CSAW CTF 2014 is the second CTF contest I've attended ( the first one was the HITCON CTF 2014 ) . Since this is the first time I've actually solved something in the contest, I decide to post my first own writeup .
CSAW CTF 2014 -- Exploitation 200 pybabbies
CSAW CTF 2014 -- Exploitation 400 saturn
First the challenge gave us a binary file (ELF for Intel-386). But we can't execute it, cause we don't have the required shared library "libchallengeresponse.so". So we will have to launch IDA Pro to see what's going on within the program.
CSAW CTF 2015 -- Hacking Time
CSAW CTF 2015 -- FTP & FTP2
Category: Reversing (FTP) & Exploitable (FTP2)
Points: 300 (FTP) & 300 (FTP2)
CSAW CTF 2015 -- wyvern
Category: Reversing
Points: 500
Here they gave us another 64 bit ELF, which is apparently written in C++.
CSAW CTF 2015 -- autobots
Category: Exploitable
Points: 350
I hear bots are playing ctfs now.
nc 52.20.10.244 8888