Skip to main content

RESTCON CTF

CTFtime

 

RESTCON CTF




 

This blog post consists of writeups for :-

  • Basic
    • Basic : 1
    • Basic : 2
    • Broken
    • Garbage
  • OSINT
    • The Discovery
  •  Forensic
    • Magic : 1
    • Dance Monkey

 

BASIC

 

Basic : 1

Solution: You just have to take the mirror image of the given string.

Flag: RESTCON{RESTCON_FLAG}

 

 


Basic : 2

Solution: The equal sign at the end signifies that it has been encrypted using base. So I used CyberChef to convert it using base64.

Flag: RESTCON{RESTCON_2ND_BASIC_FLAG}

 

 


Broken

Solution: The flag was just an inspect away




Flag: RESTCON{H1DD3N}

 

 


Garbage

Solution: A simple strings of the file returned the flag



Flag: RESTCON{GR3P_7HE_FL4G}

 

 



 

OSINT


The Discovery



Solution: I used google search as my first step towards OSINT and found that the given image is of venetian hotel macau room. Then I googled its CEO and found his name on the wikipedia page.

Flag: RESTCON{Sheldon_Adelson}

 

 


 

FORENSIC


Magic : 1



Solution: The file containd a QR code thus I used an online QR code reader and the result obtained was RESTCON{29a9df89e2858e5a25c83b6a00352d19} Then I used hashid to check if I can determine its type. Lastly I used an MD5 cracker to crack it.





Flag: RESTCON{mirr0r}

 


 

Dance Monkey



Solution: Firstly I downloaded the gif. Then I used strings upon the file and found a string in first few lines which looked like it was base encrypted. So I copied it and used CyberChef to decrypt it and found that it actually was a base32 string.



Flag: RESTCON{SMIL3_L!K3_4_M0NK3Y}

Comments

Popular posts from this blog

Hacktober CTF - Writeup

  HACKTOBER CTF   This post contains the writeups for: l  Crypto n  Hail Caesar n  Down The Wrong Path l  Forensics n  Captured Memories n  Amcaching In n  Prefetch Perfection n  Prefetch Perfection 2 l  Linux n  Talking to the dead 1 n  Talking to the dead 2 l  Programming n  Message in an array n  Trick or treat l  Steganography n  You believe in ghosts n  Start digging n  Blasphemy   1 OSINT         n Creeping 1        n  Creeping 2         n Creeping 3         n Past Attacks       Hail Caesar In this question we have to decrypt TGG KUSJWV QGM and the question gives us a hint that its a caesar cipher. Although we don’t know the key but we really don’t need one for this. Loading it up in dcode gives us the answer as BOO SCARED YOU   And thus the flag is flag{ BOO...

Krypton Walkthrough

Krypton Walkthrough Level 1 >> Level 2 Level 2 >> Level 3 Level 3 >> Level 4 Level 4 >> Level 5 Level 5 >> Level 6 Level 6 >> Level 7 Level 1 >> Level 2 Hint Read the question carefully. Solution 1. SSH into the server with username as krypton1 and password as KRYPTONISGREAT $ ssh krypton1@krypton.labs.overthewire.org -p 2231 2. The next step is to find the file upon which we'll be practising. This information is provided in the previous level. So lets hop onto the location. $ cd /krypton/ $ ls $ cd krypton1 3. Reading the README file gives us the answer to try skipping that and directly cat the other file $ cat krypton2 OUTPUT: YRIRY GJB CNFFJBEQ EBGGRA 4. With practice you'll be able to recognize this cipher. Also you can use an online service called boxentriq for recognizing the cipher. It'll also help you in breaking it. As of now the cipher is rot13 which is a caesar cipher with key as 13. The way rot13 works is that it adds 13...