In this page you can find some useful downloads.
Checksums (SHA 256) are as follows:
639c3ffa7b66edb1e9b1854c14498c70a1a0efa23503c1c9b9d3621b68d2f11f (cts-micro.vdi.7z)
13c701a3d7804b6d78383787fe709641d6d2f80e2270e871f3e5f716c6fd06d0 (cts-micro.vmdk.7z)
Both VMs are identical and based on Ubuntu 18.04 with Xfce4. Decompress with:
$ 7z x <image>.7z
And you will be asked for the password (provided by the organizers during the contest). Note: this is 7z
not p7zip
!
Just create a “custom” VM and point VMware/VirtualBox to the existing disk. More details:
They have Open VM Tools (e.g., VMWare guest additions) installed, so you may want to use the VMDK with VMWware Player (or Workstation, or Fusion), unless you really want to use VirtualBox: in the latter case, you may need to remove Open VM Tools and install VirtualBox Guest Additions.
These VMs do not come with CTS client tools, or come with a likely outdated version of them. Make sure you grab a copy of the most recent tools. We suggest to use these tools to connect to the steaming server, receive the challenge signals and begin your reverse engineering :-)
During Black Hat USA Arsenal 2021, we released the backend system that you can use to run your own CTS. This includes the scripts for setting up the streaming server and a demo signal you could use for testing and as “baseline” for creating your own challenges. Take a look at the repo here