The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web categories. The challenge authors included experts from academics, industry, and the inaugural US Cyber Games team members. We are thankful for the support from Florida Tech, Dakota State, The US Naval Academy, the University of North Georgia, Research Innovations Inc, Battelle, and MetaCTF.
-
Twist is insipired by a problem of the same name from the International Cyber Competition, where the remote environment was different than the local environment. It is still unsure if this was on purpose on not.
-
The Angr CTF served as motivation for the 99 problems constraint challenge. Further, our solution is modeled after the scaffolding files from the Angr CTF.
-
The solution for greys includes code from a Stack Overflow post on generating gray codes.
-
The solution for 002hero slightly modifies code from the PRCT Toolkit to calculate the PNG header values for width and heigh.
-
ZeroZero2Hero is inspired by the Shes a Killed queen challenge from the Killer Queen CTF 2021.
-
TJ builds his docker containers off the template published by the Order of the Overflow for their DEFCON 2019 Speed Run Challenges. He uses
kali-rolling
when necessary because it makes the libc-database sad.