News (click for archive)
Challenge category:
Forensics
Binary Exploitation Cryptography Forensics Miscellaneous Networks Open-Source Intelligence Radio Frequency Reverse Engineering Web Exploitation Welcome
deldeldel
50 Points
easy

I managed to log more than just keys... perhaps it was too much data to capture?

By: skat
Tracem 1
152 Points
baby

Here at EI Corp, ethics are our top priority! That's why our IT team was shocked when we got a knock from our ISP informing us that someone on our computer network was involved in some illegitimate activity. Who would do that? Don't they know that's illegal?


Our ISP's knocking (and so is HR), and we need someone to hold accountable. Can you find out who committed this violation?


Flag format: irisctf{username} (e.g. irisctf{jdoe} ). Usernames are case-sensitive.

By: skat
Windy Day
424 Points
medium

I have really bad memory. I was analyzing something but then lost track of an important note...

By: skat
Tracem 2
457 Points
medium

Another knock from our ISP and HR looking for a John Doe... but now it's not so easy.


Flag format: irisctf{username} (e.g. irisctf{jdoe} ). Usernames are case-sensitive.

Hint!

Bruteforcing flag submissions for this challenge is NOT the solution. If we see >100 flag submissions, you will be asked to provide a writeup on the legitimate solution before event end in order to maintain prize eligibility.

By: skat
RIP Art
480 Points
hard

I can't believe I forgot to save my art!

By: skat