Olympic CTF Sochi 2014 has finished!

Congratulations to Top-3:

1. Dragon Sector — 1500 USD and early DEFCON 22 CTF Finals Qualification!
2. penthackon — 1000 USD
3. tomcr00se — 500 USD

Thanks to every single team for taking part!

The services will be up for at least two days from CTF ending for you to write your write-ups.
Please tweet the write-ups with hashtag #OlympicCTF and post them to Write-ups section at CTFtime

Scoring graph for Top-10 teams

EB FE!
×

Freestyle 10

Trivial

Author: vos

Hack the Planet_

×

Freestyle 200

Find da Key

Author: vos

Task is very unusual: find the key. stego.txt

×

Freestyle 300

Illegal Radio

Author: psb

We found illegal radio transmissions and saved them into dump for you. Please check it for data leakage.

Flag format: CTF{..32 hexes..}

HINT1: https://dl.dropboxusercontent.com/u/45174825/olympics.png

HINT2: You know that it's FM radio transmission / IQ data dump.

×

Freestyle 400

Make similar

Author: psb

Listen carefully and try to figure out. Hint: 120 LPM

Flag format: CTF{..32 hexes..}

×

Freestyle 500

Welcome To Forensics

Author: vos

One of our admins, before his agonizing death by being squished by an elephpant, changed the passwords on all our servers! Postmortem autopsy found in his stomach a usb pen drive with sole file: WTF.BIN, as well as high concentration of epinephprine in his blood. We need our servers!!

Hint: File offset 17702

×

CURLing 10

Out there

Author: kyprizel

Flag is out there: http://[2a02:6b8:0:141f:fea9:d5ff:fed5:XX01]/

Flag format: CTF{..32 hexes..}

×

CURLing 200

xnginx

Author: kyprizel

flag is there

Flag format: CTF{..32 hexes..}

×

CURLing 300

Emdee

Author: vos

md5-1("40288d60073775070a7edcdcd1df9c56") = ?

×

CURLing 400

RPC

Author: d0znpp

Wallarm experts do it in 3 minutes. How long will it take you?

Flag format: CTF{..32 hexes..}

×

CURLing 500

HFMS

Author: kyprizel, tracer.tong

We found some hockey field management system. Get the flag?

Flag format: CTF{..32 hexes..}

HINT1: are there any other users than "admin"?

HINT2: use Burp Suite to get inside

Start with username: debug

×

Binathlon 10

Just No One

Author: vos

Here's your binary: setup.exe

×

Binathlon 200

Elf Quest 2

Author: hellman

Tribute to Leet More 2010's Elf Quest. Hope you are good at guessi... err, reversing! elfquest2

HINT1: there are 3 stages

HINT2: You need only first 20902 bytes of 32000

Flag format: CTF{..32 hexes..}

×

Binathlon 300

Aski

Author: pzbitskiy

Download: aski

HINT1: Check 10 + 25*i

HINT2: pzbitskiy@aski:~$ cat /etc/issue

Ubuntu 13.04 \n \l

×

Binathlon 400

HackMe

Author: psb

Back to the 90th, HackMe.tap.

Flag format: CTF{..32 hexes..}

×

Binathlon 500

zbin

Author: mephi42, pzbitskiy

We know you'll want to have another look. Download: zbin

Flag format: CTF{..32 hexes..}

×

Figure Crypting 10

Crypting

Author: touzoku

43wdxz 4edcvgt5 65rdcvb 6tfcgh8uhb 9ijn

×

Figure Crypting 200

mic

Author: hellman

Flags for free!

nc 109.233.61.11 3120

Service source code: mic_server.py

Flag format: CTF{..32 hexes..}

×

Figure Crypting 300

GuessGame

Author: hellman

Be careful, it's cheating!

nc 109.233.61.11 3126

Flag format: CTF{..32 hexes..}

×

Figure Crypting 400

PRITLSAMA

Author: kyprizel

Feel yourself a PRISM operator. session.pcap backbone.cap

Flag format: CTF{..32 hexes..}

Hint: Start with Ticket key ID and backbone offset

Hint 2: PRITLSAMA has nothing to do with coverty channels

Hint 3: TLS and Elliptics

×

Figure Crypting 500

Remote Shellcoding Appliance

Author: hellman

go pwn this.

task.py, exec.so

nc 109.233.61.11 3123

Flag format: CTF{..32 hexes..}

×

Nopsleigh 10

As seen on DEFCON

Author: snk

EBFE is to x86 as ____ is to ARM64

×

Nopsleigh 200

zpwn

Author: pzbitskiy

zpwn it zpwn.

nc -u 109.233.61.11 31337

Flag format: CTF{..32 hexes..}

HINT1: non-stripped zpwn

×

Nopsleigh 300

Echof

Author: hellman

pwn this. FILE: task

nc 109.233.61.11 3129

Flag format: CTF{..32 hexes..}

×

Nopsleigh 400

LHC

Author: vos

Gain access to 109.233.61.11:30483. As of our previous intrusion effort, we've got a previous version of the binary. Currently they are running a more advanced one, but hey - it's better than nothing: lhc_old.

Flag format: CTF{..32 hexes..}

×

Nopsleigh 500

20Lines

Author: vos

Twenty Lines of Buttpain.

nc 109.233.61.11 2020

Flag format: CTF{..32 hexes..}

Hint: The exact binary running on the server