OOO archive --- DEF CON CTF [ login ]

dc2020f - parallel-af reversing pwn finals

by adamd

This was an attack/defense challenge, part of dc2020f.

Points: 1,000
PCAPs: download

You may spawn the server:

On your laptop
  • Install docker
  • Download the docker-saved image, then docker load -i the_img.tar.gz
  • docker run -d --name parallel-af oooa-dc2020f-parallel-af:371
  • Local IP: docker inspect parallel-af -f '{{ .NetworkSettings.Networks.bridge.IPAddress }}'
  • Connect to that IP:5000 — Remember to docker rm -f when done.
On your laptop (full source)
  • Install docker and pip install PyYAML coloredlogs
  • git clone
  • cd parallel-af
  • ./spawner --log-level=INFO
  • Connect to the ip:port displayed
Hosted by OOO Right now we're asking players to login first.



This challenge was part of the finals

During finals, scoring happens per-round based on attack (steal flags from others) and defense (patch the service to prevent others from pwning you) points. Patching is not currently simulated on the archive, but keep in mind that most services only allowed a limited amount of bytes to be changed from the original binary. Scoring rules for 2019 2020 2021.

King of the Hill points are also awarded per-round, with only the top-ranking teams getting points.

Teams were informed of game events, with redacted info on the last day. In 2019 players could see traffic pcaps only after some time, in 2020 and 2021 they had the choice the stealth their traffic or not (for half the points).

Babu Frik found this terminal in some junk droid. Can you figure it out and find the flag?

Patches to manchester are limited to 100 bytes. Patches to os are unlimited.

Fresh out of the current finals!

line_weight parallel-af.tar.gz


None yet :(
If you wish, you can contribute some.


Spoilers ahead! Code for this challenge is publicly available.