Some challenges were hosted on our infrastructure. They are now available as Docker images which you can download and run on your own computer. If you want to solve the challenges in the same way as the participants of the CTF, you should treat these Docker instances as blackboxes and avoid peeking in them.
We tweeted three warm up “puzzles” in the days leading to the event. The first two are pieces of data and code you need to explore. The third has exactly one solution.
https://blockctf.com/2019/rules.html
* │ ├──┬── one: Talk to me │ │ │ ├── ruby │ │ │ └── points: 100 (+10) │ │ │ ├──┬── two: Aesni │ │ │ ├── binary │ │ │ └── points: 700 (+100) │ │ │ ├──┬── three: Decode me │ │ │ ├── snake oil │ │ │ └── points: 150 (+15) │ │ │ ├──┬── four: Tcash │ │ │ ├── binary │ │ │ └── points: 1000 (+200) │ │ │ ├──┬── five: Inwasmble │ │ │ ├── web │ │ │ └── points: 200 (+20) │ │ │ ├──┬── six: Worldwide Highest Velocity │ │ │ ├── binary │ │ │ └── points: 2000 (+400) │ │ │ ├──┬── seven: Lockbox │ │ │ ├── go ˖ web │ │ │ └── points: 600 (+100) │ │ │ ├──┬── eight: Go cipher │ │ │ ├── go ˖ not web │ │ │ └── points: 1000 (+200) │ │ │ ├──┬── nine: Sudo make me a flag │ │ │ ├── not go ˖ not ruby ˖ not binary │ │ │ └── points: 700 (+150) │ │ │ └──┬── ten: 20.pl │ ├── perl ˖ cryptography │ └── points: 500
https://blockctf.com/2019/results.html
https://blockctf.com/2019/write_ups.html
Work_at_Square(1), Privacy_policy(1), Code_of_conduct(1)