UGA CyberDawgs CTF
Welcome to the UGA CyberDawgs Capture The Flag competition! There are 20 questions, each is worth 1 percent of your total score. If you encounter any technical issues, ask for our help!
NOTE: Your correct answers are being saved and sent to us even if you refresh the page.
Linux
Question 1
What command lists files in a directory?
Question 2
Which command shows the current working directory?
Question 3
What command is used to change file permissions?
Question 4
What is the full command to create a blank file called test.txt
OSINT
Question 5
What does OSINT stand for?
Question 6
What year was Twitter's name changed to X?
Question 7
What is the first name of Mr. Wonderful from Shark Tank?
Question 8
What is the name of this building?
Cryptography
Useful tools:
Question 9
Decode 62 6c 61 63 6b 62 6f 78
Question 10
Decrypt wopbkrm gry ioir
with the key UGA
Question 11
Decode & Decrypt this: LS4tIC0uIC0tLSAtLi0uIC0uLQotLi0gLS4gLS0tIC0uLS4gLS4tIC0uLS4tLQ==
Question 12
Decode this symbol cipher:
Python
Question 13
What variable type is this?
quality = 32.7
Question 14
What is the value of ord('X')
?
Question 15
What will the following python code output?
data = [223.4, 13.7, 9.0, 12.53, 924924.2, 5.5]
amnt = 0
for i in data:
if (i > 12.1):
amnt += 1
print(amnt)
Question 16
We’ve received this encrypted unicode that has been shifted backwards by 3 characters:
112 101 94 109 98 112 101 102 99 113
Password Cracking
Question 17
What tool is most commonly used in password cracking?
Question 18
Crack this password hash using rockyou.txt
:
8afa847f50a716e64932d995c8e7435a
Question 19
Crack this password hash that follows the format of DAWG-##
where #
is a number:
10d5c804bce41fb34c9f8dfdd89b9ff9
Question 20
Crack the password of this PDF file and submit the flag found inside
Hint 1: You can find the PDF file's hash here: https://hashes.com/en/johntheripper/pdf2john
Hint 2: The hashmode (-m) is 10500
Credits
- Author(s): Divesh Gupta (legendile7)