We found this server with two open ports. Can you find out what these ports do and login to the server? It is advisable to use a seperate VM for this challenge.
Nmap scan report (22.214.171.124)
Host is up (0.026s latency).
PORT STATE SERVICE
22/tcp open ssh
8140/tcp open unknown
This challenge was ment to be an easy multi stage challenge, but was apparently a lot harder than intended, cause it only had 7 solves. The challenge contains three levels which require shell access. Since we didn’t want to have hundreds of logins on the system, we created an extra step to get access to the system.
We found this strange website. (http://126.96.36.199/)
For this challenge we only get a website with a sum on it.
112 + 386 + 712 + 1398 + 8771 + 11982 + 15397 + 23984 = 51037
This doesn’t give us much information. How about we look at the headers.
OMG, Eindbazen got hacked. Can you figure out what this evil hacker did?
This was an easy challenge, and pretty straight forward what to do. It was meant to be solved by a lot of teams, and they did, 145 teams managed to solve it. There are a lot of write-ups for this challenge, so I will explain in short what was the intended solution.
We designed a new login procedure for our Online Tulip Shop. Can you test if it is hacker proof?
The WEB100 challenge was apparently harder than expected with only 10 solves. The goal of this challenge was to grep the admin password from the sqlite database with a SQL injection. The SQL injection however was not in one of the normal places, but in the key name of the password field.
We found some crypto ciphers on our attic. Can you decipher all text and put together the flag?
This challenge was meant to be a simple task, but which required a lot of work. It gave you six encrypted messages which you need to decrypt to get parts of the key .
nc 188.8.131.52 1025 < hello_world.gbc
We are given a GameBoy (Color) ROM file and a server address + port.
When sending the original hello_world.gbc to the server we are greeted with some output:
$ nc -vvv 184.108.40.206 1025 < hello_world.gbc Connection to 220.127.116.11 1025 port [tcp/*] succeeded! Insert Cartridge... Loaded: CSAW CTF 2013 OK OK OK Hello World!
My friend is in my D&D campaign – could you get me his character name? He administrates this site.
This challenge is a very simple SQL injection, asking for the character name.
I can’t figure out how to read the flag ssh to 18.104.22.168
The secure_reader program can read the flag, but can only be invoked from the reader program.
Question: Where does The Plague hide his money?
This question is clearly a reference to the movie Hackers, we’ve immediately watched the movie on youtube and skipped to the referenced part in the NSA interview room scene.