Home

Awesome

CTF Challenges

This repository contains an archive of CTF challenges I developed in the last few years for various CTFs organized by my team – Dragon Sector. They are mostly software exploitation tasks with varying difficulty levels, for the x86/x64 architectures and Windows/Linux operating systems. Each subdirectory contains basic task information, original description, solution in the form of a short summary or a few slides from the post-CTF presentation, exploit code and optionally links to external solutions.

The challenges are as follows:

NameCompetitionCategoryPlatformArch.Difficulty
NimDragon CTF 2021ExploitationLinuxx64Medium
BitmapManagerDragon CTF 2020ExploitationWindowsx64Hard
BabyKernelDragon CTF 2019ExploitationWindowsx64Medium
BadTypeDragon CTF 2019 (Teaser)Reverse EngineeringWindowsx64Medium
PipelineDragon CTF 2018Exploitation / ProgrammingLinuxx64Easy/medium
ProductionDragon CTF 2018 (Teaser)ExploitationLinuxx64Easy/medium
FilesystemCONFidence CTF 2017ExploitationLinuxx64Medium
Fastcalc-hardenedCONFidence CTF 2017ExploitationWindowsx86Hard
FastcalcCONFidence CTF 2017 (Teaser)ExploitationWindowsx86Hard
EntreeCONFidence CTF 2016ExploitationWindowsx86Medium
AntipastoCONFidence CTF 2016ExploitationLinuxx86Easy
BubblegumCONFidence CTF 2016 (Teaser)ExploitationWindowsx86Hard
Night SkyCONFidence CTF 2015ExploitationLinuxx64Hard
QuarantineCONFidence CTF 2015 (Teaser)ExploitationLinuxx64Hard
Crypto MachineCONFidence CTF 2014ExploitationLinuxx64Medium
MemoryCONFidence CTF 2014Reverse EngineeringWindowsx86Easy
Multipurpose Calculation MachineCONFidence CTF 2014 (Teaser)ExploitationLinuxx86Medium

Running the tasks

For exploitation problems, if the program listens on a port by default, leave it running and connect to the port to interact with the task. If it reads and writes to/from stdin and stdout, you should bind it to a TCP port of your choice (e.g. with netcat or socat on Linux, and the enclosed AppJailLauncher.exe tool on Windows), and connect to it to exploit the vulnerabilities. The goal is to obtain the contents of the flag.txt (or similar) file in the task's current directory.

For reverse-engineering problems, the goal is to extract the flag from the provided executable file.

About Dragon Sector

Dragon Sector

Dragon Sector is a Polish security Capture The Flag team. It was created in February 2013 and currently has 17 active members. We frequently participate in both online and offline security Capture The Flag competitions, publish write-ups on CTF tasks, and sometimes even organize CTFs.

You can find us on CTFTime, our blog and Twitter.

Contact

Questions, comments? Let me know at j00ru.vx@gmail.com.