This is a mini capture the flag event for TempleOS. In this repostitory there is a RedSea ISO file TOSMiniCTF.ISO.C
with 5 benign TempleOS binaries 1.BIN.Z thru 5.BIN.Z. Each is an ahead of time compiled short simple program less than 400 bytes, which asks the user for a password and reports if the password is correct. The first one is intended to be easy, the rest may require some more work. There is only one correct answer for each and the password for each is composed of less than 20 printable ASCII characters. This CTF is geared toward people who know assembly / debugging / reverse engineering assembly code.
-
- Transfer
TOSMiniCTF.ISO.C
to you TempleOS machine or VM
- Transfer
-
- Mount it
MountFile("D:/path/to/TOSMiniCTF.ISO.C");
- Mount it
-
- Change to the mounted drive
Cd("M:/")
(assuming this is the first file you mounted)
- Change to the mounted drive
-
- Load and crack the password for each of them. Ex:
Load("1");
,Load("2");
, etc
- Load and crack the password for each of them. Ex:
When you have an answer create an issue with a SHA256 sum of the correct password to prove to the world you were the first person to crack it.
Example:
If the password is T3mple05Rock5! the SHA256 sum could be calculated on Linux with:
echo -n "T3mple05Rock5!" | sha256sum
Be sure not to include newlines in your hash (that's what the -n is for).
99e8c46183f3cdb67b4a43e2d814e465c4984bc1e5c6b78ed5e8a4f5aa4e0cdf
solved by rendelloddf4bbaf93b2b7b49a2ec25d3f79faebXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
379ba9ff5436dfa3194e46cf703a10f32b9df763e213638743efa7a23d7b192e
*** solved by rendello8df67da22e2f84aa2e07de8ca0c5cd14XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
a98732bdb8ba962dd08ba587520b66a1XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
*** Note 3 actually has multiple correct passwords, this hash is calculated using the answer which uses only capital letters.