Opened problems:

cnot
450
binary
We lost the passcode again
what was it?
Download
compression
250
crypto
We managed to get the source code for an encryption service running at 54.234.224.216:4433.
Download
Unnnnlucky
20
misc
Where does The Plague hide his money?
ropasaurusrex
200
pwnable
ROP ROP ROP ROP ROP ROP ROP
Download binary
Download libc
54.234.151.114:1025
kavihk
400
binary
YOU RIKE PRAY GAME?
kavihk.tgz
HINT FOR KAVIHK: There is a bruteforce of much less than a billion things.
HINT FOR KAVIHK: You do not need to hand-optimize math, and my solution runs in under 5 min on my laptop.
cone
250
binary
Someone certainly has a sick sense of humor... We believe a prisoner has left an encoded message in this program. Can you get it out for us?
cone
Note: if you solved the version of this problem posted before 04:30 UTC (available here), contact mserrano at freenode for verification of your key.
cyrpto
100
crypto
One of us devised a new cryptosystem! Can you break it?
client.py running at 54.234.77.50:13797 or 54.235.50.140:13797.
giga
250
crypto
"We found a wonderful new service you can use to secure all of your files with, though it is still in beta.
The source is available at giga.py. And the service can be found at 184.73.59.25 on port 4321"
blech
200
crypto
You get arbitrary code execution.... as long as it's code we approve of.
Source available at blech.py
Service running on 54.234.73.81 port 1234
usbdude
350
forensics
I broke a USB cable while making this problem... you better enjoy it.
usbdude.pcap.
HINT: I would suggest static reversing from the entry point, or alternatively there appears to be a relevant string to google.
Hint: If you think r29 stays constant, then look up the ADIW instruction.
cheap
100
misc
What could this mysterious architecture be?
All of these are the same:
50.17.171.79:9998
54.224.183.192:9998
184.73.107.54:9998
54.234.231.14:9998
54.224.176.148:9998
Note:Apparently GNU netcat doesn't support a half-duplex shutdown, so you should use OpenBSD netcat or connect using python or something for cheap.
The flag is not an architecture.
The goal is to get a shell
three_eyed_fish
100
binary
This binary is totally legit we promise three_eyed_fish.
bunyans_revenge
400
pwnable
My friend patched a bug in go: go.patch. Could you get me a shell on this unpatched site? Server, Hint.
dynrpn
250
pwnable
"`dc` runs too slowly for my tastes. dynrpn running at 107.22.129.12:49630
pork
250
pwnable
Totally better than Tor: pork running at 54.235.20.205:33227
secure_reader
150
pwnable
I can't figure out how to read the flag :-( ssh to 54.224.109.162
pyjail
400
misc
Sandboxing python: it's what all the cool kids are doing: 54.234.158.110:9997
Download pyjail.py
Python 2.6.6
default Debian Sqeeze with apt-get install python
Should be same setup as python on the secure_reader machine
cat_rar
150
forensics
"Meow meow mw mw m.
cat.rar
hypercomputer-1
100
binary
For those who didn't play plaidCTF 2012: "supercomputer" was a reversing challenge that computed flags using really silly math (like adding in a loop instead of mulitplication). hypercomputer is easier... if you do it right :P
ssh to 54.224.174.166
hypercomputer-2
150
binary
For those who didn't play plaidCTF 2012: "supercomputer" was a reversing challenge that computed flags using really silly math (like adding in a loop instead of mulitplication). hypercomputer is easier... if you do it right :P
ssh to 54.224.174.166
HINT: You may notice that hypercomputer-2 is different... You should not be pwning or doing privilege escalation to solve it, though.
hypercomputer-3
100
binary
For those who didn't play plaidCTF 2012: "supercomputer" was a reversing challenge that computed flags using really silly math (like adding in a loop instead of mulitplication). hypercomputer is easier... if you do it right :P
ssh to 54.224.174.166
HINT: hypercomputer-3/4 were designed to be solved through a combination of static and dynamic reversing; either alone is not enough!
drmless
250
binary
You should check out our cool stories, bros.
drmless.tgz
charsheet
150
web
My friend is in my D&D campaign - could you get me his character name? He administrates this site.
Or here (faster).
Prove It
150
misc

We've been reading about bitcoins -- 184.73.80.194:9001

Hint: The answer isn't brute forcing.

Source
servr
400
web
"We got a shell on this crazy guy's web server, but he's running some really weird software :-( Help me get higher privileges please? SSH to 184.72.197.171 (see your profile for creds).
This might come in handy.
Hint: Corrupting heap free chunk metadata is shockingly easy in the SLUB allocator.
Hint: Try controlling f_op in struct file or something.
e1000-1
250
pwnable
Pwn this thing :)
Download
IP: 107.22.133.145
HINT: There shouldn't be any (intended) bugs below the application layer
Prime Factorizer
0
misc
Find the Prime Factorizer.
This is an event quest. It does not award you any points.

Once you completed each quest, talk to its NPC to gather clues. These clues are tiny URLs containing secrets. Use python-secret-sharing tool to recover the message, which will reveal the way to get the Prime Factorizer.
You have to collect at least 14 secrets!