2018-09-28:

Teaser Dragon CTF 2018 starts tomorrow!

ctf:dragonsector
Dragon CTF 2018 Teaser logo

The Teaser Dragon CTF 2018 by Dragon Sector starts tomorrow at 12pm UTC!

The tournament will be held in a pretty standard jeopardy format, i.e. it's a team-based CTF with dynamic scoring, and several tasks that may be in one of the typical categories (web security, reverse engineering, cryptography, pwnables, etc). As it's a teaser CTF, the number of tasks will be pretty low and the CTF itself will only go for 24h.

There are prizes related to the main CTF event as well! The main Dragon CTF will take place during the Security PWNing Conference on 19-20 November in Warsaw, Poland, and will be open to conference participants and invited top teams from the teaser, and will have it's own set of prizes - the total prize pool for the main Dragon CTF is 17000 PLN!

The registration for the Teaser Dragon CTF 2018 is not yet open (it will be a few hours before the CTF). I'll update this post with details once we have the website online ;)
UPDATE: The registration is now open - https://ctf.dragonsector.pl/ - and the CTF starts at 12pm UTC (2pm CEST) :)

Best of luck!

UPDATE 2: The CTF is now over! Good Game everyone!

Source code + a short description of intended solutions for my two tasks:
1. Brutal Oldskull (RE|easy, 68 solves)
(CTFTime.org write-up repository)

2. Chains of Trust (RE|hard, 10 solves)
write-up by akrasuski1 (team p4)
write-up by daniellimws
(CTFTime.org write-up repository)

See you at the main CTF*!
* Please note that the "Teaser" was not a "Qualifier" - the Main offline CTF is open to all Security PWNing Conference attendees that are onsite.

Comments:

2018-09-29 10:09:07 = y
{
s/CEST/UTC/
}
2018-09-29 10:35:32 = Gynvael Coldwind
{
@y
Thx! Fixed!
}
2018-09-30 13:11:33 = akrasuski1
{
Hehe, looks like I solved Chains the "hardester" way: writing Python script to communicate with server, emulate in Unicorn while hooking API calls, dump chunks calling mmap. I'll probably write a writeup today, stay tuned ;)
}
2018-09-30 13:29:45 = Gynvael Coldwind
{
@akrasuski1
Awesome! Please post a link to the write-up here - I'll add it to the post :)
}
2018-09-30 13:59:19 = akrasuski1
{
https://github.com/p4-team/ctf/tree/master/2018-09-29-dragonctf/chains-of-trust

The script I mentioned is "solve.py" - keep in mind it is very messy and "CTF quality" in general though ;)
}
2018-09-30 14:41:18 = Gynvael Coldwind
{
@akrasuski1
Great write-up - I've linked to it in the post - thanks! That was pretty much the desired solution, i.e. the one I wanted to see happen (but knew better that there are shortcuts) :)
}
2018-09-30 22:43:36 = cristian-richie
{
I've been playing CTF's since 4 months and 75% of what I know I learned from your yt streams. I got a lot of fun playing this weekend and it's been amazing to solve a challenge made by you!! (even if it was the easy one). ;)
}
2018-10-02 14:27:28 = daniellimws
{
Hi, I also made a writeup on my approach to this challenge https://daniellimws.github.io/DragonCTF18-chains-of-trust.html

Mostly wrote extensions on GEF to script my way through GDB

Thanks for the challenge it was really interesting. (Took away so much of my time...)
}
2018-10-03 08:23:13 = Gynvael Coldwind
{
@daniellimws
Thank you for the detailed write-up! I've included it in the list above :)

@cristian-richie
I'm really happy to hear that :) Best of luck on future CTFs too!
}

Add a comment:

Nick:
URL (optional):
Math captcha: 9 ∗ 2 + 1 =