Skip to content

kbeckmann/ctf

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Build Status

CTF

My CTF games.

What is this?

In order to learn more about how pwn challenges work I have created some challenges of my own and solved them.

The goal with these challenges is to find the "flag". This could be a file somewhere on the filesystem called flag, or it could be embedded in the binary itself. It is possible to find the flag by manipulating the input to the programs. Usually during a contest, a binary is provided along with an ip address and a port where the binary is running. The flag may be hidden anywhere, but getting an interactive shell is usually a good start if possible.

##Usage Binaries compiled for linux x86-64 are provided along with the source code. You may build it yourself on any platform where it builds. Why not build it for a raspberry pi?

You can usually test your solutions by simply piping your data to the binary, ./solution.py | ./ctf, or you can use netcat and sockets instead.

Cheat sheet

I've provided cheat sheets for the first and second challenges just to get you on the right track. Only look if you're stuck!

The provided solutions are using pwnlib which helps out a lot. Make sure you install it properly.