Skip to main content

RESTCON CTF

CTFtime

 

RESTCON CTF




 

This blog post consists of writeups for :-

  • Basic
    • Basic : 1
    • Basic : 2
    • Broken
    • Garbage
  • OSINT
    • The Discovery
  •  Forensic
    • Magic : 1
    • Dance Monkey

 

BASIC

 

Basic : 1

Solution: You just have to take the mirror image of the given string.

Flag: RESTCON{RESTCON_FLAG}

 

 


Basic : 2

Solution: The equal sign at the end signifies that it has been encrypted using base. So I used CyberChef to convert it using base64.

Flag: RESTCON{RESTCON_2ND_BASIC_FLAG}

 

 


Broken

Solution: The flag was just an inspect away




Flag: RESTCON{H1DD3N}

 

 


Garbage

Solution: A simple strings of the file returned the flag



Flag: RESTCON{GR3P_7HE_FL4G}

 

 



 

OSINT


The Discovery



Solution: I used google search as my first step towards OSINT and found that the given image is of venetian hotel macau room. Then I googled its CEO and found his name on the wikipedia page.

Flag: RESTCON{Sheldon_Adelson}

 

 


 

FORENSIC


Magic : 1



Solution: The file containd a QR code thus I used an online QR code reader and the result obtained was RESTCON{29a9df89e2858e5a25c83b6a00352d19} Then I used hashid to check if I can determine its type. Lastly I used an MD5 cracker to crack it.





Flag: RESTCON{mirr0r}

 


 

Dance Monkey



Solution: Firstly I downloaded the gif. Then I used strings upon the file and found a string in first few lines which looked like it was base encrypted. So I copied it and used CyberChef to decrypt it and found that it actually was a base32 string.



Flag: RESTCON{SMIL3_L!K3_4_M0NK3Y}

Comments

Popular posts from this blog

C4ptur3-th3-fl4g Walkthrough

TryHackMe c4ptur3-th3-fl4g Walkthrough Task - 1 Translation and Shifting Question 1 -  c4n y0u c4p7u23 7h3 f149? Solution -  This one's quite simple. This is called leet in which the text is written with modified spellings with the help of numbers in place of some characters. The answer for this one is - can you capture the flag? Question 2 -  01101100 01100101 01110100 01110011 00100000 01110100 01110010 01111001 00100000 01110011 01101111 01101101 01100101 00100000 01100010 01101001 01101110 01100001 01110010 01111001 00100000 01101111 01110101 01110100 00100001 Solution -  This is written in binary as you can see that every set of 1's and 0's (separated by space) is a string of 8 numbers. So you can use any online resource such as  rapidtables  to convert binary to ascii. The answer for this is -  lets try some binary out! Question 3 -  MJQXGZJTGIQGS4ZAON2XAZLSEBRW63LNN5XCA2LOEBBVIRRHOM====== HINT :  Hav...

Hacktober CTF - Writeup

  HACKTOBER CTF   This post contains the writeups for: l  Crypto n  Hail Caesar n  Down The Wrong Path l  Forensics n  Captured Memories n  Amcaching In n  Prefetch Perfection n  Prefetch Perfection 2 l  Linux n  Talking to the dead 1 n  Talking to the dead 2 l  Programming n  Message in an array n  Trick or treat l  Steganography n  You believe in ghosts n  Start digging n  Blasphemy   1 OSINT         n Creeping 1        n  Creeping 2         n Creeping 3         n Past Attacks       Hail Caesar In this question we have to decrypt TGG KUSJWV QGM and the question gives us a hint that its a caesar cipher. Although we don’t know the key but we really don’t need one for this. Loading it up in dcode gives us the answer as BOO SCARED YOU   And thus the flag is flag{ BOO...

Krypton Walkthrough

Krypton Walkthrough Level 1 >> Level 2 Level 2 >> Level 3 Level 3 >> Level 4 Level 4 >> Level 5 Level 5 >> Level 6 Level 6 >> Level 7 Level 1 >> Level 2 Hint Read the question carefully. Solution 1. SSH into the server with username as krypton1 and password as KRYPTONISGREAT $ ssh krypton1@krypton.labs.overthewire.org -p 2231 2. The next step is to find the file upon which we'll be practising. This information is provided in the previous level. So lets hop onto the location. $ cd /krypton/ $ ls $ cd krypton1 3. Reading the README file gives us the answer to try skipping that and directly cat the other file $ cat krypton2 OUTPUT: YRIRY GJB CNFFJBEQ EBGGRA 4. With practice you'll be able to recognize this cipher. Also you can use an online service called boxentriq for recognizing the cipher. It'll also help you in breaking it. As of now the cipher is rot13 which is a caesar cipher with key as 13. The way rot13 works is that it adds 13...