd](Baby/Sharif_University_CTF_2016_dMd/README.md) 9 | * [Sharif University CTF 2016 : SRM](Baby/Sharif_University_CTF_2016_SRM/README.md) 10 | * [Sharif University CTF 2016 : Serial](Baby/Sharif_University_CTF_2016_Serial/README.md) 11 | * [Sharif University CTF 2016 : Android App](Baby/Sharif_University_CTF_2016_Android_App/README.md) 12 | * [Internetwache CTF 2016 : SPIM](Baby/Internetwache_CTF_2016_SPIM/README.md) 13 | * [Internetwache CTF 2016 : File Checker](Baby/Internetwache_CTF_2016_File_Checker/README.md) 14 | * [Internetwache CTF 2016 : ServerfARM](Baby/Internetwache_CTF_2016_ServerfARM/README.md) 15 | * [Nuit du Hack CTF Quals 2016 : Matriochka - Step 1](Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_1/README.md) 16 | * [Nuit du Hack CTF Quals 2016 : Matriochka - Step 2](Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_2/README.md) 17 | * [Nuit du Hack CTF Quals 2016 : Matriochka - Step 3](Baby/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_3/README.md) 18 | * [ASIS CTF 2018 Quals : Warm up](Baby/ASIS_CTF_2018_Quals_Warm_up/README.md) 19 | 20 | ## Easy 21 | * [SSCTF 2016 : Re1](Easy/SSCTF_2016_Re1/README.md) 22 | * [0CTF 2016 Quals : boomshakalaka](Easy/0CTF_2016_Quals_boomshakalaka/README.md) 23 | * [Codegate CTF 2018 Preliminary : RedVelvet](Easy/Codegate_CTF_2018_Preliminary_RedVelvet/README.md) 24 | * [Codegate CTF 2018 Preliminary : Welcome to droid](Easy/Codegate_CTF_2018_Preliminary_Welcome_to_droid/README.md) 25 | * [Codegate CTF 2018 Preliminary : easy_serial](Easy/Codegate_CTF_2018_Preliminary_easy_serial/README.md) 26 | * [Google CTF 2018 Quals : Shall we play a game?](Easy/Google_CTF_2018_Quals_Shall_we_play_a_game?/README.md) 27 | 28 | ## Medium Easy 29 | * [SSCTF 2016 Quals : Re2](Medium_Easy/SSCTF_2016_Quals_Re2/README.md) 30 | * [SSCTF 2016 Quals : Re3](Medium_Easy/SSCTF_2016_Quals_Re3/README.md) 31 | * [Boston Key Party CTF 2016 : Jit in my pants](Medium_Easy/Boston_Key_Party_CTF_2016_Jit_in_my_pants/README.md) 32 | * [0CTF 2016 Quals : momo](Medium_Easy/0CTF_2016_Quals_momo/README.md) 33 | * [VolgaCTF 2016 Quals : Broken](Medium_Easy/VolgaCTF_2016_Quals_Broken/README.md) 34 | * [PlaidCTF 2016 : quick](Medium_Easy/PlaidCTF_2016_quick/README.md) 35 | * [starctf 2018 : milktea](Medium_Easy/starctf_2018_milktea/README.md) 36 | * [ASIS CTF 2018 Quals : baby C](Medium_Easy/ASIS_CTF_2018_Quals_baby_C/README.md) 37 | * [ASIS CTF 2018 Quals : Echo](Medium_Easy/ASIS_CTF_2018_Quals_Echo/README.md) 38 | * [ASIS CTF 2018 Quals : Left or Right?](Medium_Easy/ASIS_CTF_2018_Quals_Left_or_Right?/README.md) 39 | * [ASIS CTF 2018 Quals : Density](Medium_Easy/ASIS_CTF_2018_Quals_Density/README.md) 40 | * [ASIS CTF 2018 Quals : Heavy makeup](Medium_Easy/ASIS_CTF_2018_Quals_Heavy_makeup/README.md) 41 | 42 | ## Medium Medium 43 | * [Boston Key Party CTF 2016 : unholy](Medium_Medium/Boston_Key_Party_CTF_2016_unholy/README.md) 44 | * [0CTF 2016 Quals : trace](Medium_Medium/0CTF_2016_Quals_trace/README.md) 45 | * [Nuit du Hack CTF Quals 2016 : Matriochka - Step 4](Medium_Medium/Nuit_du_Hack_CTF_Quals_2016_Matriochka_-_Step_4/README.md) 46 | * [PlaidCTF 2016 : quite quixotic quest](Medium_Medium/PlaidCTF_2016_quite_quixotic_quest/README.md) 47 | * [Codegate CTF 2018 Preliminary : 6051](Medium_Medium/Codegate_CTF_2018_Preliminary_6051/README.md) 48 | * [N1CTF 2018 : patience](Medium_Medium/N1CTF_2018_patience/README.md) 49 | * [N1CTF 2018 : baby_neural_network](Medium_Medium/N1CTF_2018_baby_neural_network/README.md) 50 | * [0CTF/TCTF 2018 Quals : g0g0g0](Medium_Medium/0CTF_TCTF_2018_Quals_g0g0g0/README.md) 51 | * [0CTF/TCTF 2018 Quals : udp](Medium_Medium/0CTF_TCTF_2018_Quals_udp/README.md) 52 | * [0CTF/TCTF 2018 Quals : Baby VM](Medium_Medium/0CTF_TCTF_2018_Quals_Baby_VM/README.md) 53 | * [starctf 2018 : fans_of_xdd](Medium_Medium/starctf_2018_fans_of_xdd/README.md) 54 | * [starctf 2018 : BabyDroid](Medium_Medium/starctf_2018_BabyDroid/README.md) 55 | * [starctf 2018 : wasm](Medium_Medium/starctf_2018_wasm/README.md) 56 | * [ASIS CTF 2018 Quals : The true origin](Medium_Medium/ASIS_CTF_2018_Quals_The_true_origin/README.md) 57 | * [Google CTF 2018 Quals : Back to the BASICs](Medium_Medium/Google_CTF_2018_Quals_Back_to_the_BASICs/README.md) 58 | * [CSAW CTF 2018 Quals : kvm](Medium_Medium/CSAW_CTF_2018_Quals_kvm/README.md) 59 | 60 | ## Medium Hard 61 | * [N1CTF 2018 : LFI](Medium_Hard/N1CTF_2018_LFI/README.md) 62 | * [N1CTF 2018 : baby unity3d](Medium_Hard/N1CTF_2018_baby_unity3d/README.md) 63 | * [0CTF/TCTF 2018 Quals : Milk Tea Machine](Medium_Hard/0CTF_TCTF_2018_Quals_Milk_Tea_Machine/README.md) 64 | * [0CTF/TCTF 2018 Quals : Provisioning](Medium_Hard/0CTF_TCTF_2018_Quals_Provisioning/README.md) 65 | * [PlaidCTF 2018 : Plaid Adventure](Medium_Hard/PlaidCTF_2018_Plaid_Adventure/README.md) 66 | * [PlaidCTF 2018 : APLunatic](Medium_Hard/PlaidCTF_2018_APLunatic/README.md) 67 | * [CSAW CTF 2018 Quals : 1337](Medium_Hard/CSAW_CTF_2018_Quals_1337/README.md) 68 | 69 | ## Hard 70 | * [N1CTF 2018 : OldDriver of Akina](Hard/N1CTF_2018_OldDriver_of_Akina/README.md) 71 | 72 | -------------------------------------------------------------------------------- /conf.yaml: -------------------------------------------------------------------------------- 1 | criterions: 2 | - Baby 3 | - Easy 4 | - Medium Easy 5 | - Medium Medium 6 | - Medium Hard 7 | - Hard 8 | -------------------------------------------------------------------------------- /criterion.md: -------------------------------------------------------------------------------- 1 | # Criterion of each levels / 各難易度の目安 2 | ## Baby 3 | - 10 minutes 4 | 5 | ## Easy 6 | - 30 minutes 7 | 8 | ## Medium Easy 9 | - 1 hour 10 | 11 | ## Medium Medium 12 | - 3 hours 13 | 14 | ## Medium Hard 15 | - 6 hours 16 | 17 | ## Hard 18 | - 12 hours 19 | -------------------------------------------------------------------------------- /gen_files.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python3 2 | import yaml 3 | import os 4 | 5 | def escape_path(s): 6 | return s.replace(' ', '_').replace('/', '_') 7 | 8 | def gen_main_readme(conf): 9 | f = open('README.md', 'w') 10 | 11 | f.write("# Reversing Challenges List\n\n") 12 | msg = '' 13 | msg += 'If there is no writeup about reversing tasks of past CTF and you need, please make the issue.\n\n' 14 | msg += '過去のCTFのrev問でwriteupが無かったり,日本語のwriteupがほしい場合にissueを立ててくれれば出来るだけ解いて日本語のwriteupを書いていこうと思います.\n\n' 15 | f.write(msg) 16 | 17 | criterions = conf['criterions'] 18 | for criterion in criterions: 19 | problems = yaml.load(open('./problem_list/' + escape_path(criterion) + '.yaml', 'r').read()) 20 | f.write("## " + criterion + "\n") 21 | for p in problems: 22 | ctf_name = p['ctf_name'] 23 | problem_name = str(p['problem_name']) 24 | f.write(' * [{0:s} : {1:s}]({2:s}/{3:s}/README.md)\n'.format(ctf_name, problem_name, escape_path(criterion), escape_path(ctf_name) + '_' + escape_path(problem_name))) 25 | f.write('\n') 26 | 27 | f.close() 28 | 29 | def gen_problem_dirs(conf): 30 | criterions = conf['criterions'] 31 | for criterion in criterions: 32 | problems = yaml.load(open('./problem_list/' + escape_path(criterion) + '.yaml', 'r').read()) 33 | for p in problems: 34 | ctf_name = p['ctf_name'] 35 | problem_name = str(p['problem_name']) 36 | try: 37 | os.makedirs('{0:s}/{1:s}'.format(escape_path(criterion), escape_path(ctf_name) + '_' + escape_path(problem_name))) 38 | except FileExistsError: 39 | pass 40 | 41 | def gen_readme(readme_path, ctf_name, problem_name, points, solves, description): 42 | d = open('problem_template.md', 'r').read() 43 | d = d.replace('CTF_NAME', ctf_name) 44 | d = d.replace('PROBLEM_NAME', problem_name) 45 | d = d.replace('POINTS', points) 46 | d = d.replace('SOLVES', solves) 47 | d = d.replace('DESCRIPTION', description) 48 | d = d.replace('ATTACHMENT', problem_name.replace(' ', '_')) 49 | open(readme_path, 'w').write(d) 50 | 51 | 52 | def gen_writeup(writeup_path, ctf_name, problem_name, flag): 53 | d = open('writeup_template.md', 'r').read() 54 | d = d.replace('CTF_NAME', ctf_name) 55 | d = d.replace('PROBLEM_NAME', problem_name) 56 | d = d.replace('FLAG', flag) 57 | open(writeup_path, 'w').write(d) 58 | 59 | def gen_problem_files(conf): 60 | criterions = conf['criterions'] 61 | for criterion in criterions: 62 | problems = yaml.load(open('./problem_list/' + escape_path(criterion) + '.yaml', 'r').read()) 63 | for p in problems: 64 | ctf_name = p['ctf_name'] 65 | problem_name = str(p['problem_name']) 66 | points = p['points'] 67 | solves = p['solves'] 68 | description = p['description'] 69 | flag = str(p['flag']) 70 | 71 | path = '{0:s}/{1:s}/'.format(escape_path(criterion), escape_path(ctf_name) + '_' + escape_path(problem_name)) 72 | readme_path = path + 'README.md' 73 | writeup_path = path + 'writeup.md' 74 | if os.path.exists(readme_path): 75 | continue 76 | gen_readme(readme_path, ctf_name, problem_name, str(points), str(solves), description.strip()) 77 | gen_writeup(writeup_path, ctf_name, problem_name, flag) 78 | 79 | def main(): 80 | conf = yaml.load(open('conf.yaml', 'r').read()) 81 | gen_main_readme(conf) 82 | gen_problem_dirs(conf) 83 | gen_problem_files(conf) 84 | 85 | if __name__ == '__main__': 86 | main() 87 | -------------------------------------------------------------------------------- /problem_list/Baby.yaml: -------------------------------------------------------------------------------- 1 | - ctf_name: Sharif University CTF 2016 2 | problem_name: dMd 3 | points: 50 4 | solves: 243 5 | description: | 6 | Flag is : The valid input 7 | Download dMd 8 | flag: grape 9 | 10 | - ctf_name: Sharif University CTF 2016 11 | problem_name: SRM 12 | points: 50 13 | solves: 173 14 | description: | 15 | The flag is : The valid serial number 16 | Download RM.exe 17 | flag: CZ9dmq4c8g9G7bAX 18 | 19 | - ctf_name: Sharif University CTF 2016 20 | problem_name: Serial 21 | points: 150 22 | solves: 108 23 | description: | 24 | Run and capture the flag! 25 | Download serial 26 | flag: EZ9dmq4c8g9G7bAV 27 | 28 | - ctf_name: Sharif University CTF 2016 29 | problem_name: Android App 30 | points: 100 31 | solves: 58 32 | description: | 33 | Find the Flag!! 34 | Download Sharif_CTF.apk 35 | flag: Sharif_CTF{833489ef285e6fa80690099efc5d9c9d} 36 | 37 | - ctf_name: Internetwache CTF 2016 38 | problem_name: SPIM 39 | points: 50 40 | solves: 208 41 | description: | 42 | Description: My friend keeps telling me, that real hackers speak assembly fluently. Are you a real hacker? Decode this string: "IVyN5U3X)ZUMYCs" 43 | flag: IW{M1P5_!S_FUN} 44 | 45 | - ctf_name: Internetwache CTF 2016 46 | problem_name: File Checker 47 | points: 60 48 | solves: 190 49 | description: | 50 | Description: My friend sent me this file. He told that if I manage to reverse it, I'll have access to all his devices. My misfortune that I don't know anything about reversing :/ 51 | Attachment: rev60.zip 52 | flag: IW{FILE_CHeCKa} 53 | 54 | - ctf_name: Internetwache CTF 2016 55 | problem_name: ServerfARM 56 | points: 70 57 | solves: 156 58 | description: | 59 | Description: Someone handed me this and told me that to pass the exam, I have to extract a secret string. I know cheating is bad, but once does not count. So are you willing to help me? 60 | Attachment: rev70.zip 61 | flag: IW{S.E.R.V.E.R>=F:A:R:M} 62 | 63 | - ctf_name: Nuit du Hack CTF Quals 2016 64 | problem_name: Matriochka - Step 1 65 | points: 50 66 | solves: 432 67 | description: | 68 | Can you help me? 69 | Recently, I found an executable binary. 70 | As I'm a true newbie, 71 | Certainly, to solve it, I will have difficulties. 72 | Keep in mind, the first step is quite easy. 73 | Maybe the last one will be quite tricky. 74 | Emulating it could be a good idea. 75 | The challenge is available at : http://static.quals.nuitduhack.com/stage1.bin 76 | flag: Much_secure__So_safe__Wow 77 | 78 | - ctf_name: Nuit du Hack CTF Quals 2016 79 | problem_name: Matriochka - Step 2 80 | points: 100 81 | solves: 232 82 | description: | 83 | Can you help me? 84 | Recently, I found an executable binary. 85 | As I'm a true newbie, 86 | Certainly, to solve it, I will have difficulties. 87 | Keep in mind, the first step is quite easy. 88 | Maybe the last one will be quite tricky. 89 | Emulating it could be a good idea. 90 | You must solve step 1 first. 91 | flag: Pandi_panda 92 | 93 | - ctf_name: Nuit du Hack CTF Quals 2016 94 | problem_name: Matriochka - Step 3 95 | points: 300 96 | solves: 185 97 | description: | 98 | Recently, I found an executable binary. 99 | As I'm a true newbie, 100 | Certainly, to solve it, I will have difficulties. 101 | Keep in mind, the first step is quite easy. 102 | Maybe the last one will be quite tricky. 103 | Emulating it could be a good idea. 104 | You must solve steps 1 and 2 first. 105 | flag: Did_you_like_signals? 106 | 107 | - ctf_name: ASIS CTF 2018 Quals 108 | problem_name: Warm up 109 | points: 27 110 | solves: 283 111 | description: | 112 | Must-Have Pre-Workout Warm up Challenge. 113 | flag: ASIS{hi_all_w31c0m3_to_ASISCTF} 114 | -------------------------------------------------------------------------------- /problem_list/Easy.yaml: -------------------------------------------------------------------------------- 1 | - ctf_name: SSCTF 2016 2 | problem_name: Re1 3 | points: 100 4 | solves: 83 5 | description: | 6 | Null 7 | flag: SSCTF{oty3eaP$g986iwhw32j%OJ)g0o7J.CG:} 8 | 9 | - ctf_name: 0CTF 2016 Quals 10 | problem_name: boomshakalaka 11 | points: 3 12 | solves: 35 13 | description: | 14 | play the game, get the highest score 15 | flag: 0ctf{C0coS2d_AnDro1d_G0mE_YoU_Kn0w?} 16 | 17 | - ctf_name: Codegate CTF 2018 Preliminary 18 | problem_name: RedVelvet 19 | points: 75 20 | solves: 126 21 | description: | 22 | Happiness:) 23 | flag: What_You_Wanna_Be?:)_la_la 24 | 25 | - ctf_name: Codegate CTF 2018 Preliminary 26 | problem_name: Welcome to droid 27 | points: 125 28 | solves: 71 29 | description: | 30 | > o < 31 | flag: FLAG{W3_w3r3_Back_70_$3v3n7een!!!} 32 | 33 | - ctf_name: Codegate CTF 2018 Preliminary 34 | problem_name: easy_serial 35 | points: 350 36 | solves: 40 37 | description: | 38 | Null 39 | flag: Flag{S0me0fU5#4r3L00king#AtTh3St4rs} 40 | 41 | - ctf_name: Google CTF 2018 Quals 42 | problem_name: Shall we play a game? 43 | points: 113 44 | solves: 111 45 | description: | 46 | Win the game 1,000,000 times to get the flag. 47 | flag: CTF{ThLssOfInncncIsThPrcOfAppls} -------------------------------------------------------------------------------- /problem_list/Hard.yaml: -------------------------------------------------------------------------------- 1 | - ctf_name: N1CTF 2018 2 | problem_name: OldDriver of Akina 3 | points: 1000 4 | solves: 1 5 | description: | 6 | I have a great image for you. but how to open it? 7 | Hint1 : Do you know how to map the data to an interval in the real axis? 8 | Hint2 : Can you convert the code to a "function"? 9 | flag: N1CTF{olD_Driv3r_Has_a_1mg_For_you} -------------------------------------------------------------------------------- /problem_list/Medium_Easy.yaml: -------------------------------------------------------------------------------- 1 | - ctf_name: SSCTF 2016 Quals 2 | problem_name: Re2 3 | points: 200 4 | solves: 53 5 | description: | 6 | Do You Like Bad Apple 7 | flag: JZZZXZYP{8ZBIzPL0HPAFwdqZ{3ZXRad 8 | 9 | - ctf_name: SSCTF 2016 Quals 10 | problem_name: Re3 11 | points: 300 12 | solves: 32 13 | description: | 14 | I Am The Prompt。 15 | flag: f5b760b64D867618fFeF48FdE92B4e5d 16 | 17 | - ctf_name: Boston Key Party CTF 2016 18 | problem_name: Jit in my pants 19 | points: 3 20 | solves: 38 21 | description: | 22 | Because reversing an obfuscated jit'ed virtual machine for 3 points is fun! 23 | flag: BKPCTF{S1de_Ch4nnel_att4cks_are_s0_1338} 24 | 25 | - ctf_name: 0CTF 2016 Quals 26 | problem_name: momo 27 | points: 3 28 | solves: 31 29 | description: | 30 | I think it's hard winning a war with words. 31 | flag: 0ctf{m0V_I5_tUr1N9_c0P1Et3!} 32 | 33 | - ctf_name: VolgaCTF 2016 Quals 34 | problem_name: Broken 35 | points: 200 36 | solves: 37 | description: | 38 | This might be a part of GAI, but it must have been broken... Could you fix it? 39 | flag: VolgaCTF{avoid_de@dl0cks_they_br3akyour@pp} 40 | 41 | - ctf_name: PlaidCTF 2016 42 | problem_name: quick 43 | points: 175 44 | solves: 49 45 | description: | 46 | Why be slow when you can be quick? 47 | flag: PCTF{5ur3_a5_5ur3_5w1ft_a5_5w1ft} 48 | 49 | - ctf_name: starctf 2018 50 | problem_name: milktea 51 | points: 526 52 | solves: 19 53 | description: | 54 | Null 55 | flag: '*ctf{h0w_m4ny_x0r_3qu1v4l3n7_3xpr35510n_y0u_kn0wlol}' 56 | 57 | - ctf_name: ASIS CTF 2018 Quals 58 | problem_name: baby C 59 | points: 74 60 | solves: 68 61 | description: | 62 | This babyc needed swaddling! 63 | flag is ASIS{sha1(input[:14])} 64 | flag: ASIS{574a1ebc69c34903a4631820f292d11fcd41b906} 65 | 66 | - ctf_name: ASIS CTF 2018 Quals 67 | problem_name: Echo 68 | points: 80 69 | solves: 62 70 | description: | 71 | The simplest echo in the world. 72 | Note: flag{whatyoufound}, submit ASIS{sha1(whatyoufound)} 73 | flag: ASIS{7928cc0d0f66530a42d5d3a06f94bdc24f0492ff} 74 | 75 | - ctf_name: ASIS CTF 2018 Quals 76 | problem_name: Left or Right? 77 | points: 88 78 | solves: Null 79 | description: | 80 | Right vs Left vs Right vs Left 81 | flag: ASIS{Rust_!s_Right_i5_rust_!5_rust_but_rust_!s_no7_left} 82 | 83 | - ctf_name: ASIS CTF 2018 Quals 84 | problem_name: Density 85 | points: 148 86 | solves: 27 87 | description: | 88 | Keep it short and simple 89 | flag: ASIS{01d_4Nd_GoLD_ASIS_1De4_4H4t_g0e5_f0r_ls!} 90 | 91 | - ctf_name: ASIS CTF 2018 Quals 92 | problem_name: Heavy makeup 93 | points: 248 94 | solves: Null 95 | description: | 96 | Many women wear facial makeup to accentuate their appeal and attractiveness, but we think faces with light makeup are better than faces with heavy makeup. What's your opinion? 97 | flag: ASIS{C3llul4r_mEs5ag3_EncrypT1on_Alg0ri7hm_(CMEA)_is_a_blOck_ciph3r_which_w4S_us3d_for_secUrin9_mobiL3_PhoN35_in_tH3_US!!} 98 | -------------------------------------------------------------------------------- /problem_list/Medium_Hard.yaml: -------------------------------------------------------------------------------- 1 | - ctf_name: N1CTF 2018 2 | problem_name: LFI 3 | points: 833 4 | solves: 5 5 | description: | 6 | Please use LuaJIT 2.0.5 to run. 7 | Hint1 : T-boxes:11(10 useful+1 null)*16*256 TyiTables:4*256*4 8 | Hint2 : dynamic link version: https://www.dropbox.com/s/jbha9z3b5jxkt43/LFI_DynamicLink.zip?dl=0 9 | Hint: If you can't understand func1, you can reverse func2(which is loaded at runtime) first to get some ideas. 10 | flag: N1CTF{Lu4F1yIng} 11 | 12 | - ctf_name: N1CTF 2018 13 | problem_name: baby unity3d 14 | points: 909 15 | solves: 3 16 | description: | 17 | Null 18 | flag: N1CTF{h4ppy_W1TH_1l2cpp} 19 | 20 | - ctf_name: 0CTF/TCTF 2018 Quals 21 | problem_name: Milk Tea Machine 22 | points: 647 23 | solves: Null 24 | description: | 25 | I found this milk tea machine, but it requires a coupon. 26 | Do you know what the coupon is? 27 | flag: flag{a_m1lkt3a_4_d4y_k33p5_the_d0ct0r_AWAY} 28 | 29 | - ctf_name: 0CTF/TCTF 2018 Quals 30 | problem_name: Provisioning 31 | points: 785 32 | solves: Null 33 | description: | 34 | password on the air :) 35 | flag: flag{SmartCfg} 36 | 37 | - ctf_name: PlaidCTF 2018 38 | problem_name: Plaid Adventure 39 | points: 200 40 | solves: 15 41 | description: | 42 | It is pitch black. 43 | You are likely to be eaten by a grue. 44 | Hint: "You can find the yellow orb in the maze." 45 | flag: PCTF{Tw1styL1ttl3Fl4g} 46 | 47 | - ctf_name: PlaidCTF 2018 48 | problem_name: APLunatic 49 | points: 125 50 | solves: 16 51 | description: | 52 | APL (ˌæ'pɪel) n. A Programming Language 53 | See: http://tryapl.org/ 54 | https://tio.run/#apl-dyalog 55 | https://ngn.github.io/apl/ 56 | lunatic (ˈluːnətɪk) n. A person who is insane 57 | See: APL Programmers 58 | aplunatic (ˌæpluːnətɪk) n. This challenge 59 | 4o6VSU/ihpAw4ouEJ0JJRcKwP8K9PklMwr1FLiEhPEUhOkU4NMKlwrjCskUyM8OFOMK7OTY4J3t74o21KH7ijbUpLydzdWNjZXNzJyAnZmFpbCd94oqDKCsv4o26PeKOlVVDUyAxMyt7Ky/ijbUv4oy9MirijbPijbTijbV9wqgsLzMzIDjijbQoOMOX4o204o21KeKNtDfijL3ijYkoLeKMiijijbQnZjB4dHIwdCcpw7cyKeKMveKNiTExIDI04o204oiKe2HiiaA44oaRKDAsYeKGkCg44o20MiniiqTijbUpfcKo4oy94o6VVUNTIOKNtSk94o204o26fSdJTlBVVCBIRVJFJwo= 60 | flag: PCTF{APL_code_is_we!rd_t0_l00k_@} 61 | 62 | - ctf_name: CSAW CTF 2018 Quals 63 | problem_name: '1337' 64 | points: 500 65 | solves: 4 66 | description: | 67 | 1337 hax0rz for the win 68 | Hint: change your system to hebrew 69 | flag: flag{4.\/3ry.1337.|>45$vVp@9/} -------------------------------------------------------------------------------- /problem_list/Medium_Medium.yaml: -------------------------------------------------------------------------------- 1 | - ctf_name: Boston Key Party CTF 2016 2 | problem_name: unholy 3 | points: 4 4 | solves: 61 5 | description: | 6 | python or ruby? why not both! 7 | flag: BKPCTF{hmmm _why did i even do this} 8 | 9 | - ctf_name: 0CTF 2016 Quals 10 | problem_name: trace 11 | points: 4 12 | solves: 33 13 | description: | 14 | follow the trace trace.log 15 | update: 16 | the flag is at 0x400D80 17 | (uint32_t)0x00410EA0 == 0x400D80 18 | flag: 0ctf{tr135m1k5l96551s9l5r} 19 | 20 | - ctf_name: Nuit du Hack CTF Quals 2016 21 | problem_name: Matriochka - Step 4 22 | points: 500 23 | solves: 51 24 | description: | 25 | Recently, I found an executable binary. 26 | As I'm a true newbie, 27 | Certainly, to solve it, I will have difficulties. 28 | Keep in mind, the first step is quite easy. 29 | Maybe the last one will be quite tricky. 30 | Emulating it could be a good idea. 31 | You must solve steps 1, 2 and 3 first. 32 | flag: Ddr1ml/frf 33 | 34 | - ctf_name: PlaidCTF 2016 35 | problem_name: quite quixotic quest 36 | points: 300 37 | solves: 40 38 | description: | 39 | Well yes, it certainly is quite quixotic. (Yes, the flag format is PCTF{} ) 40 | flag: PCTF{just_a_l1ttle_thing_1_l1ke_t0_call_ropfuscation} 41 | 42 | - ctf_name: Codegate CTF 2018 Preliminary 43 | problem_name: '6051' 44 | points: 880 45 | solves: 11 46 | description: | 47 | find the flag 48 | flag: FLAG{w0w_w0w_w0w_s1mp13_str1n9_c0mpr3ss10n_1011110100011} 49 | 50 | - ctf_name: N1CTF 2018 51 | problem_name: patience 52 | points: 769 53 | solves: 7 54 | description: | 55 | You will get the flag...... eventually! 56 | flag: N1CTF{did_cmm_helped?1109ef6af4b2c6fc274ddc16ff8365d1} 57 | 58 | - ctf_name: N1CTF 2018 59 | problem_name: baby_neural_network 60 | points: 740 61 | solves: 8 62 | description: | 63 | Null 64 | flag: N1CTF{N3ural_Network_1s_Really_Fantastic} 65 | 66 | - ctf_name: 0CTF/TCTF 2018 Quals 67 | problem_name: g0g0g0 68 | points: 343 69 | solves: Null 70 | description: | 71 | mdZero says that he has tons of excellent tools. However, he has never showed his magic to us before. "They are all stored in my mobile HDD. At home, not here". That's what he told us when we were asking, every time! 72 | Once, we forced him to tell us, or he would be sent to cops. Then he take out this one from his pocket. Could you help me to figure out what is it? 73 | To verify your answer, please visit: 74 | nc 202.120.7.206 13337 75 | flag: 269103113846520710198086599018316928810831097261381335767926880507079911347095440987749703663156874995907158014866846058485318408629957749519665987782327830143454337518378955846463785600977, 221855981602380704196804518854316541759883857932028285581812549404634844243737502744011549757448453135493556098964216532950604590733853450272184987603430882682754171300742698179931849310347, 4862378745380642626737318101484977637219057323564658907686653339599714454790559130946320953938197181210525554039710122136086190642013402927952831079021210585653078786813279351784906397934209 76 | 77 | - ctf_name: 0CTF/TCTF 2018 Quals 78 | problem_name: udp 79 | points: 305 80 | solves: Null 81 | description: | 82 | too many udp 83 | flag: flag{12491f295fb0} 84 | 85 | - ctf_name: 0CTF/TCTF 2018 Quals 86 | problem_name: Baby VM 87 | points: 423 88 | solves: Null 89 | description: | 90 | Flag is in the current directory with name "flag.txt". 91 | flag: Null 92 | 93 | - ctf_name: starctf 2018 94 | problem_name: fans_of_xdd 95 | points: 952 96 | solves: 2 97 | description: | 98 | I'm new to ctf. I don't know how to reenigne, so x140dada tell me that, i should learn it by reading this file. Can you help me? 99 | you need a mac, sorry to windows/linux users 100 | flag: '*ctf{i_4m_not_b1G_fAns_0f_M4c5cr1pT>.<}' 101 | 102 | - ctf_name: starctf 2018 103 | problem_name: BabyDroid 104 | points: 645 105 | solves: 12 106 | description: | 107 | Hint1 : It's not neccessary to run the apk. If you want to run it, we suggest you to use Android with Dalvik on real phone. If you failed to run the apk, pls just try to reverse it statically. 108 | Hint2 : submit *ctf{what_you_input} 109 | flag: '*ctf{1nTr3stIng-AnDr0id-A&D!}' 110 | 111 | - ctf_name: starctf 2018 112 | problem_name: wasm 113 | points: 714 114 | solves: 9 115 | description: | 116 | Webassembly is interesting. 117 | flag: '*ctf{web4ss3mbly_1s_god}' 118 | 119 | - ctf_name: ASIS CTF 2018 Quals 120 | problem_name: The true origin 121 | points: 394 122 | solves: Null 123 | description: | 124 | Find the true origin of this algorithm! 125 | flag: ASIS{65e05d26ea3f3a2518e29fa77744f2b0} 126 | 127 | - ctf_name: Google CTF 2018 Quals 128 | problem_name: Back to the BASICs 129 | points: 293 130 | solves: 21 131 | description: | 132 | You won't find any assembly in this challenge, only C64 BASIC. Once you get the password, the flag is CTF{password}. 133 | P.S. The challenge has been tested on the VICE emulator. 134 | flag: CTF{LINKED-LISTS-AND-40-BIT-FLOATS} 135 | 136 | - ctf_name: CSAW CTF 2018 Quals 137 | problem_name: kvm 138 | points: 500 139 | solves: 58 140 | description: | 141 | We found a mysterious program that none of our most talented hackers could even begin to figure out. 142 | Author: toshi 143 | flag: flag{who would win? 100 ctf teams or 1 obfuscat3d boi?} 144 | -------------------------------------------------------------------------------- /problem_template.md: -------------------------------------------------------------------------------- 1 | # CTF_NAME : PROBLEM_NAME 2 | 3 | - Points : POINTS 4 | - Solves : SOLVES 5 | - Description : 6 | ``` 7 | DESCRIPTION 8 | ``` 9 | 10 | ## [attachment](ATTACHMENT.7z) 11 | 12 | ## [Write up](writeup.md) 13 | -------------------------------------------------------------------------------- /writeup_template.md: -------------------------------------------------------------------------------- 1 | # Write up (CTF_NAME : PROBLEM_NAME) 2 | 3 | flag : `FLAG` 4 | 5 | ## 一言Write up 6 | 7 | ## Write up 8 | 9 | 10 | --------------------------------------------------------------------------------