theuib
  • Blog
  • Bio

N00b CTF

27/6/2020

0 Comments

 

Be at your home

BE AT YOUR HOMEAfter Analyzing the webpage you get to know there is not much information except for the cookie..But hold on what the crap is this , it is encrypted how would i get something out of it???????Let's try to decrypt this , think about ways by which cookies can be setup.Hurray!!!JWT (JSON Web Token)Now just foller the below steps to get the flag..Step 1 : Goto Storage for the Cookie Step 2 : Cookie is a JWT Token Step 3 : use jwt.io to check content of cookie(you can decrypt part wise as well using some base tools) Step 4 : replace the ip address to localhost ip address.(127.0.0.1)(HOME) Step 5 : Repace the cookie Step 6 : Send the request(REFRESH your browser) YOu have your Flag : noob{!_L!k3_my_h0m3} !!!Done...

The great programmer

THE GREAT PROGRAMMERLet's Analyze the webpage , ohhhhhhh there are multiple links on this website somewhere around 4000.So , i am going to check every link if it gives me my flag....INNER ME : NOOOOOOO!! you are a programmer , use your programming skills to find out the valid link.LET's write a script!!!!Script is available in this repo only with the name solve.py (I have used python for scripting )Script ch.py was created to generate these random string or i should say false linksAfter Running the script you must have got only one valid link rest all are false links.Step1 : pr_magic_fun.php is the file which exists on server and have flag in it Step2 : Extract the flag from that file!!! Hurray !!!You got the Flag : noob{p3ro_graMM3r_r0cks!!}Done!!

Answ3r m3

DescriptionI am asking atbash for friendship.
mlly{B0f_zi3_w01mt_ti3zg}
SolutionThis is encode with the Atbash Cipher
use Cyber Chef and decode it
After decoding - noob{Y0u_ar3_d01ng_gr3at}

What the #


The above code looked like brainfuck cipher and hence I searched for an online brainfuck compiler. But executing the code threw some error. After studying a bit on brainfuck and looking at a few example programs i got to know that the characters were reversed and the language that was used to encode the message was reversefuck. Finally, compiling the code with reversefuck gave us the flag.
FLAG: noob{N0t_4lw4y5_br41n}
PS: You can also write a simple program to covert the reversefuck cipher to brainfuck cipher

BASEd

The challenge name gave a hint that it is some kind of baseX decoding. I tried a multiple of decoders before i figured out that it was Base85/Ascii85 encoding.
Decoding the output with BASE58 outputs the flag.
FLAG: noob{base58_85}

Aar_Ess_Ae 2.0

The Challenge description didn’t make any sense to me, however the title says it all [RSA]. The text file had 3 variables n,e and c.
I downloaded RsaCtfTool from github and executed the following command which gave us the flag.
FLAG: noob{Primes_Can_B3_Saxy_T00}
0 Comments



Leave a Reply.

    Author

    A.V.Sidhartha, Cyber Security enthusiast, Developer, CTF Player

    Archives

    June 2020

    Categories

    All

Powered by Create your own unique website with customizable templates.
  • Blog
  • Bio