zh3r0 Ctf Writups
Lets start with some trivial ones: they don’t need any explanation just a screenshot would explain it all
Name- Pizza
Category - Web
See the source code of js file
Name- Cake
Category - Web
Always remember to see robots.txt
Name- Tasty Snacks
Category - Web
The name and screenshot are self explanatory
Name- Pasta
Category - Web
See the code JSFUCK Spotted!!
Decode it !!
visit the page directly no need to login!!
Name- Ice Cream
Category - Web
Ask Finch about it or use the dig in cmdline :)
Name- Rainbow
Category - Misc
Create a wordlist using the criteria given
colors =["red", "orange", "yellow", "green", "blue", "indigo", "violet"]
for color in colors:
for i in range(100):
print color.upper()+str(i).zfill(2)
brute with john using the wordlist generated
Name- A mix of Everything
Category - Misc
Lets start with cracking the zip
Open the binary in ghidra the EEEE
function name looks suspicious so lets check it
we get a strings that is xor with 2
Lets used cyberchef for xor on xor we get base64 string on further decode we get a link to website
On website we get a base encoded string
back to cyberchef
That looks like a password to pdf file lets use it to open pdf We got a image ,save it!
Run zsteg to get the flag!!
Nice challenge literally a mix of everything!
Name - Audiona spectorum
Category - forensics
use any audio tool to plot spectogram and get the flag
its not clear but works for me
Name - Mrs.Norris
Category - forensics
see the exif data of the image we get a base encoded string
Lets go to our best friend cyberchef
Name - Simple_As_hell
Category - forensics
we are given a jpeg and png ,lets use zsteg on png to get the pass
use this pass on image with steghide
decrypt the base encoded string to get the flag
Name - Steganography cracker
Category - forensics
As the name suggest its about the stegcracker tool so don’t try to crack the zip pass use stegcracker on the image given
Name - Cicada
Category - forensics
given a flag.png and guessme.png fix the flag.png it is something like this
so it yields nothing with any other tools
from challenge name cicada the steganography tool used here was outguess we don’t know the key lets try the fake flag as key and we get the flag :)
Name - A message from the Universe
Category - forensics
So here I got a lot of help from the author I will not waste time showing what other things i did
I figured out the key was Robot36 and the key was used to xor the whole wav file so we xor-files to xor to things ,apparent python way doesn’t give us the intented result the author pointed out that to me
Lets decrypt first
So we get an audio and from previous ctfs i knew that robot36 was reference to SSTV signals so you use any software like qsstv or the mobile Robot36 and play the audio and see the magic happening in front of your eyes
Decrypt base64 to get the flag!!!
Its been a long writup will do all master challs in next post!! Hope you liked it
Comments