
So, some time earlier this year we made second place at the Boston Key Party CTF. The BKP is one of seven CTF events this year where the winner qualified for DEF CON CTF. The one who came in first had already qualified at that point, which meant we got the spot. The DEF CON CTF is the big CTF event of the year, and one of the bigger events at the (in)famous DEF CON hacking conference in Las Vegas. H*ck yeah road trip to Vegas!
The CTF happened early August, and by the time I finally got to write this blog post, other teams had published great writeups for almost all challenges. So unlike other CTF-related posts, this one’s gonna be a travel report for our casual readers rather than a writeup for the techies. There won’t even be code, I promise!
One of the first impressions of DEF CON was the line of people at the entrance. The evening before the first conference day at around 2am, we were wandering around the hotel and met a flock of people (like, 50) camping in front of the entrance.

Anyways we spent the day before the CTF buying groceries, and the evening doing last minute preparations.

The next day at 9am, the CTF room was opened for the teams. Each of the twenty teams had their own table with the team name for display on a neat banner, one power socket, and one cat5 lan cable. We got our network infrastructure set up without a hitch (“What do you mean, where’s the power supply for the switch?! I thought you had it!

The following two days and a half went by in a blur. We spent our time hacking away at the challenges, doing half-automated scans of pcap files for leaked flags and exploits from other teams, patching our services accordingly or replaying the attacks.


The competition was fierce, to say the least. When the “justify” service was released on the second day, it took PPP only about half an hour to come up with a working exploit (here’s a writeup), which was crazy considering it took us more than an hour and a half to replicate their attack and score some flags with it. There was a pretty animation of the teams’ attacks and captured flags running on a big screen most of the time, here’s a replay from around the time PPP unleashed their justify exploit.

So I should say something about our performance. I think we did alright all things considered. We made mistakes, but also discovered new room for improvement. Firstly, our reverse engineering speed was severely hampered by lack of an ARM decompiler, which we later learned most teams had - one team even bought one during the CTF. What was worse though was that over the course of the entire first day, everyone was so caught up in their hacking haze that none of us realized there was an internal scoreboard where each team could see the status of their services.


In the end we made a solid 8th place, which isn’t disappointing but not beyond our wildest dreams either. One thing is certain, we’ll have to pwn harder next year! There is a lot more I could write but I don’t want to keep rambling for too long. It was an awesome experience. We’d like to thank Volkswagen for their support of the team, we would not have been able to play as easily without them. Spoiler alert, they will be throwing in some goodies for Zeromutarts 2014 as well, so stay tuned for that!