print "so long frens\n"; $emfcamp = (@timb_machine, "Jag", @emfctf); foreach $item ($emfcamp) { rename($item, $ENV{"HOME"} . "/" . $item); } # return home
print "so long frens\n"; $emfcamp = (@timb_machine, "Jag", @emfctf); foreach $item ($emfcamp) { rename($item, $ENV{"HOME"} . "/" . $item); } # return home
EMF closing ceremony seems as good a time as any to confirm that @GraceHoppersPosse official won @emf's CTF. Congratulations to y'all. A big well done to GHP for defending their win from 2022!
Since it's the last day, we've unlocked all the challenges that were available to one or more teams.
That means that if you'd not managed to find a 2024 t-shirt, you can still play Internet of Shit etc.
For those of you playing the Internet of Shit track. We may be inclined to award additional points, if you manage to exploit any device in an interesting way. Points awarded for bugs will be given based on their CVSS value e.g. a 10.0 will score 10 additional points.
Grace Hopper are on the roll. 3rd in 2018, first in 2022 and into first place again.
It bears repeating, but a t-shirt-shot unlocks the more traditional CTF challenges:
https://www.emfctf.org/challenges#An%20EMF%20Camp%202024%20t-shirt-2
You can find more information here:
https://www.emfctf.org/challenges#y0day!-60
Looks like there's a magic UID that bypasses some security checks on their access control system...
NEWS: There's rumours of a vulnerability in the Polybius Biotech card readers. Stay tuned for more.
Some submissions landed via Xitter:
* https://x.com/adnathanail/status/1796559740639805579
* https://x.com/adnathanail/status/1796559983334809926
* https://x.com/adnathanail/status/1796559883090968971
* https://x.com/adnathanail/status/1796559617708921314
* https://x.com/adnathanail/status/1796559267715272939