ctfworkshop-2017 icon indicating copy to clipboard operation
ctfworkshop-2017 copied to clipboard

Welcome to the SkullSpace CTF workshop!

This is a list of all the levels. You can find all the files you need to complete each level in the appropriate folders. You'll be given the port number, and occasionally source files or other things you need. And sometimes hints!

You might also want to check out FLAGS.md to verify your flags.

And, most importantly, have a look at PRIMER.md, which explains everything you need to know about tools, assembly, and everything else!

These are roughly ordered by difficulty, easiest to hardest.

Easier / training challenges

These are challenges designed to teach basic CTF skills, the primary theme being writing shellcode.

easyauth

Port: 6112

A simple web problem.

dontcrash

Port: 6113

This is a great beginner level, simply write shellcode that doesn't crash!

easycap

Port: n/a

Can you read a pcap?

easyreverse

Port: n/a

Reverse engineer this simple program!

seteax seteax-nz

Port: 6114 (basic) and 6115 (nz)

Write some fairly simple shellcode (the -nz variation doesn't allow NUL bytes)

readmem readmem-nz

Port: 6116 (basic) and 6117 (nz)

Read the flag from a known memory address

writemem writemem-nz

Port: 6118 (basic) and 6119 (nz)

Write a special value to a known memory address

readstack readstack-nz

Port: 6120 (basic) and 6121 (nz)

Read the flag off the stack!

writestack writestack-nz

Port: 6122 (basic) and 6123 (nz)

Write a special value to the stack (without damaging the rest of the stack)

readfile readfile-nz

Port: 6124 (basic) and 6125 (nz)

Read the flag from a file on the disk

Harder / real challenges

These are challenges from BSidesSF CTF. Some are easier, some are harder. You can find solutions if you google the name, so only do that if you're completely stuck!

skipper, skipper2

Port: n/a

Modify a binary (on disk or in memory) to decrypt the flag

hashecute

Port: 6126

Shellcode with an MD5 prefix

shortest

Port: 6127

Shellcode, in 5 bytes or less

b-64-b-tuff

Port: 6128

Shellcode, that's base64 compatible

in-plain-sight

Port: n/a

A fun little crypto problem

ximage

Port: n/a

Good luck figuring out the flag! Just remember the theme. :)

vhash

Port: 6129

Some reverse engineering, some crypto, and some web. Fairly difficult!

nibbler

Port: 6130

Write some game AI to build shellcode! Really