Git Product home page Git Product logo

sc3's Introduction

SC3

The third occurence of the Spokane Mayor's Cyber Cup! Here's to another great year :)

Organization

Organization in this is CRUCIAL. Please adhere to the following when writing a challenge. Each directory comes with the following:

  • Challenge file
  • Solution file
  • Optional Info file (for setup details and other notes)
  • Challanges themselves.
  • Dockerfile and docker_run.sh

Some challenge directories will have multiple challenges in one. For instance, the Forensics and log analysis questions will have multiple challenges per directory. The Challenge.md will have these labeled as seperate challenges and the Solutions file will have multiple answers, each corresponding to the solutions.

Challenges

This is organized in the following way: the type of challenge and the difficulty in creating the challenge.
Additionally, the bolded challenges have already been created.

If somebody has ANY other ideas, then please go crazy and create the challenge! These are just thoughts that I (Max) had and put down before I forgot. All types of challenges will be accepted (even some Stegography).

The goal is to have something like 30-40 challenges from all different categories. Currently, the total amount of finished flags is 37.

  • Web: 14
  • Binary/Memory Corruption: 6
  • Reversing: 4
  • Linux: 7
  • Cryptography/Math: 1
  • OSINT: 4
  • Blue Team: 6
  • Misc: 2 (random things that do not have a particular category)

Running Challenges

  • The challenges fall into 4 categories:
    • SSH - Login to solve the challenge
    • Remote pwnables: Interact with the service via netcat
    • Web - Website
    • Other - Files or prompt in the challenge.
  • For all but the final section, simply running ./docker_run.sh will build and run the Docker container. This will then be accessible via the mentioned port in the script.

Web

  • Al Qaeda Blog
    • SQLi to get a flag from the database (4)
    • SQLi to leak admin password hash (7)
    • Crack MD5 hash (5)
  • POST_DELETE:
    • Make POST and DELETE requests to an endpoint
  • Nailterest:
    • Storage of favorite links (pictures, text files, etc.)
    • Use this feature to grab data from a localhost server that is running. This is also known as SSRF.
  • JWTs (Rachael Hardin):
    • Login (2)
    • Decode JWT (4)
    • Crack and resign (8)
  • Parameter tampering on POST request (5):
    • Korean food challenge but set the is_admin flag to true to become an administrator.
  • Lebean (Ken Price):
    • Simple XSS (4)
    • Double quote escape (5)
    • Single quote escape (5)
    • Template string escape (7)
    • Javascript URI link (7)
  • Lottery (Vanessa Dulin):
    • Cracking the lottery via an insecure random number generator.

Memory Corruption

  • Buffer Overflow series (buf_series)(6):
    • Firsty
      • Alter a variable on the stack
    • dead
      • Write a proper variable on the stack**
    • auth
      • Redirect execution of the binary to a new function
  • HelloWorldArg
    • Format string vuln
  • Floating Bank:
    • Improper usage of floating point numbers

Linux

  • signals:
    • Sending a signal to continue a flag
  • Basic Linux Commands (introduction to Linux)
    • ssh
    • process names
    • Moving directories
  • amazon
    • OTP bypass by flooding OTP values
  • error_to_code
    • Error message into code exec
  • auth_handler
    • Try catch block with an initally set value.
    • Convert input to an integer, then use this as a case statement to determine auth level
    • With the originally set value of the int (0), this could act as a bad default handling
  • even:
    • Run bash commands with either ONLY odd or even characters.
    • Even is MUCH harder than odd because the / cannot be used with even.
  • Linux Hardening (Joseph Riddle):

Reversing (Zach)

  • 1: First reverse
  • 2: xor flag
  • 3: Rolling xor flag
  • Patch
    • Bypassing restrictions via altering the binary itself.

Misc

  • Othello:
  • Astros
    • Pattern recognition for stealing signs in baseball

Blue Team

  • Malware Forensics (6)

Crypto/Math Math:

  • Cesar Cipher

OSINT

  • Location problems (3) - Fabian Vilela
  • Find person via photo - Joseph Riddle

sc3's People

Contributors

mdulin2 avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.