Shearwater AusCert 2016 CTF

GAME OF MEMORY (500 pts) The 1337 and 100 work for the same company, they sit across from each other on the same network. 100 is working on building a challenge for the Shearwater’s AusCert CTF. 1337 wasn’t allowed to be part of the build team. Being spiteful, they decide to sabotage the build team. 100 needs the proof that 1337 sabotaged the team, can you help find the proof? Question 1: 100 pts What is the malicious process PID, at what time did the malicious process PID start and what is the parent process PID? The flag must be...

UNSW K17 CTF 2013

K17 CTF – 28/09/2013 (10 AM)  to 29/09/2013 (10 AM). I participated in K17 CTF hosted by the University of New South Wales (UNSW). There were 2 teams from “Northern Sydney Institute TAFE-Meadowbank Network Security degree”  0x4e534931 & 0x4e534932 with 4 members in each team. I was a team member of the 0xe534931 team and we got 20th position.   Task completion status Challenge – Help the NSA (50pts) The NSA has though it’s warrantless mass surveillance network managed to intercept this exchange between two potential terrorists. Unfortunately, they don’t quite know what to make of it. “It all looks like...

CSAW CTF 2013 – Qualification Round

Team HackoGram got #310 position worldwide with 1650 points and got #83 position in Undergraduate’s throughout. Also, was the 5th highest scoring Australian Team. CSAW CTF challenges were divided into 7 categories with points from 50 to 500 depending on difficulty of challenge. I’ll do writeups of all the challenges i was able to solve TRIVIA (250 points) TRIVIA-1: Drink all the brooze, ______ all the things! A: hack This was pretty easy, i think you should be able to solve this without google TRIVIA-2: What is the abbreviation of the research published in the Hackin9 issue on nmap by Jon Oberheide, Nico Waisman, Matthieu Suiche, Chris Valasek, Yarochkin Fyodor, the Grugq, Jonathan Brossard & Mark Dowd?...