Repository for UiTHack 18 challenges, documentation and related info
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.
Reverse Engineering

UiTHack 2018


  • Create Crypto challs
    • First Crypto implemented (and so it begins)
    • Second Crypto implemented (old school)
    • Third Crypto implemented (tabula recta)
    • Fourth Crypto implemented (transposition)
    • Fifth Crypto implemented, but it might need even more hints toward it being DES
  • Create Noob challs
    • First Noob implemented
    • Second Noob implemented
    • Third Noob implemented
    • Fourth Noob implemented
    • Fifth Noob implemented
    • Sixth Noob implemented
  • Create Pwn challs
    • First Pwn implemented (online calculator)
    • Second Pwn implemented (privilege escalation)
    • Third Pwn implemented (overflow playground)
  • Create RE challs
    • First RE implemented (guess the password)
    • Second RE implemented (in the library)
    • Third RE implemented - Fredrik should make this (.NET)
  • Create Web challs
    • First Web implmented (don't thell the robots)
    • Second Web implemented (source of evil)
    • Third Web implemented (can't handle my database)
    • Fourth Web implemented (article viewer)
  • Write chall text and define score for Misc
  • Publish Pwn challs on servers and website
  • Publich Web challs on servers and website
  • Public RE challs on website
    • First RE published (guess the password)
    • Second RE published (in the library)
    • Third RE published - Fredrik should make this (.NET)
  • Publish Crypto challs
    • First Crypto published (and so it begins)
    • Second Crypto published (old school, yeah)
    • Third Crypto published (tabula recta)
    • Fourth Crypto published (transposition)
    • Fifth Crypto published - might need even more hints toward it being DES
  • Publish Noob challs
    • First Noob published
    • Second Noob published
    • Third Noob published
    • Fourth Noob published
    • Fifth Noob published
    • Sixth Noob published



UiTHack 2018 - thoughts and challenges

Motivation and vision

Want more students that are not interested in security and related problems. For this, a noob-friendly Capture-the-flag competition is perfect! The idea is to expose people to gradually more challenging tasks, starting with very simple ones and moving to more complex ones, but none should be too hard.

Challenge Categories

We define the following categories of challenges, with a minimum of three(3) in each category and up to six(6).

  • SSH into a box, unlock the next level, SSH further, becoming gradually harder. Probably with an easier last task than the previous year, or possibly mark it as hard!
  • Maybe the last one should be a sudo assignment?
  • Mandatory IRC flag (that everyone should be able to get)
  • Some esoteric programming language where you simply need to determine that it is an esolang and run it (possibly online)
  • Wireshark og PCAP
  • Simple command injection of some sort (show how dangerous it is to use user input) (maybe a shell script or Rust using a system command or something else) - probably give source or script or something along those lines
  • Enkel overflow av felter i en struct i C. Trenger ikke tenke på det å overflowe returadressen. Sende med source også og ikke bare binary.
  • Buffer overflow emulator. Allow kids to read the stack (pretty-print stack), write into a buffer and execute shellcode.
  • Kanskje en oppgave som er ordentlig rop eller buffer overflow for de ordentlig hard-core gutta! (?)
Reverse Engineering
  • Enkel strings (klassiker) - samme som i fjor, men kanskje bytte språk?
  • Uten strings, men kanskje med strcmp (?) - samme som i fjor, men kanskje bytte språk?
  • .NET-oppgave - Jeg og Fredrik diskuterte litt (fyll inn)
  • Enkel base64 eller noe slikt, evt. en rotXX
  • Vigenere med kort nøkkel (og lenke til info for å finne ut av Vigenere) (standard engelsk alfabet)
  • Railway cipher (?)
  • Annet type cipher(?)
  • AES-ECB men på en slik måte at du kun trenger å forstå og så er det trivielt-ish (Vanskelig - sannsynligvis)
  • SQLi
  • robots.txt
  • Noe gjemt i sourcen
  • Template injection (kanskje noe annet enn flask)