Le fichier pcap suivant contient une capture réseau d’une connexion FTP. La clef de ce challenge est contenu dans l’un des fichiers transférés pendant cette connexion FTP.
Le clef est le mot de passe du programme Linux suivant: crackme
The HackingWeek is now over !
Good challenges overall, but the staff lacked organization.
Although with a single administrator to manage everything, it shouldn’t be easy either!
Moreover we would have preferred a page announcing the challenges updates (and especially their modifications) rather than be surprised when someone from the team found out.
In terms of ranking, the first days we managed to keep a place in the Top 10 without too much difficulty.
After a week and 18/20 solved challenges, we were ranked first.
The days that followed, our position has decreased to finally be ranked 5th out of 106, with 19/22 solved challenges.
This is not so bad after all, especially since it was the first CTF for most of us!
It’s clear that our team unfortunately does not have enough skill in reverse/exploit 🙂
(For the next CTF we will revise these themes, because yes -to general demand- we will do it again!)
Anyway, we’re just finishing the writeups to share them.
Stay tuned !
Crypto: crypto1 – crypto2 – crypto3 – crypto4
Exploit: exploit1 – exploit2 – exploit3 – exploit4 – exploit5
Forensic: forensic1 – forensic2 – forensic3 – forensic4
Network: net1 – net2 – net3 – net4
Reverse: reverse1 – reverse2