02
May
2012

Plaid CTF 2012 – Encryption Service

We found the source code for this robot encryption service, except the key was redacted from it. The service is currently running at 23.21.15.166:4433
Title: Encryption Service (300)
Category: Password Guessing

The service basically implements an encryption Oracle, it reads data from the socket and returns the AES-CBC encrypted version of this data, concatenated with a secret string. The challenge is to find this secret string.
{Read More}

01
May
2012

Plaid CTF 2012 – Nuclear Launch Detected

Our spies intercepted communications and a file between 5 of the top 10 robo-generals and their nuclear bomb server. We must recover the final launch code from the 5 robo-general’s secret codes, so we can stop the detonation!
Title: Nuclear Launch Detected (150)
Category: Password Guessing

For this challenge we had to find a a cryptographic secret from a number of shares.
{Read More}

01
May
2012

Plaid CTF 2012 – Override

One look in this program and our whole understanding of how robots run has been shaken. Maybe you will have better luck than us.
Title: Override (300)
Category: Pirating

For this challenge we had to find a passphrase which was accepted by a 64-bit binary.
{Read More}

01
May
2012

Plaid CTF 2012 – Torrent

It turns out that robots, like humans, are cheap and do not like paying for their movies and music. We were able to intercept some torrent downloads but are unsure what the file being downloaded was. Can you figure it out?

{Read More}

01
May
2012

Plaid CTF 2012 – SIMD

After examining some code retrieved by our operative we are unsure whether it was written by an evil genius or a google employee. We will let you decide.
Title: SIMD (250)
Category: Pirating

For this challenge we had to reverse engineer the password from a 64-bit binary using SSE/AVX instructions.
{Read More}

01
May
2012

Plaid CTF 2012 – Editors

We recently gained access to a log of a robot operative interacting with computer. We are unsure what he was up to but we know it is of the upmost importance to figure it out.

Opening the file it contains key logging of a session with user interacting with a number of editors. We first cleaned up this file in readable key combinations:
{Read More}

01
May
2012

Plaid CTF 2012 – 80s Thinking

We saw two robots dressed in sweater dresses, leggings and press on nails and decided we had to listen in. But, these robots were speaking an unintelligible language. Can you figure out what they were saying?
Title: 80s Thinking (250)
Category: Practical Packets

In this challenge we received an audio file (80s.wav). Listening to the audio file we got the idea it might be a modem or fax connection, this also fits in with the challenge description.
{Read More}

01
May
2012

Plaid CTF 2012 – Debit or Credit

Ca-Ching! Do you think robots have headphone jacks?
Title: Debit or Credit
Solved: 16 teams solved this!
Points: 200
Category: Potpourri

In this challenge we received a sound (.wav) file. Seeing the challenge title and description we quickly got the idea that this might be a recorded magnetic card swipe. Looking at the sound file in audacity we can see the wave form and from this wave form we can recover the magnetic card swipe. We printed the whole wave form and started out doing this challenge on paper, after we got a solid idea on how to finish this challenges we switched to the computer to work it out further.
{Read More}

01
May
2012

Plaid CTF 2012 – 3D

The robots appear to be testing some kind of new camera technology but we haven”e;t quite figured it out yet. Understanding this imaging could be crucial to our understanding the enemy and winning the war.

Analyzing this file it looked like a JPS file. Opening it with a normal image viewer it showed a computer screen with gedit opened with the key in it, however there was something hanging in front of the screen which made it unable to view the key.
{Read More}

01
May
2012

Plaid CTF 2012 – Demo Time

Pop some popcorn, grab a seat and be ready to listen to your favorite robotic chiptunes. It’s an old fashioned robot party!

After downloading the binary file, we looked at the header to see what type of file this was. Although the header ‘g GCE’ didn’t ring us any bells, Google helped us to identify it as a Vectrex game file. We downloaded ParaJVE so we could run the game file.
{Read More}