← Back to home

CTF Writeups

    escape_from_markov

    escape_from_markov

    > We made a fake flag generator just for this CTF! It can generate flags that look like the real one! Can you find the real flag?

    IslandParty

    IslandParty

    imgproc

    > You open your mailbox and find a strange postcard (invite.bmp). Flipping it around, you squint your eyes and try to decipher the wobbly handwriting:

    CI Ninja

    CI Ninja

    prompt engineering

    > I found this project that uses a state-of-the-art fully automatic patching system. I could not find a way to break it, but I know the flag is in /flag.txt. Do you think you can get it?

    Mystical Castle

    Mystical Castle

    pddl

    > In the mystical realm of Eldoria, a land shrouded in legends and whispered secrets, there lived a young adventurer named Alex. With a heart full of curiosity and a spirit as wild as the wind, Alex had always been drawn to the tales of old, the kind that grandparents would recount by the flickering fireside on starless nights. Among these tales, one stood out - the story of the ancient Castle of Shadows, a place where time seemed to stand still, and where every corridor and chamber held a secret waiting to be uncovered.

    CI Ninja 2

    CI Ninja 2

    prompt engineering

    > Oh no, my exploit does not work anymore! Something's not quite right with these "available functions". Can you help me figure it out?

    Stop the model thief!

    > To steal an ML model, an attacker often sends 'very similar versions' of the same image, which tells the attacker how the model reacts to very small changes in the input. You realized that an attacker might be trying to steal your image classification model. You're given two files - [1::model_queries.npy] a list of images that your model received as inputs and [2::user_query_indices.txt] a list of image indices (starts from zero) in [1] sent to your model by each user-id. In [2], each line contains the indices from a different user-id (e.g., the very first line is user-id 0, the second line is user-id 1). Can you help us find the attacker's user-ids (there are 20 of them)? Note:: if there were 4 attacker user-ids (e.g., 82,54,13,36), the flag will be 'ictf{13,36,54,82}' (sorted, no quotes).