We just published all services, including source code, checkers, and exploits for all vulnerabilities. If you want to look up solution, you can do so now.
We also release the updated versions of our infrastructure:
We hope you had a nice experience, see you next year!
thanks again for playing saarCTF 2022 with us, we hope you liked it.
Congratulations to the top three teams:
The scoreboard has been published on ctftime, and we encourage you to also vote there.
Finally, we are really looking forward to reading your write-ups! We might also post our exploits here later.
See you soon
The vulnbox decryption key is:
Cloud VMs can be created now. Network will open in an hour.
The encrypted vulnbox is available for preloading: Vulnbox ova file
$> sha256sum *
For those who want us to host their vulnbox in the cloud: You don't need to download or prepare the encrypted vulnbox.
Dear saarCTF participants,
with less than 2 days to go, we release VPN configurations and VM images on our website. Teams can now setup router VM and testbox VM. Please contact us per mail or IRC if things break.
Check vpn.ctf.saarland to see if your setup is functional.
If you want us to host the box for you, you do not need to prepare any VM - just distribute the cloud VPN configuration with your mates.
$> sha256sum *
Our third iteration, saarCTF 2022 will take place on Friday, 20.05.2022, 14:00 UTC and last for 8 hours, plus one hour preparation time where network is closed. The competition is open to everybody.
We invite you to a classical attack-defense competition. This year, we offer you to host your vulnbox VM in the cloud for you, making things much easier to set up! Of course we will still provide Virtualbox images as a usual alternative.
The registration is now available, and will stay open until a few hours before the competition starts.