OOO archive --- DEF CON CTF [ login ]

dc2019q - LCARS000 reversing shellcoding

by slipper

This was a jeopardy challenge, part of dc2019q.

Points: 156
Was solved by: 24 teams

You may spawn the server:

On your laptop
  • Install docker
  • docker pull archiveooo/pub:LCARS000 (docker-saved download)
  • docker run -d --name lcars000 archiveooo/pub:LCARS000
  • Local IP: docker inspect lcars000 -f '{{ .NetworkSettings.Networks.bridge.IPAddress }}'
  • Connect to that IP:5000 — Remember to docker rm -f when done.
On your laptop (full source)
  • Install docker and pip install PyYAML coloredlogs
  • git clone (notice below)
  • cd LCARS000
  • ./spawner --log-level=INFO
  • Connect to the ip:port displayed
Hosted by OOO Right now we're asking players to login first.


Library Computer Access/Retrieval System

This challenge exists in different variations and difficulty levels. Start with this one (LCARS000). Source code is also public under this name.

Files are shared and include multiple flags, make sure to submit the right one on each challenge page.

line_weight LCARS line_weight init.sys line_weight loader.sys line_weight crypto.sys line_weight echo.sys


None yet :(
If you wish, you can contribute some.


Spoilers ahead! Code for this challenge is publicly available. There are multiple branches, one for each level.