Skip to main content

Posts

Showing posts from August, 2020

RESTCON CTF

CTFtime   RESTCON CTF   This blog post consists of writeups for :- Basic Basic : 1 Basic : 2 Broken Garbage OSINT The Discovery   Forensic Magic : 1 Dance Monkey   BASIC   Basic : 1 Solution: You just have to take the mirror image of the given string. Flag: RESTCON{RESTCON_FLAG}     Basic : 2 Solution: The equal sign at the end signifies that it has been encrypted using base. So I used CyberChef to convert it using base64. Flag: RESTCON{RESTCON_2ND_BASIC_FLAG}     Broken Solution: The flag was just an inspect away Flag: RESTCON{H1DD3N}     Garbage Solution: A simple strings of the file returned the flag Flag: RESTCON{GR3P_7HE_FL4G}       OSINT The Discovery Solution: I used google search as my first step towards OSINT and found that the given image is of venetian hotel macau room. Then I googled its CEO and found his name on the wikipedia page. Flag: RESTCON{Sheldon_Adelson}       FORENSIC Magic : 1 Sol...

Bandit Walkthrough

Bandit Walkthrough Level 0 >> Level 1                                                                                 Level 17 >> Level 18 Level 1 >> Level 2                                                                                 Level 18 >> Level 19 Level 2 >> Level 3                                                                                 Level 19 >...

Leviathan Walkthrough

Leviathan Walkthrough   Level 0 >> Level 1 Level 1 >> Level 2 Level 2 >> Level 3 Level 3 >> Level 4 Level 4 >> Level 5 Level 5 >> Level 6 Level 6 >> Level 7 Level 0 >> Level 1 Hints 1. Since you don't have an explanatory question for this one. Try to ssh into the server and look for things which are designed in a way that people usually don't see it. Solution 1. SSH into the server with password as leviathan0 $ ssh leviathan0@leviathan.labs.overthewire.org -p 2223 2. A simple ls into the server didn't gave any useful output. So lets try to see the hidden files in the directory $ ls -a OUTPUT: . .. .backup .bash_logout .bashrc .profile 3. Backup directory seems interesting. Lets cd into it and see its contents. $ cd .backup && ls OUTPUT: bookmarks.html 4. When I tried to view its contents using cat I realized that the file is too big to traverse manually. So I tried to grep random strings into it and found the answer wi...

Krypton Walkthrough

Krypton Walkthrough Level 1 >> Level 2 Level 2 >> Level 3 Level 3 >> Level 4 Level 4 >> Level 5 Level 5 >> Level 6 Level 6 >> Level 7 Level 1 >> Level 2 Hint Read the question carefully. Solution 1. SSH into the server with username as krypton1 and password as KRYPTONISGREAT $ ssh krypton1@krypton.labs.overthewire.org -p 2231 2. The next step is to find the file upon which we'll be practising. This information is provided in the previous level. So lets hop onto the location. $ cd /krypton/ $ ls $ cd krypton1 3. Reading the README file gives us the answer to try skipping that and directly cat the other file $ cat krypton2 OUTPUT: YRIRY GJB CNFFJBEQ EBGGRA 4. With practice you'll be able to recognize this cipher. Also you can use an online service called boxentriq for recognizing the cipher. It'll also help you in breaking it. As of now the cipher is rot13 which is a caesar cipher with key as 13. The way rot13 works is that it adds 13...