[screenshot made at 05/05/2019]

ReverseCup 2019

April 23-26, 2019, St Petersburg University

More than 500 students, undergraduates and graduate students from more than 20 universities and academies of Russia applied for participation in competitions. More than 100 have been registered, and the top 25 in the preliminary stage took part in a full-time tour.

On the 3rd day of the competition program, participants were offered 4 tasks (BMP, Bot, Cry and rooms), each of which had 5 levels of difficulty. As the level increased, both the complexity of obfuscation and the complexity of the algorithm being protected increased. When each level was taken, a new instance of the task was generated. Only one level could be solved.

A total of 3 BMP-1 solutions, 1 BMP-4 solution, 8 Cry-1 solutions, 2 Cry-2 solutions, and 3 rooms-1 solutions were submitted. Nobody solved the Bot problem, although almost all the participants tried to communicate with the bot.


[screenshot made at 11/28/2018]

II CTF Cup Russia 2018

November 30 – December 1, 2018, Moscow, Skolkovo

Favourite teams from different CTF-contests take part in contest, also teams who developed some contests participated - totally 21 teams.

One task with 3 difficulty levels was suggested. With increasing the difficulty level, obfuscation complexity and unpacking algorithm complexity increases. Each participant obtains unique obfuscated server elf-file. In elf-file shellcode is unpacked and run. Participant must reverse the algorithm of packing. obtain the shellcode and apply it.

As the result 7 solutions of first difficulty level and 3 solutions of second difficulty level was passed. Third level was unsolved.


[screenshot made at 02/05/2018]

CTF Cup Russia 2017

December 8-9, 2017, Moscow, Skolkovo

Favourite teams from different CTF-contests take part in contest, also teams who developed some contests participated - totally 20 teams.

1 task was proposed with obfuscation levels 1 (without obfuscation), 2, 3, 6, 20. To solve a task participant must find argument string which leads to program prints Ok. Finite state automata was coded in task (new per download) and argument string must transfer it to accepting state. The task was facilitated by the fact that a string of only 10 characters was required.

At the result only 2 teams solved this tasks. One of them solved task using bruteforce of input strings to reconstruct structure of automaton using very powerful computer. As there is almost no slowdown of obfuscated programs, they solved 5 levels. Another team solved this task using reverse-engineering and 4 levels was solved.

Music and words are folk,
executes admin@reverseboom.club
En