Sat, 24 June 2017, 04:00 UTC — Sun, 25 June 2017, 04:00 UTC 

On-line

Trend Micro CTF - Raimund Genes Cup event.

Format: Jeopardy Jeopardy

Official URL: https://www.trendmicro.com/tmctf

This event's weight is subject of public voting!

Future weight: 16.92 

Rating weight: 21.00 

Event organizers 


Test your knowledge in targeted attacks, Internet of Things (IoT), Industrial Control Systems (ICS), and other cybersecurity issues.


In our mission to make the world safe for exchanging digital information, we are launching CTF 2017 Raimund Genes Cup. It’s a cybersecurity competition that combines online qualifier and on-site finals. Top ten teams from the qualifier will enter the finals, hosted in Tokyo in November 2017.

Program: Jeopardy Style
Dates: June 24 - 25 2017
Duration: 24 hours
Start Time: 13:00 (JST) June 24, 2017
End Time: 13:00 (JST) June 25, 2017
Language: English
Venue: Online (requires internet connection)
Requirements: Aged over 20

Prizes

Top ten teams from online qualifier will be eligible to join the final to be held in Tokyo on November 11-12 2017.

The top three teams from the final will claim the following prizes:


FIRST PLACE:
- JPY1,000,000 (approximately USD9,000) for the winning team
- ZDI Reward Points 15,000 points per player (equivalent of ZDI Bronze) for each member of the winning team, including 10% automatic monetary bonus on all vulnerability submissions over 2017, 10% ZDI Reward points multiplier on all vulnerability submissions over 2017, and one-time bonus of $2,000
- Automatic qualification for HITCON CTF 2017 Final to be hosted in Taipei in December 2017


SECOND PLACE:
- JPY300,000 (Approximately USD2,700)


THIRD PLACE:
- JPY200,000 (Approximately USD1,800)


EXPENSE COVERED BY TREND MICRO FOR TOP TEN TEAMS FROM ONLINE QUALIFIER
- Three night accommodation for the duration of the event (accommodation arranged by Trend Micro)
- Travel expense for a maximum of JPY200,000 (Approximately USD1,800) per team (conditions apply)

Scoreboard

294 teams total

PlaceTeamCTF pointsRating points
1 CyKOR 4713.00042.000
2 217 4604.00031.014
3 PwnThyBytes 4010.00024.868
4 LC↯BC 3900.00022.627
5 CodiSec 3804.00021.150
6 BrentKawaii 3500.00019.095
7 binja 3500.00018.595
8 magnum 3400.00017.775
9 Reverselab 3305.00017.060
10 TokyoWesterns 3303.00016.817
11 Dragon Sector 3300.00016.613
12 koreanbadass 3003.00015.131
13 p4 2700.00013.646
14 SUSlo.PAS 2600.00013.085
15 Batman's Kitchen 2600.00012.985
16 TheDefaced 2500.00012.452
17 AsssassiNOPs 2400.00011.929
18 N 2400.00011.860
19 phddaa 2400.00011.799
20 InfoSect 2300.00011.298
21 fi 2300.00011.248
22 Balsn 2200.00010.757
23 glua.team 2100.00010.270
24 dcua 2100.00010.232
25 KLHT 2100.00010.197
26 RPISEC 2006.0009.746
27 9022 1900.0009.244
28 Digital Intercept 1900.0009.216
29 superflip 1900.0009.190
30 noraneco 1702.0008.284
31 int0x80 1700.0008.252
32 greunion 1600.0007.785
33 HeyBroHelpHow2RemoveTencentPCMgr 1600.0007.766
34 [TechnoPandas] 1500.0007.301
35 b0tch_sec 1401.0006.843
36 74kbl47 1400.0006.821
37 AIR3 1300.0006.360
38 choc 1200.0005.900
39 Antichat 1200.0005.885
40 fstenv 1200.0005.872
41 OpenToAll 1100.0005.414
42 DustDevils 1100.0005.401
43 ShellWarp 1003.0004.958
44 NaruseJun 1000.0004.933
45 Nu1L 1000.0004.922
46 FlappyPig 1000.0004.912
47 MV9rwGOf08 1000.0004.903
48 Pwnium 1000.0004.893
49 DokuDempa 900.0004.439
50 MEX_SCITUM_H4KC3R$_TH1$ 900.0004.430
51 mexhack3rt3amb4ck 900.0004.422
52 MEX_SCITUM_5 900.0004.414
53 Harekaze 900.0004.406
54 vanhelsing 900.0004.399
55 CAT-Security 800.0003.946
56 EgFr33ks 800.0003.940
57 crayon 800.0003.933
58 Just Hit the Core 800.0003.927
59 securisecctf 800.0003.921
60 Ethical Hackers Club 800.0003.915
61 vir00s 800.0003.909
62 MEX_SCITUM_DeadCode 800.0003.903
63 Gita 800.0003.898
64 Plaid Parliament of Pwning 701.0003.452
65 ninja 700.0003.442
66 GYG in Paris 700.0003.437
67 xSTF 700.0003.432
68 The Northern Coalition 700.0003.428
69 XTM 700.0003.423
70 saarsec 700.0003.419
71 MEX_SCITUM_SCRIPT_MONKEYS 700.0003.415
72 HackXore 700.0003.411
73 MEX_SCITUM_2 700.0003.407
74 ReallyNonamesFor 600.0002.957
75 eee 600.0002.953
76 reznick 600.0002.950
77 kitakita 600.0002.946
78 bibi 600.0002.943
79 pseud0 600.0002.939
80 4Given 600.0002.936
81 lowkey 600.0002.933
82 Cyber-1 600.0002.930
83 Onward 600.0002.926
84 p3r0z 600.0002.923
85 umbum 600.0002.921
86 Ox002147 600.0002.918
87 0Shi0hShi 600.0002.915
88 yharima 500.0002.467
89 Snatch The Root 500.0002.464
90 spritzers 500.0002.461
91 ByteBandits 500.0002.459
92 IPFactory 500.0002.456
93 m3m0ry 500.0002.454
94 GuidedHacking.com 500.0002.451
95 Sector 70 500.0002.449
96 badfirmware 500.0002.447
97 secse 500.0002.444
98 Fourchette Bombe 500.0002.442
99 TeamNoName 500.0002.440
100 Ten*48 500.0002.438
101 nicklegr 400.0001.990
102 hackstreetboys 400.0001.988
103 VoidHack 400.0001.986
104 VXRL 400.0001.984
105 天枢 400.0001.982
106 SSR_CTF_BU 400.0001.980
107 homegowanti 400.0001.979
108 BlackBird 400.0001.977
109 GUECHAS 400.0001.975
110 2ofPastor 400.0001.973
111 Kap0K 400.0001.971
112 TSARKA Kazakhstan 400.0001.970
113 Don'tWannaCry 400.0001.968
114 kaktheplanet 400.0001.967
115 YoungPwnawans 400.0001.965
116 hxp 400.0001.963
117 Team JM 400.0001.962
118 Epic Leet Team 400.0001.960
119 KatsuDon 400.0001.959
120 FiveTree 400.0001.957
121 0x4556368625 400.0001.956
122 chuck14 400.0001.954
123 Samsung R&D PL 400.0001.953
124 qwertyyy 400.0001.952
125 tohoku-azrof 400.0001.950
126 forx 300.0001.503
127 Justlearnm0re 300.0001.502
128 m1z0r3 300.0001.501
129 KerKerYuan 300.0001.500
130 YOKARO-MON 300.0001.498
131 WeDontPlayCTF 300.0001.497
132 GoSSIP_NEO 300.0001.496
133 shpx 300.0001.495
134 b1n4ry4rms 300.0001.493
135 ASIS 300.0001.492
136 flagish 300.0001.491
137 w0pr 300.0001.490
138 Ping-Mic 300.0001.489
139 STT 300.0001.488
140 team_bp 300.0001.487
141 antslab 300.0001.486
142 Tuchinoko 300.0001.485
143 SCILabs 300.0001.484
144 p@nd4 300.0001.483
145 ne6ru2 300.0001.482
146 Amin 300.0001.481
147 TeamAwesome 300.0001.480
148 TeamCC 300.0001.479
149 PwnaSonic 300.0001.478
150 Honeypot 300.0001.477
151 Black Technology Royal 300.0001.476
152 Ganbare Tigers Jr. 300.0001.475
153 Pulgosos 200.0001.028
154 FireShell 200.0001.028
155 Netcat.us 200.0001.027
156 __math 200.0001.026
157 Micro gains 200.0001.025
158 ids-team 200.0001.024
159 Koibasta 200.0001.023
160 xiaojunjie 200.0001.022
161 3xfil- 200.0001.022
162 GrinningChicken 200.0001.021
163 Oldm8 200.0001.020
164 tomot 200.0001.019
165 lost+found 200.0001.018
166 InfoSecIITR 200.0001.018
167 Come to Try Fortune 200.0001.017
168 DDOS Attacks 200.0001.016
169 teamIKINUKI 200.0001.015
170 just CatTheFish 200.0001.015
171 flamezzz 200.0001.014
172 SSJ 200.0001.013
173 bambambam 200.0001.013
174 0x5452 200.0001.012
175 wabisabi 200.0001.011
176 Green white rhinoceros 200.0001.010
177 TeamAZ 200.0001.010
178 Itemize 200.0001.009
179 Wookies 200.0001.008
180 0xC4rp4T34m 200.0001.008
181 /dev/expose/ 200.0001.007
182 C521C521 200.0001.007
183 BlueManGroup 200.0001.006
184 Jaleito Guapo 200.0001.005
185 squareroots 200.0001.005
186 syn0nym 200.0001.004
187 SULOBAND 200.0001.003
188 TipTil 200.0001.003
189 needmoresleep 200.0001.002
190 DOUBLE STANDARD 200.0001.002
191 kagaya 200.0001.001
192 OP_ Coriander 200.0001.001
193 GGG 200.0001.000
194 CTF Hobby Group 200.0000.999
195 DZDevs 200.0000.999
196 TeamDragon 200.0000.998
197 Neko 200.0000.998
198 Asuuu 200.0000.997
199 bitt0 200.0000.997
200 $undayParan0ids 200.0000.996
201 indo8 200.0000.996
202 StrongWind 101.0000.554
203 PiggyBird 100.0000.549
204 eyes emoji 100.0000.549
205 Shellphish 100.0000.548
206 Eagle Jump 100.0000.548
207 peidu 100.0000.547
208 PentaKill 100.0000.547
209 p03p0wn 100.0000.546
210 servosinside 100.0000.546
211 ID-CSI 100.0000.545
212 Army of One 100.0000.545
213 meow 100.0000.544
214 SodaSockAttack 100.0000.544
215 msr_ctf 100.0000.543
216 dave 100.0000.543
217 WeAreScientists 100.0000.542
218 400-pound Hackers 100.0000.542
219 ARCCM-7102 100.0000.541
220 CoolGuysReversingClub 100.0000.541
221 PentestNepal 100.0000.541
222 SU Red Team 100.0000.540
223 Lefes's team 100.0000.540
224 Excalipoor+ 100.0000.539
225 Crack_me 100.0000.539
226 /mnt/oops 100.0000.538
227 invalid 100.0000.538
228 tomerun 100.0000.538
229 Fuck_word_king 100.0000.537
230 LHC_[LondrinaHackerClub] 100.0000.537
231 team5@! 100.0000.536
232 CSI 100.0000.536
233 Route9 100.0000.536
234 BambooFox 100.0000.535
235 JBZ 100.0000.535
236 Null++ 100.0000.535
237 bone-head-2017 100.0000.534
238 pinksheep 100.0000.534
239 pwned 100.0000.533
240 TeamCTCT-Chubu 100.0000.533
241 banjjak2 100.0000.533
242 bolgia4 100.0000.532
243 f1ay 100.0000.532
244 xint 100.0000.532
245 unkn0wn0 100.0000.531
246 PwnHub 100.0000.531
247 Team D 100.0000.531
248 akat0nb0 100.0000.530
249 FR33$1@ 100.0000.530
250 SaBerTooths 100.0000.530
251 d4rkc0de 100.0000.529
252 MeePwn 100.0000.529
253 ANovice 100.0000.529
254 wasamusume 100.0000.528
255 Camelot 100.0000.528
256 nnit 100.0000.528
257 misters_meeseek 100.0000.527
258 udon 100.0000.527
259 FSH 100.0000.527
260 C0r3_unit 100.0000.526
261 BabyPhD 100.0000.526
262 unknow 100.0000.526
263 bigbear 100.0000.525
264 frambu 100.0000.525
265 r00t3r 100.0000.525
266 dos 100.0000.525
267 PUT 100.0000.524
268 super_harmless_busters 100.0000.524
269 NinjaParty 100.0000.524
270 ISL 100.0000.523
271 DevSec 100.0000.523
272 rist 100.0000.523
273 orwell 100.0000.522
274 nanimodekinai 100.0000.522
275 Alanlei Industry 100.0000.522
276 dfnd 100.0000.522
277 STeam 100.0000.521
278 rnd!217 100.0000.521
279 \_'-'_/ HTTF 100.0000.521
280 RocketSliding 100.0000.521
281 SocietyOfEntropy 100.0000.520
282 randomteam 100.0000.520
283 5 EXploiters 100.0000.520
284 Noneofus 100.0000.520
285 Kaylar 100.0000.519
286 Sudo_root 100.0000.519
287 LostGeneration 100.0000.519
288 nw 100.0000.518
289 T0T3M_M4G1 100.0000.518
290 citsy 100.0000.518
291 r00t 100.0000.518
292 Team Viping 100.0000.517
293 teriyaki 100.0000.517
294 DC423 100.0000.259
ninopreppy – June 24, 2017, 1:06 a.m.

Team Africa legion particip


dakine – June 24, 2017, 5:45 a.m.

I can't even decrypt the challenge files, for every single one I get "bad decrypt"


sivaramaaa – June 24, 2017, 7:21 a.m.

unable to decrypt any of the challenge files getting bad decrypt error !!!


Eterna1 – June 24, 2017, 7:30 a.m.

me too, all tasks don't work


ninopreppy – June 24, 2017, 8:46 a.m.

me too all dont work


n0n3m4 – June 24, 2017, 8:55 p.m.

This stuff makes me want a "mark abusive" button, so I won't accidentally participate in this next year.


KALRONG – June 24, 2017, 9:27 p.m.

Hope this helps, if you get the bad decrypt error just add -md md5 at the end of the command, this is due to the change in openssl 1.0 which uses md5 to 1.1 which uses sha256.


Redford – June 30, 2017, 12:43 p.m.

I didn't like this CTF, it was rather a poor quality one.

Pluses:
+ They partially sponsor flights for the finals
+ I liked Windows challenges, there are not many CTFs with similar ones.

Minuses:
- All categories contained identical kind of challenges, regardless of the category name.
- Many recon challenges.
- No IRC, the only way to contact them was via mail.
- Short scoreboard session timeout, which was really annoying.

And finally, the worst thing:
- re100 had a typo in the flag: it said that the flag is TMCTF{biscuit3_ biscuit5} (notice the space and 3&5 order), but the correct flag was TMCTF{biscuit5_biscuit3}. I informed organizers about that and received in response: "The challenge is working, with several teams solving it no problems. If you could continue working on it, then that would be great." (sic!). Other teams solved it the same way we did - guessing what typo they made in the flag. They didn't respond to my next mail.

Our other team members also tried to contact them regarding bugs in challenges and received only generic responses like "Try harder".


dr@g – July 1, 2017, 11:48 a.m.

i have the same problem like Redford the flag was TMCTF{biscuit5_biscuit3} and i find TMCTF{biscuit3_ biscuit5}