Be at your homeBE AT YOUR HOMEAfter Analyzing the webpage you get to know there is not much information except for the cookie..But hold on what the crap is this , it is encrypted how would i get something out of it???????Let's try to decrypt this , think about ways by which cookies can be setup.Hurray!!!JWT (JSON Web Token)Now just foller the below steps to get the flag..Step 1 : Goto Storage for the Cookie Step 2 : Cookie is a JWT Token Step 3 : use jwt.io to check content of cookie(you can decrypt part wise as well using some base tools) Step 4 : replace the ip address to localhost ip address.(127.0.0.1)(HOME) Step 5 : Repace the cookie Step 6 : Send the request(REFRESH your browser) YOu have your Flag : noob{!_L!k3_my_h0m3} !!!Done... The great programmerTHE GREAT PROGRAMMERLet's Analyze the webpage , ohhhhhhh there are multiple links on this website somewhere around 4000.So , i am going to check every link if it gives me my flag....INNER ME : NOOOOOOO!! you are a programmer , use your programming skills to find out the valid link.LET's write a script!!!!Script is available in this repo only with the name solve.py (I have used python for scripting )Script ch.py was created to generate these random string or i should say false linksAfter Running the script you must have got only one valid link rest all are false links.Step1 : pr_magic_fun.php is the file which exists on server and have flag in it Step2 : Extract the flag from that file!!! Hurray !!!You got the Flag : noob{p3ro_graMM3r_r0cks!!}Done!! Answ3r m3DescriptionI am asking atbash for friendship. mlly{B0f_zi3_w01mt_ti3zg} SolutionThis is encode with the Atbash Cipher use Cyber Chef and decode it After decoding - noob{Y0u_ar3_d01ng_gr3at} What the #The above code looked like brainfuck cipher and hence I searched for an online brainfuck compiler. But executing the code threw some error. After studying a bit on brainfuck and looking at a few example programs i got to know that the characters were reversed and the language that was used to encode the message was reversefuck. Finally, compiling the code with reversefuck gave us the flag. FLAG: noob{N0t_4lw4y5_br41n} PS: You can also write a simple program to covert the reversefuck cipher to brainfuck cipher BASEdThe challenge name gave a hint that it is some kind of baseX decoding. I tried a multiple of decoders before i figured out that it was Base85/Ascii85 encoding. Decoding the output with BASE58 outputs the flag. FLAG: noob{base58_85} Aar_Ess_Ae 2.0The Challenge description didn’t make any sense to me, however the title says it all [RSA]. The text file had 3 variables n,e and c.
I downloaded RsaCtfTool from github and executed the following command which gave us the flag. FLAG: noob{Primes_Can_B3_Saxy_T00}
0 Comments
|