theuib
  • Blog
  • Bio

Steganography

1/7/2020

0 Comments

 
Dih dat is a morse language on decoding you will get as thepasswordis:hacsecurity123
 

Using stegosuite to decode:
Flag:hsCTF{S7EG_TO0LS_AR3_ALW4YS_H3LPFUL}
 
On fixinf the header ull get the flag as:
 
 
0 Comments

Web Challenges

1/7/2020

0 Comments

 

You can do this in 2 ways on bruteforcing ull get 3 pages wherin the client name dosent change.
On one of those pages is the flag.
Else u can use the flask vulnarability and get the flag.

 
 
In web 2 nothing is in main page,but source code has something to do with white text.
Using stegsnow tool u will get flag as :

hsCTF{SNOW_SCRAPPER}
 
 
This is a simple rsa using RsaCTFTool u can find ur private key and decrypt the cipher.
 
Flag: hsCTF{M!X7URE_1S_ALW4YS_7AS7Y}
 
 
 
On analysing whole data of images we find 3 images which were mentioned to have flags.  
 
 
The part of flag is on the image.
 
 
Finally the flag is: hsCTF{S7EAGNOGR4PHY_T0OLS_AR3_4LW4YS_US3FU7}

0 Comments

Simple Series

1/7/2020

0 Comments

 
 
Flag: hsCTF{C0MMUNI7Y_0F_H4CK3RS}
 
Simple-1 has flag printed in it:)
 
 
Decoding this text to following bases gives the flag:(85,64,62,58,32)
:IT5J@ol-%;_Ug4A2?u*;cm$S:Ie;M;/J-E;b&]bA8OeP;,p5-A2@7SA8=#I@;BD"<^]qB=)BX;9kn3,;J\g%<`i7:A6<M?:KV:1=):W79iX#+=trKL;H?+t=tjSP
 
Flag:hsCTF{5UM_0F_AL7_B4S35}
 

 
hsCTF{C0NF!ENTI4L_BU7_LE4K3D}
 

0 Comments

Forensics

1/7/2020

0 Comments

 

For Series

​Forensics Writeups:
 
 
 
The source file link gives us a zip, which can be unlocked using password 1, which is a rot cipher.(password: tiktoktiktok)
Then on unzippping ull get a pcap file,deep analysing would u a link to a easyupload.io which has a zip, password for it is password2: hacsecurity(in question it was xored with 128).
The zip had flag: hsCTF{CAPTUR!NG_P4CKE7S_!S_CR!ME}
 
 
 
 
Downloading the file we get a zip, using john or fcrack we get the password to be memory.
Unzipping we get a pcapng, analysing would give 2 files namely fakeflag,flag.
Reading them would give the flag:hsCTF{CAP7UR!NG_C4N_B3_D0NE_4NYW4YS}
U can do it other ways just by using strings file | grep hsCTF
 
Game changer
 
Reading the source file and selecting the whole text gives a clue that some text is hidden or white text.(snow).
 
 
We are given in hint to use all known passwords, using pass123 on the source.txt we get a statement
Using steghide on image with the obtained password given we get a file.
 
Fixing its header and checking with steghide gives a file.
that has a pastebin link, going to link gives a bacon cipher text further gives another website in which in a .js script we have our flag in JsFuck text.
Decoding the Jsfuck we get our flag:
hsCTF{4LL_!N_0N3}
0 Comments

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    July 2020

    Categories

    All

    RSS Feed

Proudly powered by Weebly
  • Blog
  • Bio