CTF was ran during BSidesPDX 2018 on October 26th and 27th.
We used CTFd for the scoreboard hosted at BSidesPDXCTF.party.
Challenges built by: TTimzen, fdcarl, aagallag, dade & arinerron
Infrastructure support provided by Mozilla: Jeff Bryner, Andrew Krug and Daniel Hartnell
| Challenge Name | Category | Points | Port |
|---|---|---|---|
| capture | forensics | 100 | N/A |
| hidden | forensics | 200 | N/A |
| mic | forensics | 300 | N/A |
| goxor | pwn/re | 100 | N/A |
| secureshell | pwn/re | 200 | 7100 |
| pwnclub | pwn/re | 300 | 31337 |
| leaky projects | OSINT | 100 | N/A |
| leaky secrets | OSINT | 200 | N/A |
| leaky security | OSINT | 300 | N/A |
| death_by_1000_curls | web | 100 | 43478 |
| Dodona | web | 200 | 4738 |
| Trollsec | web | 300 | 10101 |
To locally test, deploy or play challenges with Docker, run the following (Ubuntu)
sudo apt install gcc-multilib gcc-mipsel-linux-gnu gcc-arm-linux-gnueabi g++-multilib linux-libc-dev:i386makedocker-compose build && docker-compose up -d- Containers are viewable at localhost:PORT (view with docker-compose ps)
docker-compose killto stop the containersmake cleanto clean the source folders
This year we ran all of our challenges in k8s using the Makefile and yamls in the aws directory of pwn-re 100, 200 and all web challenges.