Website for Ghidra Golf
The Office of the Under Secretary of Defense for Research and Engineering (OUSD R&E) inspired by DARPA’s Cyber Grand Challenge is kicking off a series of challenges to tackle some of the hardest shared challenges public, private and academic sectors face via “micro-challenges”. The goals of these “micro-challenges” are to produce a community contributed set of forensic tools or unique data sets that can be transitioned back into one’s day job, academic research, etc…
The first of these events for 2023 is “Ghidra Golf”, and was hosted at ShmooCon, on January 20th through January 23rd. Join our Discord server to get help, make a team, and participate in the competition.
The competitor contributed Ghidra Scripts, are available at our ghidra_script repo.
Ghidra Golf is reverse engineering/forensics Capture The Flag event with focus on Ghidra Script development. The contestant’s goal in addition to solving traditional reverse engineering challenges is to develop Ghidra Scripts to identify, parse, decrypt/decode or otherwise accomplish a specific reverse engineering task. Contestants are provided with a binary to download, reverse engineer and to test their code against, before submitting their Ghidra Script for evaluation.
Selected contestant submitted Ghidra Scripts will be compiled into a centralized Github Repository under the Apache 2.0 License. Attribution will be given to the author via the “@author” javadoc.
Ghidra Golf’s goal is to cover a wide spectrum of reverse engineering challenges to be welcoming to newcomers and experienced CTF players alike. Challenge categories will include vulnerability research, malware analysis and other DFIR focused challenges.
Ghidra Version 10.2.2 is recommended for the competition.
(time subject to change)
A) Go to our Discord server.
A) The official Ghidra documentation here.
A) Please let our judges know as soon as possible via a DM.
A) We’re currently working to open source the CTFd plugin so others can adapt and run their own competition.