Neuland CTF 2022

On the 2nd of April, Neuland held it’s first own CTF in the Technische Hochschule Ingolstadt. About 40 participants spent the following 8 hours solving challenges and making new friends. To round off the event, we wrote a blog post detailing the solutions to the challenges. If you want to try them yourself, here is the link to the corresponding GitHub repository. Have fun! Cryptography RSA - Easy Can you read my secret message?...

April 9, 2022

Cyber Santa CTF - Bamboozled Challenge Writeup

The challenge input consists of a single .pyc file, which is a bytecode for a program run with python 3.8. There are existing tools to decompile .pyc back to .py such as decompyle3 or uncompyle6, but unfortunately both of these tools and some others we tested fail to decompile the given pyc file. The two mentioned ones print the JIT opcodes in human readable format and print Parse error at or near 'None' instruction at offset -1...

December 5, 2021