The contest is driven by classic rules (Attack-Defense CTF). Each team is given a set of vulnerable services. Organizers regulary fill services with private information — the flags. The goal of each team is to find vulnerabilities, fix them in their services and exploit them in order to get flags from other teams.
Service | Language | Checker | Sploits | Authors |
---|---|---|---|---|
minebank | JS | Checker | Sploits | @kot |
cat_farm | C# | Checker | Sploits | @rx00 |
Service | Language | Checker | Sploits | Authors |
---|---|---|---|---|
mailbox | Python | Checker | Sploits | @1MiKHalyCH1 |
oh_my_cubes | Go | Checker | Sploits | @capitanbanana |
LetoCTF 2022 A/D training was held on Aug 9,10 2022.
Copyright (C) 2022 HackerDom