RITSEC CTF 2025
- https://ctftime.org/event/2673
- March 21 - March 23
My Solves/Writeups
Forensics
Challenge Name | Difficulty | Points | Writeup |
---|---|---|---|
forensics/banksman | medium | 471 | jump |
Web
Challenge Name | Difficulty | Points | Writeup |
---|---|---|---|
web/virtual-mayhem | easy | 419 | jump |
web/upload-issues | medium | 483 | jump |
Pwn
Challenge Name | Difficulty | Points | Writeup |
---|---|---|---|
pwn/bit-burger | easy | 467 | jump |
pwn/hashmatch | medium | 499 | jump |
Jail
Challenge Name | Difficulty | Points | Writeup |
---|---|---|---|
jail/shrimple | easy | 494 | jump |
jail/seti | easy | 496 | jump |
Writeups
forensics/banksman
Our professor received a report from an unfamiliar student. With his experience, the professor realized that this report was abnormal. He immediately used this file for our research assignment. Let’s analyze whether there is anything mysterious embedded in it!
(This challenge was written by MetaCTF. The flag format is MetaCTF{})
Attachments: report.pdf
Solution
Flag: DUCTF{C_is_n0t_s0_f0r31gn_f0r_incr3d1bl3_pwn3rs}
web/virtual-mayhem
This application uses a virtual machine to sandbox user templates and filters potentially harmful input. However, every lock has its key. Can you figure out how to escape the virtual machine and retrieve the flag?
host5.metaproblems.com:7585
(This challenge was written by MetaCTF. The flag format is MetaCTF{})
Attachments: virtual_mayhem.zip
Solution
web/upload-issues
This site lets you look at cpio archives. If only we had an admin account, we could look at the flag…
web-upload-issues.ctf.ritsec.club
(This challenge was written by ICR.)
Attachments: upload_issues.zip
Solution
Flag: abuse@telstra.net
pwn/bit-burger
Welcome to BitBurger, home of the world-famous Bit Burger! 🍔
Put in an order here: nc binex-bitburger.ctf.ritsec.club 32200
Only grilled or fried at the moment though, the other machines are broken, sorry!
(This challenge was written by MetaCTF.)
Attachments: bit_burger.zip
Solution
Flag: pTCNp5p6LP0d7qA77yvb4SHf40
pwn/hashmatch
This server is asking me to reverse a hash for a flag, but brute forcing MD5 sounds tedious. Maybe there’s something more… fun we can do to find the flag.
nc hashmatch.ctf.ritsec.club 30898
When you connect, type your input and it will be handled by the challenge.
(This challenge was written by ICR.)
Attachments: hashmatch.zip
Solution
Flag: nuclei
jail/shrimple
As shrimple as that :p
nc shrimple.ctf.ritsec.club 32195
Attachments: shrimple.py
Solution
Flag: ozzieozzieozzie
jail/seti
Come join our search for alien life
nc seti.ctf.ritsec.club 31793
Attachments: seti.zip
Solution
``