Welcome to the SkullSpace CTF workshop!
This is a list of all the levels. You can find all the files you need to complete each level in the appropriate folders. You'll be given the port number, and occasionally source files or other things you need. And sometimes hints!
You might also want to check out FLAGS.md to verify your flags.
And, most importantly, have a look at PRIMER.md, which explains everything you need to know about tools, assembly, and everything else!
These are roughly ordered by difficulty, easiest to hardest.
These are challenges designed to teach basic CTF skills, the primary theme being writing shellcode.
Port: 6112
A simple web problem.
Port: 6113
This is a great beginner level, simply write shellcode that doesn't crash!
Port: n/a
Can you read a pcap?
Port: n/a
Reverse engineer this simple program!
Port: 6114 (basic) and 6115 (nz)
Write some fairly simple shellcode (the -nz variation doesn't allow NUL bytes)
Port: 6116 (basic) and 6117 (nz)
Read the flag from a known memory address
Port: 6118 (basic) and 6119 (nz)
Write a special value to a known memory address
Port: 6120 (basic) and 6121 (nz)
Read the flag off the stack!
Port: 6122 (basic) and 6123 (nz)
Write a special value to the stack (without damaging the rest of the stack)
Port: 6124 (basic) and 6125 (nz)
Read the flag from a file on the disk
These are challenges from BSidesSF CTF. Some are easier, some are harder. You can find solutions if you google the name, so only do that if you're completely stuck!
Port: n/a
Modify a binary (on disk or in memory) to decrypt the flag
Port: 6126
Shellcode with an MD5 prefix
Port: 6127
Shellcode, in 5 bytes or less
Port: 6128
Shellcode, that's base64 compatible
Port: n/a
A fun little crypto problem
Port: n/a
Good luck figuring out the flag! Just remember the theme. :)
Port: 6129
Some reverse engineering, some crypto, and some web. Fairly difficult!
Port: 6130
Write some game AI to build shellcode! Really