~$ Participating in the Central-Infosec CTF!
I gave them each a page for legibility's sake. Also, you want to preserve your scroll finger.
I couldn't work on the challenge virtual machine itself for quite some time, because of how my host machine was set up. My host is usually used as a development machine, and as such runs Docker and Hyper-V. But since Hyper-V is janky AF, I run my virtual machines on VMWare Workstation Pro. The particular setup of this CTF however made it so that you need to access the machine from the same Virtual Network, which usually works fine. However, Hyper-V's network adapters were interfering with that process, and it took me a while to get around that hurdle. During that time I relied on the files that my colleagues sent me.
As such, I started with the Python challenges, which were some code analysis and reversal challenges. You can find that write-up here.
Finally, I fixed my VM setup and was able to access the game exploitation challenge, which involved breaking a game to access a flag. You can find that write-up here.
I hope you enjoy these various write-ups as much as I enjoyed the challenges.