CSAW (see-SAW) is the world’s most comprehensive student-run cybersecurity event. It serves as an engaging platform for experiential learning and aims to inspire students to pursue education and careers in the field of cybersecurity.
Forensics
ZipZipZipZi…
Brighten up at last with the flag
We are given a singular zip file. When unzipping with unzip challenge.zip, we are given chunk1.zip and chunk0.txt. Looking at chunk0.txt, it looks like base64. So, we can assume we need to recursively unzip, grab all the chunks, and convert our base64 into a file.
Covert
It appears there’s been some shady communication going on in our network…
Quickly grabbing some of the first TCP packets, we can determine the original key.
This script finds the key using three known characters (csa from the flag format of csawctf{). Then we can iterate through the pcap and decode the flag.
Web
playing on the backcourt
yadayada playing tennis like pong yadayada someone’s cheating yadayada at least the leaderboard is safe!
Looking through all the endpoints, you can simply make a POST /get_eval and you basically get RCE. Unsure if this was intended, but simple enough: