Some challenges were hosted on our infrastructure. They are now available as
Docker images which you can download and run on your own computer. If you
want to solve the challenges in the same way as the participants of the CTF, you should treat these Docker
instances as blackboxes and avoid peeking in them.
All zipped challenges should include some solution or explanation.
https://blockctf.com/2021/rules.html
* │ ├──┬── one: its just an xor │ │ │ ├── reversing │ │ │ └── points: 150 │ │ │ │ ├──┬── two: Im a credential ghoul │ │ │ ├── cryptography │ │ │ └── points: 300 │ │ │ │ ├──┬── three: Out Of Cash │ │ │ ├── exploitation │ │ │ └── points: 300 │ │ │ │ ├──┬── four: Korean Space Program │ │ │ ├── web │ │ │ └── points: 150 │ │ │ │ ├──┬── five: Memory Safe Hex Decode │ │ │ ├── reversing │ │ │ └── points: 200 │ │ │ │ ├──┬── six: Card Theft │ │ │ ├── exploitation │ │ │ └── points: 100 │ │ │ │ ├──┬── seven: Huge Primes │ │ │ ├── web │ │ │ └── points: 50 │ │ │ │ ├──┬── eight: collatzeral damage │ │ │ ├── cryptography │ │ │ └── points: 200 │ │ │ │ ├──┬── nine: Burnt Bread │ │ │ ├── exploitation │ │ │ └── points: 200 │ │ │ │ ├──┬── ten: Gil Triangle │ │ │ ├── exploitation │ │ │ └── points: 200 │ │ │ │ ├──┬── eleven: Memory Safe Strcmp │ │ │ ├── reversing │ │ │ └── points: 100
https://blockctf.com/2021/results.html
Work_at_Square(1), Privacy_policy(1), Code_of_conduct(1)