- Solves: 7
Extract some flag from ssh://firstname.lastname@example.org
- Solves: 372
Connect to 126.96.36.199:1024 and get a shell.
- Solves: 16
Connect to 188.8.131.52 1024 and get a fresh instance spawned for you. You're gonna need this.
- Solves: 9
In case you want to test some shellcode you wrote, feel free to use this.
nc 184.108.40.206 1024
- Solves: 2
Here is the firmware of a smartcard for DVB-T decryption.
Unfortunately the EEPROM data is missing, can you still decrypt the DVB-T stream?
The flag begins with "32C3_" (uppercase).
This could help: https://32c3ctf.ccc.ac/uploads/smartcard-075e52e6b925b3af7d78c781f2bd208384e26dbc.jpg
- Solves: 17
Please install this on your new android phone, enter pass code and get the flag.
Updated the libdroid.apk, this one is now also able to run on a device. No changes to internal logic.
- Solves: 40
The logic states of the GPIOs have been recorded Figure out the displayed message. You're gonna need this here
- Solves: 5
I can't open my electronic vault anymore :( I reverse engineered a bit of the PCB and attached a JTAG debugger to it, but I can't seem to be able to dump the code and figure out how to reset the PIN. Could you help me out here?
You can access the vault here: http://220.127.116.11:8080
Some nice German music while you solve this challenge: https://www.youtube.com/watch?v=KfWyo2mqXnw
- Solves: 11
Im Too Damn good at security. You can never beat me. Accept your fate. cross your fingers for this task to not collapse http://18.104.22.168/
- Solves: 61
Our Admin is a little sad this time of the year. Maybe you can cheer him up at this site
Please note: This challenge does not follow the flag format.
To build the flag, concatenate both parts and omit '32C3_'
- Solves: 26
A group of highly trained monkeys from outer space have been using earthlings technology to communicate ( over the web ). we want to know their secrets and intentions so we infiltrated them. Here's their platform of communication and an invite key:
invite key: d991065ab84307e7904e2b9b515a2d69
- Solves: 19
May we interest you in a little programming exercise?
- Solves: 71
A new file hosting service for very small files. could you pwn it?
- Solves: 5
Today, everything needs crypto! We developed an AES encrypt module for your ARM chip!
The module can be accessed via the address range 0x40048000..0x4004807f, see the example for details (binary is best documentation!)
This demo device is only capable of encrypting 10 times, afterwards, the cpu has to be powercycled to encrypt anything else.
Every module is preseeded with a random key and a serial number as input(Hint: this is the flag) the result can be found in the output buffer before anything else is encrypted.
- Solves: 111
Non-standard gurke: https://32c3ctf.ccc.ac/uploads/gurke Talk to it via HTTP on http://22.214.171.124/.
- Solves: 2
Get the flag ssh://email@example.com