OOO archive --- DEF CON CTF [ login ]

dc2021q - rad reversing pwn

by nullptr

This was a jeopardy challenge, part of dc2021q.

This challenge was represented as 🛰️
Points: 500
Was solved by: 1 teams

You may spawn the server:

On your laptop
  • Install docker
  • docker pull archiveooo/pub:rad (docker-saved download)
  • docker run -d --name rad archiveooo/pub:rad
  • Local IP: docker inspect rad -f '{{ .NetworkSettings.Networks.bridge.IPAddress }}'
  • Connect to that IP:1337 — Remember to docker rm -f when done.
On your laptop (full source)
  • Install docker and pip install PyYAML coloredlogs
  • git clone
  • cd rad
  • ./spawner --log-level=INFO
  • Connect to the ip:port displayed
Hosted by OOO Right now we're asking players to login first.


The undiscovered country from whose bourn

No traveler returns, puzzles the will

And makes us rather bear those ills we have

Than fly to others that we know not of?

Thus conscience does make cowards of us all,

And thus the native hue of resolution

Is sicklied o'er with the pale cast of thought,

And enterprises of great pith and moment

With this regard their bits turn awry,

And lose the name of action.

Use our cutting-edge graphical client to observe science in action!

Your team token is the value of your dc29_access_token in your browser's
local storage for

See the source README on how to interface to the archived challenge.

line_weight rad_client line_weight rad_fw


None yet :(
If you wish, you can contribute some.


Spoilers ahead! Code for this challenge is publicly available.