Offical github:

https://github.com/UMassCybersecurity/UMassCTF-2022-challenges

https://jakob.space/blog/umass-ctf-2022.html

https://seal9055.com/ctf-writeups/umassctf_2022/coffee_maker

https://seal9055.com/ctf-writeups/umassctf_2022/zip_parser

PWN:

ret2emacs:

So, I've got a reputation at work for doing just about everything in Emacs. Reading my email, browsing my RSS feeds, running shell commands.. you name it. Who can blame me? It's more extensible than any other piece of software that could do those things.
To make a point, I wrote a dynamic module for parsing SIXEL during my lunch break, and I set up a Rudel server to show it off. I think this is going to blow the minds of all these VSCode losers.
hint:
The flag isn't on disk, but is instead in an Emacs buffer.

ret2emacs.zip

coffee_maker:

Our coworker just bought an iot coffee machine that lets him start the brewing process from his computer. Hacking it and messing with his coffee seems like a fun prank. We were able to extract the compressed firmware the encoder/compressor. Can you retrieve the original firmware and write an exploit for the firmware? I'm sure its vulnerable, it probably doesn't even have stack protectors or pie.
According to the manufacturers website the md5sum of the original firmware is:29f01db82591575454dd6e36a87c397f
For admins: to start challenge, setup docker using commands commented at top of Dockerfile. Distribute files in static to user

coffee_maker.zip

zip_parser:

When a tree falls in the forest with noone around to hear it, some say that no sound is made. Does the same apply to processes without output?

zip_parser.zip

Reverse: