Challenges are now offline. We will publish the source and writeups at https://github.com/nushosilayer8 soon.2019-10-30T10:57:55Z
Scoreboard is frozen!
Thank you everyone for participating! Hope it was challenging2019-10-19T10:00:13Z
Scoreboard freezes soon!
Scoreboard freezes after the last talk!2019-10-19T09:37:21Z
New feedback challenge
Complete the feedback to get some points!2019-10-19T09:05:21Z
New Pwn challenge
New challenge added: Interactive Buffer Overflow - Part 22019-10-19T07:28:20Z
We released some new small hints for some of the web challenges.2019-10-19T05:47:46Z
If you cannot connect to any ports or the page isn't loading, it's because the wifi blocks some ports. It's preferred you use your mobile data. However, you can also come into the Thyme room for free, non-blocked wifi.2019-10-19T03:35:41Z
Welcome to miniCTF. Once you've read this, go solve the welcome challenge to get free 50 points.2019-10-19T03:15:43Z
Solving Binary Exploiting Challenges
A good tool for getting a quick overview of a binary in psuedocode is Ghidra (https://ghidra-sre.org) or Ida pro. For debugging/testing exploit, use pwntools and gdb. If you are unfamiliar with these tools, come to Thyme room (the room at the end of the corridor near the stairs)2019-10-19T02:34:41Z