Sat, 24 June 2017, 04:00 UTC — Sun, 25 June 2017, 04:00 UTC 

On-line

Trend Micro CTF - Raimund Genes Cup event.

Format: Jeopardy Jeopardy

Official URL: https://www.trendmicro.com/tmctf

This event's weight is subject of public voting!

Future weight: 16.92 

Rating weight: 20.90 

Event organizers 


Test your knowledge in targeted attacks, Internet of Things (IoT), Industrial Control Systems (ICS), and other cybersecurity issues.


In our mission to make the world safe for exchanging digital information, we are launching CTF 2017 Raimund Genes Cup. It’s a cybersecurity competition that combines online qualifier and on-site finals. Top ten teams from the qualifier will enter the finals, hosted in Tokyo in November 2017.

Program: Jeopardy Style
Dates: June 24 - 25 2017
Duration: 24 hours
Start Time: 13:00 (JST) June 24, 2017
End Time: 13:00 (JST) June 25, 2017
Language: English
Venue: Online (requires internet connection)
Requirements: Aged over 20

Prizes

Top ten teams from online qualifier will be eligible to join the final to be held in Tokyo on November 11-12 2017.

The top three teams from the final will claim the following prizes:


FIRST PLACE:
- JPY1,000,000 (approximately USD9,000) for the winning team
- ZDI Reward Points 15,000 points per player (equivalent of ZDI Bronze) for each member of the winning team, including 10% automatic monetary bonus on all vulnerability submissions over 2017, 10% ZDI Reward points multiplier on all vulnerability submissions over 2017, and one-time bonus of $2,000
- Automatic qualification for HITCON CTF 2017 Final to be hosted in Taipei in December 2017


SECOND PLACE:
- JPY300,000 (Approximately USD2,700)


THIRD PLACE:
- JPY200,000 (Approximately USD1,800)


EXPENSE COVERED BY TREND MICRO FOR TOP TEN TEAMS FROM ONLINE QUALIFIER
- Three night accommodation for the duration of the event (accommodation arranged by Trend Micro)
- Travel expense for a maximum of JPY200,000 (Approximately USD1,800) per team (conditions apply)

Scoreboard

294 teams total

PlaceTeamCTF pointsRating points
1 CyKOR 4713.00041.800
2 217 4604.00030.867
3 PwnThyBytes 4010.00024.749
4 LC↯BC 3900.00022.520
5 CodiSec 3804.00021.049
6 BrentKawaii 3500.00019.004
7 binja 3500.00018.507
8 magnum 3400.00017.690
9 Reverselab 3305.00016.978
10 TokyoWesterns 3303.00016.737
11 Dragon Sector 3300.00016.534
12 koreanbadass 3003.00015.059
13 p4 2700.00013.581
14 SUSlo.PAS 2600.00013.023
15 Batman's Kitchen 2600.00012.923
16 TheDefaced 2500.00012.393
17 AsssassiNOPs 2400.00011.872
18 N 2400.00011.804
19 phddaa 2400.00011.743
20 InfoSect 2300.00011.244
21 fi 2300.00011.195
22 Balsn 2200.00010.706
23 glua.team 2100.00010.221
24 dcua 2100.00010.183
25 KLHT 2100.00010.149
26 RPISEC 2006.0009.700
27 9022 1900.0009.200
28 Digital Intercept 1900.0009.172
29 superflip 1900.0009.146
30 noraneco 1702.0008.244
31 int0x80 1700.0008.213
32 greunion 1600.0007.748
33 HeyBroHelpHow2RemoveTencentPCMgr 1600.0007.729
34 [TechnoPandas] 1500.0007.267
35 b0tch_sec 1401.0006.810
36 74kbl47 1400.0006.789
37 AIR3 1300.0006.330
38 choc 1200.0005.871
39 Antichat 1200.0005.857
40 fstenv 1200.0005.844
41 OpenToAll 1100.0005.388
42 DustDevils 1100.0005.376
43 ShellWarp 1003.0004.934
44 NaruseJun 1000.0004.910
45 Nu1L 1000.0004.899
46 FlappyPig 1000.0004.889
47 MV9rwGOf08 1000.0004.879
48 Pwnium 1000.0004.870
49 DokuDempa 900.0004.418
50 MEX_SCITUM_H4KC3R$_TH1$ 900.0004.409
51 mexhack3rt3amb4ck 900.0004.401
52 MEX_SCITUM_5 900.0004.393
53 Harekaze 900.0004.385
54 vanhelsing 900.0004.378
55 CAT-Security 800.0003.928
56 EgFr33ks 800.0003.921
57 crayon 800.0003.914
58 Just Hit the Core 800.0003.908
59 securisecctf 800.0003.902
60 Ethical Hackers Club 800.0003.896
61 vir00s 800.0003.890
62 MEX_SCITUM_DeadCode 800.0003.885
63 Gita 800.0003.879
64 Plaid Parliament of Pwning 701.0003.435
65 ninja 700.0003.426
66 GYG in Paris 700.0003.421
67 xSTF 700.0003.416
68 The Northern Coalition 700.0003.412
69 XTM 700.0003.407
70 saarsec 700.0003.403
71 MEX_SCITUM_SCRIPT_MONKEYS 700.0003.399
72 h2x 700.0003.394
73 MEX_SCITUM_2 700.0003.390
74 ReallyNonamesFor 600.0002.943
75 eee 600.0002.939
76 reznick 600.0002.936
77 kitakita 600.0002.932
78 bibi 600.0002.929
79 pseud0 600.0002.925
80 4Given 600.0002.922
81 lowkey 600.0002.919
82 Cyber-1 600.0002.916
83 Onward 600.0002.913
84 p3r0z 600.0002.910
85 umbum 600.0002.907
86 Ox002147 600.0002.904
87 0Shi0hShi 600.0002.901
88 yharima 500.0002.455
89 Snatch The Root 500.0002.452
90 spritzers 500.0002.449
91 ByteBandits 500.0002.447
92 IPFactory 500.0002.444
93 m3m0ry 500.0002.442
94 GuidedHacking.com 500.0002.440
95 Sector 70 500.0002.437
96 badfirmware 500.0002.435
97 secse 500.0002.433
98 Fourchette Bombe 500.0002.431
99 TeamNoName 500.0002.428
100 Ten*48 500.0002.426
101 nicklegr 400.0001.981
102 Harambae 400.0001.979
103 VoidHack 400.0001.977
104 VXRL 400.0001.975
105 天枢 400.0001.973
106 SSR_CTF_BU 400.0001.971
107 homegowanti 400.0001.969
108 BlackBird 400.0001.967
109 GUECHAS 400.0001.966
110 2ofPastor 400.0001.964
111 Kap0K 400.0001.962
112 TSARKA Kazakhstan 400.0001.960
113 Don'tWannaCry 400.0001.959
114 kaktheplanet 400.0001.957
115 YoungPwnawans 400.0001.956
116 hxp 400.0001.954
117 Team JM 400.0001.952
118 Epic Leet Team 400.0001.951
119 KatsuDon 400.0001.949
120 FiveTree 400.0001.948
121 0x4556368625 400.0001.947
122 chuck14 400.0001.945
123 Samsung R&D PL 400.0001.944
124 qwertyyy 400.0001.942
125 tohoku-azrof 400.0001.941
126 forx 300.0001.496
127 Justlearnm0re 300.0001.495
128 m1z0r3 300.0001.494
129 KerKerYuan 300.0001.492
130 YOKARO-MON 300.0001.491
131 WeDontPlayCTF 300.0001.490
132 GoSSIP_NEO 300.0001.489
133 shpx 300.0001.488
134 b1n4ry4rms 300.0001.486
135 ASIS 300.0001.485
136 flagish 300.0001.484
137 w0pr 300.0001.483
138 Ping-Mic 300.0001.482
139 STT 300.0001.481
140 team_bp 300.0001.480
141 antslab 300.0001.479
142 Tuchinoko 300.0001.478
143 SCILabs 300.0001.477
144 p@nd4 300.0001.476
145 ne6ru2 300.0001.475
146 Amin 300.0001.474
147 TeamAwesome 300.0001.473
148 TeamCC 300.0001.472
149 8710*IQ 300.0001.471
150 Honeypot 300.0001.470
151 Black Technology Royal 300.0001.469
152 Ganbare Tigers Jr. 300.0001.468
153 Pulgosos 200.0001.024
154 FireShell­ 200.0001.023
155 Netcat.us 200.0001.022
156 __math 200.0001.021
157 Micro gains 200.0001.020
158 ids-team 200.0001.019
159 Koibasta 200.0001.018
160 xiaojunjie 200.0001.018
161 3xfil- 200.0001.017
162 GrinningChicken 200.0001.016
163 Oldm8 200.0001.015
164 tomot 200.0001.014
165 lost+found 200.0001.014
166 InfoSecIITR 200.0001.013
167 Come to Try Fortune 200.0001.012
168 DDOS Attacks 200.0001.011
169 teamIKINUKI 200.0001.011
170 c@fi.sh 200.0001.010
171 flamezzz 200.0001.009
172 SSJ 200.0001.008
173 bambambam 200.0001.008
174 0x5452 200.0001.007
175 wabisabi 200.0001.006
176 Green white rhinoceros 200.0001.006
177 teamAZ 200.0001.005
178 Itemize 200.0001.004
179 Wookies 200.0001.004
180 0xC4rp4T34m 200.0001.003
181 /dev/expose/ 200.0001.002
182 C521C521 200.0001.002
183 BlueManGroup 200.0001.001
184 Jaleito Guapo 200.0001.000
185 squareroots 200.0001.000
186 syn0nym 200.0000.999
187 YubitSec 200.0000.999
188 TipTil 200.0000.998
189 needmoresleep 200.0000.997
190 DOUBLE STANDARD 200.0000.997
191 kagaya 200.0000.996
192 OP_ Coriander 200.0000.996
193 GGG 200.0000.995
194 CTF Hobby Group 200.0000.995
195 DZDevs 200.0000.994
196 TeamDragon 200.0000.994
197 Neko 200.0000.993
198 Asuuu 200.0000.992
199 bitt0 200.0000.992
200 $undayParan0ids 200.0000.991
201 indo8 200.0000.991
202 StrongWind 101.0000.551
203 PiggyBird 100.0000.546
204 eyes emoji 100.0000.546
205 Shellphish 100.0000.545
206 Eagle Jump 100.0000.545
207 peidu 100.0000.544
208 PentaKill 100.0000.544
209 p03p0wn 100.0000.543
210 servosinside 100.0000.543
211 ID-CSI 100.0000.543
212 Army of One 100.0000.542
213 meow 100.0000.542
214 SodaSockAttack 100.0000.541
215 msr_ctf 100.0000.541
216 dave 100.0000.540
217 WeAreScientists 100.0000.540
218 400-pound Hackers 100.0000.539
219 ARCCM-7102 100.0000.539
220 CoolGuysReversingClub 100.0000.538
221 PentestNepal 100.0000.538
222 SU Red Team 100.0000.538
223 Lefes's team 100.0000.537
224 Excalipoor+ 100.0000.537
225 Cracksec 100.0000.536
226 /mnt/oops 100.0000.536
227 invalid 100.0000.536
228 tomerun 100.0000.535
229 Fuck_word_king 100.0000.535
230 LHC_[LondrinaHackerClub] 100.0000.534
231 team5@! 100.0000.534
232 CSI 100.0000.534
233 Route9 100.0000.533
234 BambooFox 100.0000.533
235 JBZ 100.0000.532
236 Null++ 100.0000.532
237 bone-head-2017 100.0000.532
238 pinksheep 100.0000.531
239 pwned 100.0000.531
240 TeamCTCT-Chubu 100.0000.531
241 banjjak2 100.0000.530
242 bolgia4 100.0000.530
243 f1ay 100.0000.529
244 xint 100.0000.529
245 unkn0wn0 100.0000.529
246 PwnHub 100.0000.528
247 Team D 100.0000.528
248 akat0nb0 100.0000.528
249 FR33$1@ 100.0000.527
250 SaBerTooths 100.0000.527
251 d4rkc0de 100.0000.527
252 MeePwn 100.0000.526
253 ANovice 100.0000.526
254 wasamusume 100.0000.526
255 Camelot 100.0000.525
256 nnit 100.0000.525
257 misters_meeseek 100.0000.525
258 udon 100.0000.524
259 FSH 100.0000.524
260 C0r3_unit 100.0000.524
261 BabyPhD 100.0000.524
262 unknow 100.0000.523
263 bigbear 100.0000.523
264 frambu 100.0000.523
265 r00t3r 100.0000.522
266 dos 100.0000.522
267 PUT 100.0000.522
268 super_harmless_busters 100.0000.521
269 NinjaParty 100.0000.521
270 ISL 100.0000.521
271 DevSec 100.0000.521
272 rist 100.0000.520
273 orwell 100.0000.520
274 nanimodekinai 100.0000.520
275 Alanlei Industry 100.0000.519
276 dfnd 100.0000.519
277 STeam 100.0000.519
278 rnd!217 100.0000.519
279 \_'-'_/ HTTF 100.0000.518
280 RocketSliding 100.0000.518
281 SocietyOfEntropy 100.0000.518
282 randomteam 100.0000.518
283 5 EXploiters 100.0000.517
284 Noneofus 100.0000.517
285 Kaylar 100.0000.517
286 Sudo_root 100.0000.517
287 LostGeneration 100.0000.516
288 nw 100.0000.516
289 T0T3M_M4G1 100.0000.516
290 citsy 100.0000.516
291 r00t 100.0000.515
292 Team Viping 100.0000.515
293 teriyaki 100.0000.515
294 DC423 100.0000.257
ninopreppy – June 24, 2017, 1:06 a.m.

Team Africa legion particip


dakine – June 24, 2017, 5:45 a.m.

I can't even decrypt the challenge files, for every single one I get "bad decrypt"


sivaramaaa – June 24, 2017, 7:21 a.m.

unable to decrypt any of the challenge files getting bad decrypt error !!!


Eterna1 – June 24, 2017, 7:30 a.m.

me too, all tasks don't work


ninopreppy – June 24, 2017, 8:46 a.m.

me too all dont work


n0n3m4 – June 24, 2017, 8:55 p.m.

This stuff makes me want a "mark abusive" button, so I won't accidentally participate in this next year.


KALRONG – June 24, 2017, 9:27 p.m.

Hope this helps, if you get the bad decrypt error just add -md md5 at the end of the command, this is due to the change in openssl 1.0 which uses md5 to 1.1 which uses sha256.


Redford – June 30, 2017, 12:43 p.m.

I didn't like this CTF, it was rather a poor quality one.

Pluses:
+ They partially sponsor flights for the finals
+ I liked Windows challenges, there are not many CTFs with similar ones.

Minuses:
- All categories contained identical kind of challenges, regardless of the category name.
- Many recon challenges.
- No IRC, the only way to contact them was via mail.
- Short scoreboard session timeout, which was really annoying.

And finally, the worst thing:
- re100 had a typo in the flag: it said that the flag is TMCTF{biscuit3_ biscuit5} (notice the space and 3&5 order), but the correct flag was TMCTF{biscuit5_biscuit3}. I informed organizers about that and received in response: "The challenge is working, with several teams solving it no problems. If you could continue working on it, then that would be great." (sic!). Other teams solved it the same way we did - guessing what typo they made in the flag. They didn't respond to my next mail.

Our other team members also tried to contact them regarding bugs in challenges and received only generic responses like "Try harder".


dr@g – July 1, 2017, 11:48 a.m.

i have the same problem like Redford the flag was TMCTF{biscuit5_biscuit3} and i find TMCTF{biscuit3_ biscuit5}