MetaCTF 2018 was held at the University of Virginia’s Darden School of Business this past weekend. Although a majority of the challenges were standard fare for CTFs, the competition also included a sizable portion of “physical” challenges like lock-picking, as well as legal and ethical case studies. With an emphasis on introducing and teaching cybersecurity, MetaCTF erred on the easier side, but the day’s schedule definitely put a crunch on finding all 48 of the competition’s flags.
Out of 56 teams, we placed 3rd with 11,258 points as team “Drink More Caffe”:
- Lucas Mun, Virginia Tech
- Christopher Truong, University of Virginia
- Brandon Walker, Virginia Tech
This write-up will focus more on the traditional CTF challenges and the flags I spent the most time with, including the crypto, exploitation, reversing, and forensics sections. Most of the challenges were solved with a couple of lines of Bash or Python, and the executable challenges with Binary Ninja. Although the binaries are all 64-bit ELFs, all challenges can be solved on a Windows box without any issues.