BSidesPDX CTF 2020 is using the bsides-ctf-framework. See TTimzen's blog post for a detailed explanation of the framework, motivations, and instructions for writing challenges.
Challenge authors:
The CTF event ended with:
- 75 teams registered
- 135 individual players
- 180 flags submitted
- Every single challenge solved
The most solved challenges were:
- 23 solves for Heading the Right Way (web)
- 14 solves for Please Stand By (ota)
- 14 solves for basic-bof-1 (pwn)
The least solved challenges were:
- 1 solve for cheatcode (re)
- 2 solves for Cavage Enough for You (web)
- 2 solves for speakers (pwn)
The top 3 teams were:
- OSUSEC - 3938 points
- redpwn - 3044 points
- limsa - 3041 points
Challenge Name | Category | Points | Cloud Port(s) | Local Port(s) |
---|---|---|---|---|
Sowing Discord | intro | 10 | N/A | N/A |
Flag Vault | re | 100 | N/A | N/A |
flagvault.c | re | 200 | N/A | N/A |
cheatcode | re | 300 | N/A | N/A |
Heading the Right Way | web | 100 | 8081 | 8080 |
SOCKING IT TO YA | web | 200 | 8081, 8082, 1080 | 8081, 8082, 1080 |
Cavage Enough for You | web | 300 | 1337 | 1337 |
basic-bof-1 | pwn | 100 | 9999 | 9990 |
basic-bof-2 | pwn | 200 | 9999 | 9991 |
speakers | pwn | 300 | 9999 | 9991 |
Default Onion | tor | 100 | N/A | N/A |
Default Onion - Fixed | tor | 200 | N/A | N/A |
Microblog | tor | 300 | N/A | N/A |
Please Stand By | over-the-air | 100 | N/A | N/A |
Xclusive Numborz | over-the-air | 200 | N/A | N/A |
Down the rabbit hole | over-the-air | 300 | N/A | N/A |
To locally test, deploy or play challenges with Docker, run the following (Ubuntu)
sudo apt install docker-compose
sudo docker-compose build && docker-compose up -d
- Containers are viewable at localhost:PORT (view with docker-compose ps)
sudo docker-compose down
to stop the containers
Default Onion: sudo docker exec -it default-onion cat /var/lib/tor/hidden_http/hostname
Default Onion - Fixed: sudo docker exec -it default-onion-fixed cat /var/lib/tor/hidden_http/hostname
Microblog: sudo docker exec -it microblog cat /var/lib/tor/hidden_http/hostname
This year we ran all of our challenges in k8s using the Makefile and yamls in the oci
directory of all pwn, web, and tor challenges. The Over-the-Air challenges had a Twilio bot and were streaming to Twitch on a seperate VM. We've done our best to include all of the tools and information required to stand-up the Over-the-Air challenges locally, but due to the use of Twilio, it will be difficult to replicate the challenge: Down the rabbit hole
in it's entirety.