We just published all services, including source code, checkers, and exploits for all vulnerabilities. If you want to look up solution, you can do so now.
For some services the authors also provided writeups:
Our infrastructure is already public, we'll release some updates later this month:
We hope you had a nice experience. Please don't forget to vote for us on CTFtime! See you next year!
thanks for playing saarCTF 2023 with us, we hope you enjoyed it.
Congratulations to the top three teams:
Please also tell us how you liked the individual services in our feedback form: https://forms.gle/WBvv3y1iEbANyTos8
See you soon
The vulnbox decryption key is:
Cloud VMs can be created now. Network will open in an hour.
The encrypted vulnbox preload for selfhosters is available: Vulnbox ova file
$> sha256sum *
For those who want us to host their vulnbox in the cloud: You don't need to download or prepare the encrypted vulnbox.
Dear saarCTF participants,
with less than 3 days to go, we release VPN configurations and VM images on our website. Teams can now setup router VM and testbox VM. Please contact us per mail or IRC if things break.
Check vpn.ctf.saarland to see if your setup is functional.
If you want us to host the box for you, you do not need to prepare any VM - just distribute the cloud VPN configuration with your mates.
$> sha256sum *
Our fourth iteration, saarCTF 2023 will take place on Saturday, 18.11.2023, 13:00 UTC and last for 8 hours, plus one hour preparation time where network is closed. The competition is open to everybody.
We invite you to a classical attack-defense competition. This year, we offer you to host your vulnbox VM in the cloud for you, making things much easier to set up! Of course we will still provide Virtualbox images as a usual alternative.
The registration is available soon, and will stay open until a few hours before the competition starts.