PotluckCTF
@PotluckCTF
Followers
248
Following
16
Media
5
Statuses
40
Potluck CTF - A CTF competition where the participants bring the challenges: https://t.co/yVjd8PvsfB
Zürich, Switzerland
Joined November 2023
Here we can see @AnthropicAI's claude (Sonnet 3.7 model) talking to IDA pro to reverse engineer a CTF task I made for @PotluckCTF, it does pretty well! It manages to get a grasp of the entire custom VM instruction set, file format, syscall interface etc.🤓 The MCP server is
19
131
685
The last trophy has been delivered and with that the event is truly and fully over. We will (probably) be back at the end of this year and planning will start on the CTF Discord ( https://t.co/4WyRPRmKFd) this summer so make sure to join there if you want to provide input. Laters!
discord.com
Discord is great for playing games and chilling with friends, or even building a worldwide community. Customize your own space to talk, play, and hang out.
0
1
6
After some shipping and other logistics delays I'm now proud to present the trophies for the 37C3 Potluck CTF. I will be handing these out to the winning teams. Congratulations again to @DragonSectorCTF, @0rganizers and @FlatNetworkOrg! See you next time!
1
2
25
So the challenge i wrote for @PotluckCTF introduced a new heap house (which I shamelessly dubbed "house of water" after my two teams), and a general technique I dubbed "safe link double protect". Both are now available here: https://t.co/IqGo9rQoOu
https://t.co/2YX2C7EsTe
Made a fun little heap challenge for #37C3 @PotluckCTF called Tamagoyaki. It features a fun way to bypass protect_ptr without a leak I discovered while exploiting a bug. It only got one solve during the CTF, so made a writeup:
0
8
32
For those who want to try out the techniques in the write-up themselves you can now follow along with the challenge files published here:
0
0
1
I have now open-sourced all the infrastructure and challenges from the event which you can find at https://t.co/piztRujV2m. I want to again give a huge shoutout to all the challenge authors which made this #CTF a great experience for everyone involved!
github.com
Infrastructure for the Potluck CTF. Contribute to ZetaTwo/potluckctf development by creating an account on GitHub.
0
18
69
In the write-up they show how to utilize Binary Ninja's extensibility to implement the custom ISA employed by the challenge and reduce the complexity of the reversing process significantly. Great job and congratulations!
1
0
2
Apart from prizes for the top three teams we also had a write-up competition for the best write-up using @vector35's Binary Ninja. I'm pleased to announce the winner: @masthoon from @Synacktiv with their fantastic write-up of the challenge "Pot of Gold":
synacktiv.com
Leveraging Binary Ninja IL to Reverse a Custom ISA: Cracking the “Pot
3
15
68
Our ninja @masthoon solved a tough challenge during @PotluckCTF with an ingenious approach: he built a decompiler for a custom ISA by lifting instructions to Binary Ninja IL. Read the "Pot of Gold" write-up (kudos to @bl4sty for creating the challenge):
synacktiv.com
Leveraging Binary Ninja IL to Reverse a Custom ISA: Cracking the “Pot
1
53
177
I contributed a task to this year's @PotluckCTF that contains an emulator for a custom ISA. one of the players actually implemented a decompiler for it by lifting to binja's IL. mind you: this is a 24h long CTF! very neat to see current tooling makes things like this feasible!
5
17
158
The scoreboard and challenge info have now been archived at https://t.co/xWriolWc7T. Don't forget that we also have a write-up competition running until Jan 5th. See the rules at https://t.co/rAIxl7JkKk Challenges will be open-sources in the next few days. Stay tuned!
0
2
11
For @PotluckCTF this year, I create a Linux kernel-themed pwnable challenge called auxv: https://t.co/wqI2g8VuWG. The CTF infrastructure is already down, but the challenge is very easy to run locally, so give it a try if you like exploring obscure corners of the Linux kernel! :)
0
4
22
Good Game! →→→ #37c3 Potluck CTF TOP 1 🥇💪 Kudos to @ZetaTwo for making the CTF happen! https://t.co/T5OqJKSNoA
3
10
89
The CTF was really cool, thanks @PotluckCTF and @ZetaTwo 🔥. I've just published a writeup on my blog for those interested: https://t.co/yEMb0mjI1b
rayanle.cat
Hungry Helmsman is a challenge I had the opportunity to solve during the CTF 2023 Potluck, which took place during the 37th Chaos Communication Congress. It's a Kubernetes challenge in which we're...
That's a wrap! Thanks for everyone who participated in the community #CTF feast of the year! Thanks to all the authors and well played to all participants. Congratulations to @DragonSectorCTF, @0rganizers and @FlatNetworkOrg for their great performances! See you next time!
0
6
18
Made a fun little heap challenge for #37C3 @PotluckCTF called Tamagoyaki. It features a fun way to bypass protect_ptr without a leak I discovered while exploiting a bug. It only got one solve during the CTF, so made a writeup:
0
9
43
Huge love to @ZetaTwo for organizing the @PotluckCTF at #37c7, it was a fantastic experience and we really enjoyed playing. 💚
0
3
18
That's a wrap! Thanks for everyone who participated in the community #CTF feast of the year! Thanks to all the authors and well played to all participants. Congratulations to @DragonSectorCTF, @0rganizers and @FlatNetworkOrg for their great performances! See you next time!
0
6
44
Less than an hour until the event starts and with almost 500(!) teams registered it will be one hell of a #CTF party! Register and solve the challenges at https://t.co/HyfeNZGOKZ!
0
2
6
I took the opportunity to learn Prometheus and Grafana for the event so can we all agree to keep my graphs nice and smooth for the duration of the #CTF event? We have about a day left until the feast starts, register now at https://t.co/HyfeNZGOKZ!
0
2
15