Skip to content

Commit 2d5577b

Browse files
committed
Fixed line breaks.
1 parent 40f4ca2 commit 2d5577b

8 files changed

+42
-8
lines changed

challenges-category-Binary+Exploitation.html

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,7 @@
100100
I'll let you seek around my file as far as you want, but you can't go anywhere since it's /dev/null.
101101
</p>
102102
<p>
103+
<br>
103104
</p>
104105
<p>
105106
To figure out where things are, you can use the
@@ -239,6 +240,7 @@
239240
</code>
240241
</p>
241242
<p>
243+
<br>
242244
</p>
243245
<p>
244246
Socat version on remote is
@@ -341,6 +343,7 @@
341343
At the end lies your flag.
342344
</p>
343345
<p>
346+
<br>
344347
</p>
345348
<p>
346349
Updated distribution file: added Dockerfile and run script
@@ -423,4 +426,4 @@
423426
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
424427
</script>
425428
</body>
426-
</html>
429+
</html>

challenges-category-Forensics.html

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,11 +100,13 @@
100100
Never done forensics before? No problem. Digital forensics is the branch of forensic science related to the investigation of digital data and media typically pertaining to cybercrime. We do a lot of work related to data and information theory, which includes file formats.
101101
</p>
102102
<p>
103+
<br>
103104
</p>
104105
<p>
105106
I took this picture a while ago, but I deliberately broke the file so that you can't view it! Muahaha! Find out where I was, what time I took that photo, and the serial number of my camera. Oh and I also left a secret in the picture for you to find.
106107
</p>
107108
<p>
109+
<br>
108110
</p>
109111
<p>
110112
The flag format for this challenge is
@@ -173,6 +175,7 @@
173175
When I was 18 -- 18 years old -- I saw, for the first time in my life, I saw a vision of clarity. I saw that the organizers were trolling me.
174176
</p>
175177
<p>
178+
<br>
176179
</p>
177180
<p>
178181
Original video:
@@ -269,6 +272,7 @@
269272
Fred found a suspicious new script on his computer, but he doesn't remember making or downloading it! He thinks that an attacker might have left it behind by accident. We have a capture of the network traffic going to and from his computer around the suspected time of the intrusion.
270273
</p>
271274
<p>
275+
<br>
272276
</p>
273277
<p>
274278
Our tools and scanners couldn't detect anything. Can you?
@@ -386,4 +390,4 @@
386390
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
387391
</script>
388392
</body>
389-
</html>
393+
</html>

challenges-category-Miscellaneous.html

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,7 @@
192192
Another song for you - this time in mod format - but no instrument names for you to search up. Same flag format as last challenge.
193193
</p>
194194
<p>
195+
<br>
195196
</p>
196197
<p>
197198
Originally depends on: Name that Song 2
@@ -280,6 +281,7 @@
280281
My flag is protected by sick nsjail tech. I'm so confident in it, I'll even personally run your binary in it.
281282
</p>
282283
<p>
284+
<br>
283285
</p>
284286
<p>
285287
When you compile your binary to run, please use the provided Dockerfile - it is the same environment as on remote.
@@ -347,4 +349,4 @@
347349
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
348350
</script>
349351
</body>
350-
</html>
352+
</html>

challenges-category-Networks.html

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,7 @@
177177
I saw my arch-nemesis, Billy Bob Bobertson, in the library. He left his laptop open for 3 minutes to go use the restroom. Luckily, I had my BadUSB handy and gave myself a shell and then persistent remote access, and started running a few commands and capturing his web traffic (shown in the attached screenshot). I think he's up to something suspicious and received some sort of message from a group of criminals.
178178
</p>
179179
<p>
180+
<br>
180181
</p>
181182
<p>
182183
They say that looking through a pcap is like finding a needle in a haystack, but what do you do if that haystack is encrypted?
@@ -220,6 +221,7 @@
220221
We had a rat infestation so I put mousetraps everywhere. Now I can code in peace without rats!
221222
</p>
222223
<p>
224+
<br>
223225
</p>
224226
<p>
225227
I'm a networks guy, so I was doing some network coding the other day when I picked up these interesting transmissions from some not-exactly-802.11 devices. There seems to be some presumably low-power wireless device somewhere transmitting data continuously, like a fountain! I think it's transmitting the flag, but I don't understand its transmissions. Can you recover it?
@@ -308,4 +310,4 @@
308310
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
309311
</script>
310312
</body>
311-
</html>
313+
</html>

challenges-category-Radio+Frequency.html

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,11 +100,13 @@
100100
Welcome to the world of radio frequency! Before we give you real-life raw I/Q files and let you start hacking protocols, let's make sure you understand and can show basic competency in the fundamentals.
101101
</p>
102102
<p>
103+
<br>
103104
</p>
104105
<p>
105106
Note: challenges in this category are gated. Completion of babyrf 1 will unlock babyrf 2, and completion of babyrf 2 will unlock all the challenges in the RF category.
106107
</p>
107108
<p>
109+
<br>
108110
</p>
109111
<p>
110112
--- Hint ---
@@ -188,6 +190,7 @@
188190
Great job with babyrf 1! But what do we do if we have a really long string of 1s or a really long string of 0s? What kind of problem do we run into, and what kinds of solutions are there?
189191
</p>
190192
<p>
193+
<br>
191194
</p>
192195
<p>
193196
Note: challenges in this category are gated. Completion of babyrf 2 will unlock all the challenges in the RF category.
@@ -258,11 +261,13 @@
258261
Great job completing those babyrf challenges earlier. Now, we're moving from the theoretical domain into the real world! Let's get you started with real world RF.
259262
</p>
260263
<p>
264+
<br>
261265
</p>
262266
<p>
263267
My buddy sent me this file the other day of some signals he recorded. We think it holds the flag, but we're not sure what kind of file this is, nor do we have any idea how to open it! Do you think you could get the flag for us?
264268
</p>
265269
<p>
270+
<br>
266271
</p>
267272
<p>
268273
<strong>
@@ -317,11 +322,13 @@
317322
Dog goes woof, cat goes meow, bird goes tweet, and mouse goes squeak. Cow goes moo, frog goes croak, and the elephant goes toot. Ducks say quack, and fish go blub, and the seal goes ow ow ow! But there's one sound that no one knows.
318323
</p>
319324
<p>
325+
<br>
320326
</p>
321327
<p>
322328
What does the monkey say?
323329
</p>
324330
<p>
331+
<br>
325332
</p>
326333
<p>
327334
<strong>
@@ -367,6 +374,7 @@
367374
Sometimes I go around with a radio in my backpack and just see what I pick up.
368375
</p>
369376
<p>
377+
<br>
370378
</p>
371379
<p>
372380
Once you recover the message, wrap it with
@@ -376,6 +384,7 @@
376384
before submitting the flag.
377385
</p>
378386
<p>
387+
<br>
379388
</p>
380389
<p>
381390
<strong>
@@ -421,16 +430,19 @@
421430
My arch-nemesis, Billy Bob Bobertson, just moved into a new house. I'm still upset at him for stealing my Pringles all those years ago -- my delicious lemon, cheese, and garlic Pringles! Let's break into Billy Bob Bobertson's house and steal his new Lamborghini parked in his garage. I hear they're a lot of fun to drive in the Hollywood hills.
422431
</p>
423432
<p>
433+
<br>
424434
</p>
425435
<p>
426436
I planted a secret radio receiver near his house and picked up some signals from when he parks in the garage. Unfortunately, it looks like the RF-based access mechanism he uses uses non-static codes, so I can't just replay a captured signal (unless I were to rolljam it, of course). There must be some way to break in!
427437
</p>
428438
<p>
439+
<br>
429440
</p>
430441
<p>
431442
Note: this challenge was set up using the unlicensed frequency spectrum. This is a resource shared by all. There may be other transmissions unrelated to the challenge due to other devices using the medium when these samples were recorded.
432443
</p>
433444
<p>
445+
<br>
434446
</p>
435447
<p>
436448
The flag format for this challenge is the sequence of bits required to be transmitted in order to
@@ -444,6 +456,7 @@
444456
.
445457
</p>
446458
<p>
459+
<br>
447460
</p>
448461
<p>
449462
<strong>
@@ -507,4 +520,4 @@
507520
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
508521
</script>
509522
</body>
510-
</html>
523+
</html>

challenges-category-Reverse+Engineering.html

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,6 +188,7 @@
188188
There's this cool new Python obfuscator that came out recently that obfuscates Python. I made some changes to part 1 and obfuscated it. Now how will you get the flag?
189189
</p>
190190
<p>
191+
<br>
191192
</p>
192193
<p>
193194
Originally depends on: Meaning of Python 1
@@ -324,6 +325,7 @@
324325
Do you remember Scratch? You'll need to for this next challenge.
325326
</p>
326327
<p>
328+
<br>
327329
</p>
328330
<p>
329331
To input a flag, click the green flag and type in a flag. Press enter, then click Michael to check.
@@ -367,6 +369,7 @@
367369
Closet Computer is a strange, unfinished game that released in 2072. Many critics complained that the game was too unoptimized, and it is! Supposedly, this bad boy holds hundreds of threads in it. Why? Who knows! See if you can escape the closet!
368370
</p>
369371
<p>
372+
<br>
370373
</p>
371374
<p>
372375
Note: In rare cases, the program can get stuck. If it seems like it's doing nothing for a long time, just restart it.
@@ -428,4 +431,4 @@
428431
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
429432
</script>
430433
</body>
431-
</html>
434+
</html>

challenges-category-Web+Exploitation.html

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,7 @@
100100
More byte mean more secure
101101
</p>
102102
<p>
103+
<br>
103104
</p>
104105
<p>
105106
Although this is a web challenge, the script is ran directly with PHP because it doesn't need to have an HTML website attached. Run the command below to connect!
@@ -150,6 +151,7 @@
150151
JSONP is a old pattern for getting data into JS, but I heard it's insecure because an attacker can specify code instead of a function name. I solved this problem by not letting you change the name.
151152
</p>
152153
<p>
154+
<br>
153155
</p>
154156
<p>
155157
For this challenge you will need to submit a URL to the admin bot (a program that runs a browser and directs it to visit your URL, simulating a real person clicking your link). I recommend learning how to use
@@ -334,6 +336,7 @@
334336
I've written a program that let's you encrypt and decrypt strings, but it uses a proprietary closed-source SDK through GitHub Actions. Of course you can fork it and only the magical GitHub black box will be able to see it. So there's no way you could dump the entire SDK... right?
335337
</p>
336338
<p>
339+
<br>
337340
</p>
338341
<p>
339342
Note: this challenge uses a non-standard flag format, irisCTF{}.
@@ -389,6 +392,7 @@
389392
Classic bug combo pack
390393
</p>
391394
<p>
395+
<br>
392396
</p>
393397
<p>
394398
Admin will visit your URL after logging in.
@@ -444,6 +448,7 @@
444448
What does it truly mean to sanitize something? What is a sanitize? Is this challenge solvable?
445449
</p>
446450
<p>
451+
<br>
447452
</p>
448453
<p>
449454
Admin bot code is provided, running Chromium at least 109.0
@@ -517,4 +522,4 @@
517522
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
518523
</script>
519524
</body>
520-
</html>
525+
</html>

challenges-category-Welcome.html

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,7 @@
100100
Welcome to IrisCTF 2023! Whether this is your 1st or 100th CTF, we want you to have a fun and pleasant experience. Maybe you can even learn something new!
101101
</p>
102102
<p>
103+
<br>
103104
</p>
104105
<p>
105106
Here's a freebie to introduce you to what the flag format looks like:
@@ -141,6 +142,7 @@
141142
If you need help with a challenge, the only way to connect with us is through our Discord. Joining our Discord will also give you updates about a challenge and updates about the event.
142143
</p>
143144
<p>
145+
<br>
144146
</p>
145147
<p>
146148
Join our Discord and find the flag.
@@ -241,4 +243,4 @@
241243
<script src="/static/ctfx.js-v-1.3.0r5.js" type="text/javascript">
242244
</script>
243245
</body>
244-
</html>
246+
</html>

0 commit comments

Comments
 (0)