Skip to content

lukaskuzmiak/cybergame.sk-2025-writeups

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

CyberGame.sk 2025

All challenges are archived (if possible) in their respective directories, you should find all files that were given for the challenge. Many of them can be run/solved locally. Files related to solving the challenge are always in Solution/ folder, avoid it if you don't want spoilers.

I tend to over-do and over-complicate things - you've been warned. If you have a better solution, send me a Pull Request πŸ™‚.

Dependencies

When you see commands like r.emit or r.b64 or other r.<something> in some of the write-ups, that is Binary Refinery, basically CyberChef in a command-line, but better, lol. If you do not use it yet, you should.

Some of the crypto challenges use SageMath, you can find follow the Sage Installation Guide.

Python virtual environment

A lot of the solutions use Python and various libraries, if you want to play with the scripts, it is best to create a virtual environment and install the dependencies:

python3.13 -m venv venv # may work with a different version, 3.13 is what I used
source venv/bin/activate
pip install -U pip wheel
pip install -r requirements.txt

Challenges (Table of Contents)

Some write-ups are split-up per sub-challenge, some are not - depends on their length and how related they are.

Cryptography

  • Codebook (1 pts)
  • Blockchain (1 pts)
  • easy like counting up to three (1 pts)
  • Almost Classic (3 pts)
  • 3AES (3 pts)
  • Key exchange (9 pts)
  • Recovery 1 (3 pts)
  • Recovery 2 (3 pts)
  • Recovery 3 (9 pts)

[β˜…β˜…β˜†] Short Crypto Tales

[β˜…β˜…β˜…] Elliptic

Malware Analysis and Reverse Engineering

  • Sleepy python (1 pts)
  • Bash dropper (1 pts)
  • Password protected (1 pts)
  • Tool (3 pts)
  • Lies (3 pts)
  • Executer (9 pts)

[β˜…β˜…β˜†] The Chronicles of Greg

[β˜…β˜…β˜…] JAILE3

Forensics

  • Hard choices (1 pts)
  • In competition with jellyfish (1 pts)
  • So long, but wait, we’re still playing! (1 pts)
  • Still fighting (1 pts)
  • Between 15 and 17 (1 pts)
  • A Day in the Strife (1 pts)
  • Independence day (1 pts)
  • Or hack their mainframe... (1 pts)
  • So much just from logs (3 pts)
  • Inspect the file system (3 pts)
  • Clean bastion (3 pts)
  • Feel free to dig in (3 pts)
  • The backdoor culprit (9 pts)

[β˜…β˜†β˜†] The Chronicles of Greg 2

  • FATigue (6 pts)
  • Is that it? (6 pts)
  • Was that the only file? (6 pts)
  • It tastes like a poem (6 pts)
  • Wrapping it up (18 pts)

OSINT

  • The tip (3 pts)
  • The evidence (3 pts)
  • The digital footprint (3 pts)
  • The private channel (3 pts)
  • The escape plan (9 pts)
  • Identification (9 pts)
  • Localization (9 pts)
  • Golden Hour (27 pts)

Process and Governance

  • Handling (3 pts)
  • Colors of the rainbow (6 pts)

Web Exploitation and Binary Exploitation

  • Door To The Stable (6 pts)
  • Shadow Realm (6 pts)
  • The Dark Ruler (6 pts)
  • Final Curse (18 pts)
  • Calculator (6 pts)
  • User (6 pts)
  • Final Escape (18 pts)

[β˜…β˜…β˜†] JAILE2

[β˜…β˜…β˜†] ByteBusters

[β˜…β˜…β˜…] Meme History Blog

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published