CTF
I currently play CTF with my university team, Buckeye Bureau of BOF. We have placed decently in a few recent CTFs:
- 6th - DamCTF 2021
- 3rd - redpwnCTF 2021
- 4th - b01lers CTF
- 7th - UTCTF 2021
Selected Writeups
Here’s some write-ups I’ve done for a few recent challenges
pwn
- hwdbg (CakeCTF 2021)
- not_so_tiger (CakeCTF 2021)
- mooosl (DEFCON Quals 2021)
- word_games (CSAW CTF Quals 2021)
rev
- mongoose mayhem (Hack-A-Sat 2)
Other cool challenges I’ve solved and want to do a writeup but haven’t had time:
- weather (rev, Google CTF 2021)
- rp2sm (rev, redpwnCTF 2021)
Challenges I’ve written
I wrote challenges for OSUCTF (Ohio State’s CTF) in Spring 2020 and Autumn 2020. We re-branded as BuckeyeCTF in Autumn 2021 and hosted our first public CTF.
Some of my favorite challenge’s I’ve written:
pwn
- guess_god - a C++ web app with a memory corruption bug; requires that you break ASLR by uploading a large file and binary-search memory for it (a la https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html)
- panic - Exploit “panic unwinding” in Rust
rev
- wiggle - Custom ARM JIT-ed virtual machine
- “piss” - The “poorly implemented syscall sifter” – before running a basic block it will sanitize syscalls. This was a 2-part challenge in which you had to exploit various mistakes in the sanitization code.
web
- sozu - Request smuggling in a real-world Rust reverse proxy, in 2021.
- Dreese Lab Gift Shop