An archived dataset of challenges and solutions from the Balsn CTF 2019 cybersecurity competition, useful for penetration testing and red teaming practice.
Archive of Balsn CTF 2019
This repository serves as a comprehensive resource for security professionals and enthusiasts to study and practice exploitation, reverse engineering, cryptography, and web security challenges. It is ideal for penetration testers, red teamers, and bug bounty hunters seeking real-world CTF-style scenarios to sharpen their skills.
This repository is an archive of a past CTF event and does not include installation scripts or software; users should have familiarity with netcat and openssl to interact with challenges. It is best used as a study and practice resource rather than a standalone tool.
nc securecheck.balsnctf.com 54321
Connects to the SecureCheck challenge service for interactive exploitation.
nc pysh1.balsnctf.com 5421
Connects to the pyshv1 challenge service to interact with the Python shell environment.
openssl enc -d -aes-256-cbc -salt -pbkdf2 -in task.tar.gz.enc -out task.tar.gz
Decrypts the encrypted challenge files for pyshv2 and pyshv3 using the flag from the previous level.
nc pysh2.balsnctf.com 5422
Connects to the pyshv2 challenge service for interactive exploitation.
nc pysh3.balsnctf.com 5423
Connects to the pyshv3 challenge service for interactive exploitation.
nc jpcode.balsnctf.com 19091
Connects to the JPcode challenge service focused on shellcode exploitation.