Skip to content

CTF challenges for Charger Hack during UAH's Week of Welcome 2021

Notifications You must be signed in to change notification settings

uahcyber/charger-hack-2021

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

58 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Charger Hack CTF 2021

Scripts, resources, and challenges for the UAH Cybersecurity Club's 2021 Charger Hack CTF.

Usage

To create a new challenge, run:

./general_scripts/new_challenge.sh

To start all challenges, run:

sudo docker-compose up --build [-d]

To stop all challenge instances, run:

sudo docker-compose down

Challenge Access

The following addresses in IP:PORT form can be used to access each challenge. This is assuming you are running the challenges on localhost (127.0.0.1), if you are running them elsewhere, just replace the IP:

  • web/servercheck - 127.0.0.1:25870
  • web/animal-farm - 127.0.0.1:63122
  • web/charger-blues-first-website-pt1 - 127.0.0.1:46081
  • web/hacker-name-generator - 127.0.0.1:34554
  • web/blues-billboard - 127.0.0.1:38256
  • pwn/greetings - 127.0.0.1:19601
  • pwn/get_the_flaaaaaaaaaa - 127.0.0.1:50371
  • pwn/insert - 127.0.0.1:17424
  • re/babylock - 127.0.0.1:15727
  • misc/catz - 127.0.0.1:36416
  • misc/calc - 127.0.0.1:15867
  • helpers/web-bot (not a challenge, just admin bot for XSS) - 127.0.0.1:25870

About

CTF challenges for Charger Hack during UAH's Week of Welcome 2021

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •