/cuctf-2019-bootcamp

CTF Bootcamp held at CUCTF

Primary LanguagePython

CUCTF Bootcamp

Recommended Tools

  • netcat
    • gnu-netcat
    • nc6
    • openbsd-netcat (discouraged)
  • python
    • pwntools
  • http request mitm
    • burpsuite
    • tamper chrome
  • debugger
    • gdb
      • pwndbg
      • peda
    • radare2
  • reverse engineering platform
    • radare2
    • cutter
    • binaryninja
    • ida/ida pro
    • ghidra

Challenges

Binary Exploitation

Challenge Points Port
Bof1 10 9000
Bof2 50 9100
Uaf1 75 9200

Web Exploitation

Challenge Points Port
Web1 10 7000
Web2 40 7100
Web3 60 7200

Reverse Engineering

Challenge Points Port
RE1 10 None
RE2 30 None
RE3 50 None

Cryptography

Challenge Points Port
Crypto1 10 None
Crypto2 20 None
Crypto3 30 None

Steganography

Challenge Points Port
Stego1 10 None
Stego2 25 None
Stego3 40 None