First of all, I would like to thank Rory, Emmet, Jack, Swapnil and Donal of @HackTrinityCTF for putting together this wonderfully organised event. It went off seemingly without a hitch, so well done to you lads! It will only get better from here.
A special thanks goes to the mastermind behind Denovo 3. I spent more than 30 hours on that challenge and eventually solved it after powering through it from Friday night until Saturday morning. Of all the challenges, this one made me feel the most accomplished as I had conquered something that was completely alien to me before. So thank you for granting me this experience!
Keep an eye on HackTrinity's social media if you're looking to get the source code of the challenges.
Without further ado, here are my solutions.
If you've never played a Capture-The-Flag competition before, worry not!
The aim of the game is to find a string of text called a flag
Usually the flag will be in the form HackTrinity{<flag>}
, but sometimes it can be a different piece of text
To receive a free 50 points, enter HackTrinity{well_that_was_a_freebie}
in the box below, and click Check.
Oooh, we Trinity students love our rules and procedures.
We love them so much we included a flag in the rules for this competition. Can you find it?
What's our real Twitter handle?
Denovo is a new startup which develops DRM for games.
Version 1 is to be released soon, and you've been called in to test its effectiveness...
Note: Denovo have decided that serial keys for v1 and all future versions look like "XXXXXX-XXXXXX-XXXXXX-XXXXXX-XXXXXX", where 'X' is a capital letter.
Both binaries below are generated from the same code, one is built for ARM platforms and one for x86-64. You can choose whichever you're most comfortable with :)
denovo_v1_x86TCD Disinformation Services have been hard at work making sure that any flag-containing media is fully censored.
Apparently one slipped through... Can you find it?
bunny.mkvOh noes! Someone's stole the Book of Kells and is auctioning it off on the Dark Web!
Download the Tor Browser and visit the auction site at http://uxpkyayer253dtcl.onion to find out who's been making bids on this Trinity treasure :O
The Luas website has been hacked again, and a threatening ransom message posted. Can you track down the culprit's real full name?
https://luas.hacktrinity.meTickets for Trinity Ball have finally been released! Due to high demand, the organisers have limited tickets to one per person. Can you bypass the restrictions and checkout two tickets at once?
https://trinityball1.hacktrinity.meNB: Networking challenges will not work on some college networks - try your home network instead. Make sure UDP ports 2000 and up are usable for outbound traffic.
The networking challenges for this CTF make use of a project called Naumachia, which places you in an isolated network environment.
Each challenge has a dedicated OpenVPN server (you can download your credentials at the link at the bottom of the challenge description). See here for the steps to get your device connected.
While the connection is being established, a set of containers will be created for you. You can then run a DHCP client (on Linux or Mac, Windows will perform DHCP automatically) to get an IP and see the subnet you have been allocated.
You can also connect multiple machines to the same challenge instance using the same credentials if you want. When all of your devices have disconnected, your containers for that challenge will be destroyed (and re-created next time you connect).
Once you're all set up, this challenge should be fairly easy: you should be able to nmap your allocated subnet to find a web server hosting the flag.
Download OpenVPN config for this challengeApparently the flag is in the file hidden.txt
but I can't find it, good luck to you!
NB: Networking challenges will not work on some college networks - try your home network instead. Make sure UDP ports 2000 and up are usable for outbound traffic.
You should really listen a bit more.
Download OpenVPN config for this challengeWe discovered a GSM audio bug in the president's office. Our counter-surveillance techs have determined that the bug was setup to phone home to +353 89 490 9392. We suspect this number is probably the personal phone number of one of the bad people involved (they're not very smart). Can you use your open-source intelligence gathering skills to discover the real-life identity of the owner of this phone?
Hint: they use a service used by >1 billion other people
I was trawling through my email the other day to see if I could find any flags and I found a message with this file in my spam box.
The subject line claimed "FLAG WITHIN!", but I can't make any sense of it.
brew.ciaAfter Denovo v1 was released into the wild (despite your warnings) and cracks for the protected games appeared online within the hour, the engineers went back to the drawing board.
Now they're ready to release Denovo v2. Apparently the new version makes use of a proprietary encryption solution which is UNCRACKABLE. Can you take a look?
Both binaries below are generated from the same code, one is built for ARM platforms and one for x86-64. You can choose whichever you're most comfortable with :)
denovo_v2_x86My friend Urban Turing made a new language and he claims that it is Turing complete, can you run the program he has written in this new language?
program.txtSome normie sent you some strange code, can you find out how to run it?
chunga fudd chunga chunga chunga chunga chunga chunga chunga big karen chungus ricardo big chunga chunky fudd chunga chunga chunga big karen karen karen karen chungus ricardo big karen chunky karen karen chunky karen karen karen karen karen karen karen karen chunky big chunga fudd chunga chunga chunga big karen chungus ricardo big chunga chunky chunga fudd chunga chunga chunga big karen chungus ricardo big karen chunky chunga chunga chunga chunga chunga chunga chunga chunga chunga chunky karen karen karen karen karen chunky chunga chunga chunga chunga chunga chunky karen karen karen karen karen karen karen karen karen karen karen chunky karen karen karen karen karen chunky karen karen chunky big chunga fudd chunga chunga chunga big karen chungus ricardo big chunga chunky fudd chunga chunga chunga chunga big karen karen karen karen karen chungus ricardo big chunga chunky chunga chunga chunga chunky fudd chunga chunga chunga big karen chungus ricardo big chunga chunga chunga chunga chunky karen karen karen karen fudd chunga big karen karen karen chungus ricardo big chunky chunga fudd chunga chunga chunga chunga big karen karen karen chungus ricardo big karen karen chunky big chunga chunga fudd chunga chunga chunga chunga chunga big karen chungus ricardo big chunga chunky karen karen karen karen karen karen karen karen chunky chunga chunga chunga chunga chunga chunga chunga chunga chunky fudd chunga chunga chunga big karen chungus ricardo big chunga chunga chunga chunga chunky fudd chunga big karen karen karen karen karen chungus ricardo big karen karen chunky chunga chunga fudd chunga chunga chunga chunga chunga big karen chungus ricardo big chunga chunky chunga chunga chunga chunga chunga chunga chunga chunga chunga chunga chunga chunga chunga chunky big chunga fudd chunga chunga chunga big karen chungus ricardo big chunga chunga chunky fudd chunga chunga chunga big karen chungus ricardo big chunga chunga chunky karen fudd chunga big karen karen karen karen karen chungus ricardo big chunky fudd chunga big karen karen karen karen karen karen karen chungus ricardo big chunga chunky chunga chunga chunga fudd chunga big karen karen karen karen chungus ricardo big chunky fudd chunga chunga chunga chunga chunga big karen chungus ricardo big chunga chunky fudd chunga big karen karen karen chungus ricardo big chunga chunky fudd chunga chunga chunga chunga chunga chunga big karen chungus ricardo big chunga chunky chunga chunga fudd chunga chunga chunga big karen chungus ricardo big chunga chunga chunky karen chunky karen fudd chunga chunga chunga big karen karen chungus ricardo big chunga chunky fudd chunga chunga chunga big karen chungus ricardo big chunky chunga chunky karen karen karen karen karen karen chunky chunga chunga chunga chunga chunga chunga chunga chunga chunga chunga chunga chunga chunky big chunga chunga fudd chunga chunga big karen karen karen chungus ricardo big chunky
NB: Networking challenges will not work on some college networks - try your home network instead. Make sure UDP ports 2000 and up are usable for outbound traffic.
Hey, it's rude to eavesdrop!
Download OpenVPN config for this challengeThis zip file seems to be corrupted, any chance you could recover the flag inside?
zippy_flag64.zipNB: challenge port may be blocked on college networks
I set up a server so I can check on the flag for this challenge.
You can find it at ht3.hacktrinity.me:1337 (to connect using netcat, run nc ht3.hacktrinity.me 1337
)
Don't worry, it's password-protected, so you won't be able to get it.
Here's the program running on the server (not that it'll help you since I've replaced the password and flag with rubbish):
flow.referenceCheck out this cool image converter I made!
Note: You should be able to find the image converter website by nmap
ing your allocated subnet
Miers Porgan has been caught hacking into voicemails again.
Can you figure out how he got into mine?
+353 76 680 3900
NB: this is a VoIP number - can be expensive to call on some providers. Check your rates before dialing and always ask the billpayer's permission ;)
A friend of mine keeps a portable Linux install on his USB drive.
I passed by the other day and saw a flag on his screen, which he quickly alt-tabbed away from.
Since I really want that flag, I grabbed the drive and made an image of it while he was off at lunch, but I can't seem to find any sign of a flag. Can you help?
disk.img.tar.gz (154.1 MB)The purpose of Tor Hidden Services is to hide the IP address of the server that is hosting the website. However, can you identify the real IP address the forum software is running on?
Hint: SSRF
Enter the flag as an IPv4 address, e.g. 1.33.4.2
NB: Networking challenges will not work on some college networks - try your home network instead. Make sure UDP ports 2000 and up are usable for outbound traffic.
A guy I know keeps his flags on a private webserver inside his home network. I really want those flags, any chance you could help? (For this challenge you can assume that your allocated subnet is "the internet")
Download OpenVPN config for this challengeWhen the "encryption" behind Denovo v2 fell almost as quickly as v1, management decided to fire all of the engineers and start over.
After months of work, Denovo v3 is finally for prime-time. Did the new team's efforts pay off?
Both binaries below are generated from the same code, one is built for ARM platforms and one for x86-64. You can choose whichever you're most comfortable with :)
NB: flag is not in the usual HackTrinity{<flag>} format
denovo_v3.tar.gzThe ticket site admins have fixed the flaw in the site. Can you still get an extra ticket?
https://trinityball2.hacktrinity.meAs part of our regular scanning, we found this admin interface on our network open to the world.
Can you read /tmp/flag.txt
?
All DRM falls eventually, and Denovo management is finally coming to terms with that.
But that doesn't mean they're finished! Denovo v4 is ready to go, this time with 100% more chance of being uncrackable!
(PR have yet to learn their lesson...)
denovo_v4