Noobctf 0x1 pre-Ctf Writups

Noobctf 0x1 pre-Ctf Writups

Lets start with Misc

Decode it! , 80 Points

Read chall desc thats all

This was first challenge in stegsnow which used passwd for me

ffs WashYourHands and StayInside ,175

So this was a easy challenge but I complicated it for myself ,you just need to see the http requests we see that its requestsing for a file named who from filedropper.com

Just download the file its locked so mighty John will help us with it

unzip and read the parts of flag distributed over images

Bottled Something ,300

This was the only chall where the hint made sense ,we are given a base64 text decode it and put the contents in a new file it turns out to be a zip ,unzip it and we get a lot of sherlock images when I saw exif data I saw in some images that it was edited with ez gif maybe this was the main hint

opening them in browser shows that they are gif I have shown them below maybe you cant see but these are the images needed to be opened with web browser

Now came the part of getting the QR There are 2 ways either you take screenshot at the moment the QR appears , OR being smart like me take the slowmo video of gif then scan the QR with google lens

I do smart work not hardwork :)

Web Steg,300

If I say in Hindi ,Bohot hi wahiyad challenge tha yeh,dimaag ka bhosda kar ke rakh diya

The hint said that we need to checkout the checkout page by that it meant the dform.html

I dont know what struck me I decided to copy the contents in sublime text just to have syntax highlighting when I copied it I saw this

If you notice in right bottom you see that the character count is unusually high so I thought of stegsnow And I got the flag

Moving on to forensics

Shaktiman,50

Just repair the png and run zsteg not going to waste any more time on this

D33p_div3,200

We are given with a jpg ,rather having large size ,running binwalk gives us something interesting

We get a wav file my first step always when I get a jpg,wav run steghide with empty pass it does work Its shown below

An0nym0us G1rl_fri3nd,200

We are given a locked docx file, I find that we can crack the password using john so I do that

I dont have office in kali, so when I opened it in windows I saw that all the content was on single page but the file had 3 pages so I tried select all and saw that it had some invisible text tried it with stegsnow without password but got nothing

skip to when the hints were release I got that its a weak pass so I searched online for top weak pass and got that it was 12345678 and got the flag

Television Transmission,300

This challenge had some serious trolls ,it was not sstv but you should still try running it with robot36 if you wanna get trolled xd

After the hint was released I realised that it was a challenge where you need to write just 2 lines on terminal

Bin,300

NOTE- I dont know how power-ranger guys solved this , extreme respect for them

This had 0 solves,but after talking with the author we get that the tool is stegsuite

we get a png,On using zsteg we get a strange string from it, using it with filebin.net gets us the dragonfly image

one image is sufficient to explain the rest

only one osint that I found interesting

PinG !t Bin,300

So I used sherlock and got the profile in Pinterest and thought that it had the flag as it matched with the chall name but it had nothing

from sherlock it also show the profile on paste bin and here is the where our flag lies

I did the decryption of the code on a notebook but you can run up a script for that

One web chall

Fake_IP,100

read the source of main.js in the site

We se BRAINFUCK esolang just run with any decoder you like

We got to that site the flag is divide into 3 parts 1-base58 encoded 2-base64 encoded 3-base85 encoded

join them to get the flag

Leaving Crypto As they were relatively easy

Did most of the challenges listening to this track and others like them

Hope you had fun reading the writup :)

Share: Twitter Facebook
Nirmit Shah's Picture

About Nirmit Shah

Nirmit is a programmer, noob-hacker, a member of Cyberlabs, IIT (ISM) Dhanbad.

Pune, India

Comments