Skip to main content

RESTCON CTF

CTFtime

 

RESTCON CTF




 

This blog post consists of writeups for :-

  • Basic
    • Basic : 1
    • Basic : 2
    • Broken
    • Garbage
  • OSINT
    • The Discovery
  •  Forensic
    • Magic : 1
    • Dance Monkey

 

BASIC

 

Basic : 1

Solution: You just have to take the mirror image of the given string.

Flag: RESTCON{RESTCON_FLAG}

 

 


Basic : 2

Solution: The equal sign at the end signifies that it has been encrypted using base. So I used CyberChef to convert it using base64.

Flag: RESTCON{RESTCON_2ND_BASIC_FLAG}

 

 


Broken

Solution: The flag was just an inspect away




Flag: RESTCON{H1DD3N}

 

 


Garbage

Solution: A simple strings of the file returned the flag



Flag: RESTCON{GR3P_7HE_FL4G}

 

 



 

OSINT


The Discovery



Solution: I used google search as my first step towards OSINT and found that the given image is of venetian hotel macau room. Then I googled its CEO and found his name on the wikipedia page.

Flag: RESTCON{Sheldon_Adelson}

 

 


 

FORENSIC


Magic : 1



Solution: The file containd a QR code thus I used an online QR code reader and the result obtained was RESTCON{29a9df89e2858e5a25c83b6a00352d19} Then I used hashid to check if I can determine its type. Lastly I used an MD5 cracker to crack it.





Flag: RESTCON{mirr0r}

 


 

Dance Monkey



Solution: Firstly I downloaded the gif. Then I used strings upon the file and found a string in first few lines which looked like it was base encrypted. So I copied it and used CyberChef to decrypt it and found that it actually was a base32 string.



Flag: RESTCON{SMIL3_L!K3_4_M0NK3Y}

Comments

Popular posts from this blog

Hacktober CTF - Writeup

  HACKTOBER CTF   This post contains the writeups for: l  Crypto n  Hail Caesar n  Down The Wrong Path l  Forensics n  Captured Memories n  Amcaching In n  Prefetch Perfection n  Prefetch Perfection 2 l  Linux n  Talking to the dead 1 n  Talking to the dead 2 l  Programming n  Message in an array n  Trick or treat l  Steganography n  You believe in ghosts n  Start digging n  Blasphemy   1 OSINT         n Creeping 1        n  Creeping 2         n Creeping 3         n Past Attacks       Hail Caesar In this question we have to decrypt TGG KUSJWV QGM and the question gives us a hint that its a caesar cipher. Although we don’t know the key but we really don’t need one for this. Loading it up in dcode gives us the answer as BOO SCARED YOU   And thus the flag is flag{ BOO SCARED YOU }           Down The Wrong Path The given image shows a transposition cipher.   So reading it in a similar fashion results in this message: REMEMBER TO TELL SPOOKYBOI ABOUT THE NEW TARGETS OF OUR NEXT ATTACK   So

C4ptur3-th3-fl4g Walkthrough

TryHackMe c4ptur3-th3-fl4g Walkthrough Task - 1 Translation and Shifting Question 1 -  c4n y0u c4p7u23 7h3 f149? Solution -  This one's quite simple. This is called leet in which the text is written with modified spellings with the help of numbers in place of some characters. The answer for this one is - can you capture the flag? Question 2 -  01101100 01100101 01110100 01110011 00100000 01110100 01110010 01111001 00100000 01110011 01101111 01101101 01100101 00100000 01100010 01101001 01101110 01100001 01110010 01111001 00100000 01101111 01110101 01110100 00100001 Solution -  This is written in binary as you can see that every set of 1's and 0's (separated by space) is a string of 8 numbers. So you can use any online resource such as  rapidtables  to convert binary to ascii. The answer for this is -  lets try some binary out! Question 3 -  MJQXGZJTGIQGS4ZAON2XAZLSEBRW63LNN5XCA2LOEBBVIRRHOM====== HINT :  Having an equal sign at the end of

CyberYoddha CTF - Writeup

  This blog post contains the writeups for the following challenges :- Misc Lorem Ipsum Forensics Image Viewer The row beneath What's the password Steg 2 Steg Ultimate Cryptography Beware the Ides of March Sus Reverse Engineering Password 1 Trivia Trivia 1 Trivia 3 Trivia 4 Trivia 5 Trivia 7 Trivia 8 LOREM IPSUM The given text when googled will give you the original text and you'll realise that the given text has some additional characters attached to some words. Lorem ipsum dolor/c/ sit amet, consectetur/y/ adipiscing /c/elit, sed do/t/ eiusmod tempor inci/f/didunt ut labore et dolore magna aliqua/l/. Ut enim ad minim/a/ veniam, quis/t/ nostrud exercitation ullamco/i/ laboris nisi/n/ ut aliquip ex ea/i/ commodo/s/ consequat. Duis /c/aute irure dolor in reprehenderit in voluptate velit /o/esse cillum dolore eu fugiat nulla pariatur. Excepteur /o/sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim /l/id est laborum. Extracting all these character