Team HackoGram got #310 position worldwide with 1650 points and got #83 position in Undergraduate’s throughout. Also, was the 5th highest scoring Australian Team.
CSAW CTF challenges were divided into 7 categories with points from 50 to 500 depending on difficulty of challenge.
I’ll do writeups of all the challenges i was able to solve
TRIVIA (250 points)
TRIVIA-1: Drink all the brooze, ______ all the things!
This was pretty easy, i think you should be able to solve this without google
TRIVIA-2: What is the abbreviation of the research published in the Hackin9 issue on nmap by Jon Oberheide, Nico Waisman, Matthieu Suiche, Chris Valasek, Yarochkin Fyodor, the Grugq, Jonathan Brossard & Mark Dowd?
I did a google search “Hackin9 on nmap by Jon Oberheide” and found link to article in pdf (Link). Then I found research “DARPA Inference Cheking Kludge Scanning”abbreviated as “DICKS”
TRIVIA-3: What is the common name for a single grouping of instructions used in a Return Oriented Programming payload, typically ending in a return (ret) instruction?
Did a google search on “single grouping Return Oriented Programming payload” and found this link (Link). Reading the article i found “gadget” is the answer.
TRIVIA-4: What is the new web technology that provides a web browser full-duplex communication to a web server over a single connection?
Did a google search on “Web browser full-duplex communication”, found this link (LINK)
TRIVIA-5: What is the x86 processor operating mode for running 64-bit code?
A: Long Mode
As i read question, Long Mode just came from my mouth. This was really simple.
RECON (400 points)
RECON-2: Julian Cohen
Julian has posted link to a website http://deathbycats.com
Did a who.is search and found this website is hosted on 18.104.22.168
Then i just accessed the IP directly and it gave me flag.
Did a google search for “historypeats” and found his GitHub page. Then I checked for latest activities and it showed me removed comments from “putscan“.Then i clicked on removed comments and it gave me this page (link) and found key.
RECON-6: Brandon Edwards