Offical github:
https://github.com/UMassCybersecurity/UMassCTF-2022-challenges
https://jakob.space/blog/umass-ctf-2022.html
https://seal9055.com/ctf-writeups/umassctf_2022/coffee_maker
https://seal9055.com/ctf-writeups/umassctf_2022/zip_parser
So, I've got a reputation at work for doing just about everything in Emacs. Reading my email, browsing my RSS feeds, running shell commands.. you name it. Who can blame me? It's more extensible than any other piece of software that could do those things.
To make a point, I wrote a dynamic module for parsing SIXEL during my lunch break, and I set up a Rudel server to show it off. I think this is going to blow the minds of all these VSCode losers.
hint:
The flag isn't on disk, but is instead in an Emacs buffer.
Our coworker just bought an iot coffee machine that lets him start the brewing process from his computer. Hacking it and messing with his coffee seems like a fun prank. We were able to extract the compressed firmware the encoder/compressor. Can you retrieve the original firmware and write an exploit for the firmware? I'm sure its vulnerable, it probably doesn't even have stack protectors or pie.
According to the manufacturers website the md5sum of the original firmware is:29f01db82591575454dd6e36a87c397f
For admins: to start challenge, setup docker using commands commented at top of Dockerfile. Distribute files in static to user
When a tree falls in the forest with noone around to hear it, some say that no sound is made. Does the same apply to processes without output?