DGHACK2023

DGHACK2023

DG’hAck 2023 is a CTF event held by the DGA (branch of the French military). There were 24 challenges this year but I was only able to fully solve 11 of them. Yet I was able to reach global rank 6 and first on the student’s leaderboard under the name Curiosité.

Scoreboard

Global scoreboardStudent scoreboard
Global scoreboardStudent scoreboard

Challenges

The points given by challenges were static and often not proportional to the difficulty.

SolvedNamePointsTagsDescription
Feed This Dragon50DevInteract with a game through an API
CryptoNeat50Web CryptoAES CTR Nonce reuse
TicToc100DevSide channel attack on the time to verify admin’s password
Wrongsomewhere50ReverseRansomware that uses a machine specific Windows registry key to derive an encryption key
Infinite Money Glitch200DevRead codes on videos with OCR
Plugin again100WebBypass Content Security Policy (CSP) thanks to a permissive rule on a CDN that allows github repos
Remove Before Flight100Web
Awesome Doc Converter150Web
AEgisSecureForge200CryptoRead PrivateBin data in network traffic and ECB encryption oracle
PoliceForensic150Forensics
KeepQuiet100Reverse
Damn Deprecation300Forensics ReverseCompromised linux kernel injected through dependency injection
L’an 1, et puis l’an 2150ForensicsDecipher EmpireC2 communications with a Windows machine KeyStore private key found in a memory dump
Catch Him If You Can100Detection
My Virtual Bookstore200Exploitation
A Maze In50SteganographyMaze solving on a sticker
Time To Fight Back150Exploitation
Save the earth or loose yourself?!100Exploitation OSINT
Randigma (ESN’HACK)150Crypto
JarJarBank300WebVulnerable SOAP service
Android Mirrors150Dev ReverseDynamic java method calls that simulate the path of a laser in mirrors. The key of the crackme was the mirrors orientations
Pixle200Reverse
A_Maritime_Journey150ForensicsQuestions on the NMEA 0183 protocol
TicTacPwn300ExploitFrom file read and arbitrary memory writes with all protections to RCE by writing a ROP chain on the stack