Welcome back my fellow readers, It has been a very tough weekend for me since there are multiple CTFs running at the same time but I manage to do these 2 CTFs, hope you found what you're looking for in my Write-up
Please donate (jk jk jk), I need her S6R1, omfg
We got a Pcap and an out file, the out file seem like a ELF lets open it in IDA first.
there a function sending RSA, lets check it out
seem like this just a normal RSA but got sent through different ip address.
arcoding to the elf file, N is send to 10.0.0.104, e is 192.51.100.22 and c is 51.15.220.32, let's filter them in the pcap file to get the value back.
just to be quick here all the value:
Decrypting the RSA we will get the flag: p_ctf{S!z3_d0e5_m@tt3r_f0r_wi3n3Rs}
The Challange gave us a JPG file that weight up to 4.16mb but the picture was very small
Using binwalk we can dump out 2 pictures, which one of them is mentioned in the hint as "pigeon"
The picure of a dog defeating magnus carlsen must have something in it since it weight up to 4.2mb and the pigeon mention in the hint seem like wanting us to thinkg of "PGN" (Portable Game Notation) since it all lined up because PiGeon Notaion also "PGN" (my teammate figured this out in the middle of the night lol)
Researching about the chess encryption we manage to find this https://github.com/notnil/chesscode then we got this script
using that with the PGN of "the game of the century", if you asked where this come from? it was a string in every image of this challenge
Searching google about it we will know it the game between Donald Byrne and 13 yearsold Bobby Fischer, open the game in Lichess scroll down we can get it's PGN
Using the script above, we managed to get the key, converting it to hex and we can dump out all the image in the "image of an dog defeating magnus carlsen"
Continue using binwalk with the rly_fin.jpg, we get 64 pictures everyone of them stand for 1 square in the chessboard with the cordinate from a1-h8
Using this script we can build back the Board, it just a normal board but after open in Stegsolve we can see the flag clearly.
Shouting out for $h1kh4r & .vedved for solving this challenge
note: I only help in the first part of this challenge, the rest was solved by $h1kh4r
We got a broken pcapng file from the challenge, we can't open it in any way, I tried using https://f00l.de/hacking/pcapfix.php but, I can open it after fixing it up but the result doesn't help much, but string the pcap out I see there some PGP key and there a google drive link
there 2 way to get the whole pgp out, first you can use binwalk or just open the pcapng file in notepad, assem all the part we have a fully function google drive link.
open the link up we will have 2 file, one is the zip and one is the picture
using John to crack the Bruhh zip, we will get a private key
Using the private key to decrypt the gpg we will have an audio file
At this point, $h1kh4r know it was rtty so using his script we can get out the message.
Okay we will leave the ciphertext there and continue with the image.
Arccoding to $h1kh4r, he noticed the name in the challenge so he search about him and know it was Salsa encryption
Also by openning the image in stegsolve again we will know the key:
So the only thing we need left is the nonce, arrcoding to the author, the nonce was in the zip file but he changed it so he just gave it away
with all of that using cipherchef we will get the flag:
The challenge gave us a memdump file, using volatility searching on the user Desktop we see some suspicious file
script.py, ks.py, protected.zip, seem like these are the thing we need to dump out
So this is the key to open the protected zip that the challenge was talking about so the key used to decrypt has been hide in the enviroment and the encrypted key has been sent somewhere.
Using envar plugin inside volatility we can retrieve the key
So the key is Env4rs_1s_4m4z1ng
, also when you looking at the passkey, it seem like they name the virable as "PASSKEY", string the whole find and grep for "PASSKEY" we can see the passkey it sent using invoke-webrequest post method
from here we can decrypt the data that got encrypted and the result is a google drive link
open the link we have a gif file with a comment about Capitalize
downloading this gif and using https://ezgif.com/split we can determine that this is morse code
using the password we can extract the zip now, we got another image but using the password we found in ks.py
The password was in base64, debase64 we got "Y0u_m4y_pa55" using this to extract the fin.jpg and we will get the flag
Just open the ad1 file and you will get the flag
Open the new ad1 file, first thing I saw there was a file that got encrypted
Wandering around I found a suspicious JScript.
There was a comment at the end of the script, the flag was also there
The second challenge must be to decrypt the flag
We can see there was a reverse and debase64, I will use cyberchef to analyze the string above
So it encrypt the flag using AES then delete itself. Using it own code, we can print out the key and iv it used then using cyberchef and we will get the flag.
Thank you for reading until now, It's my honor that you read up until now, It was a fun weekend I had, we managed to placed 2nd in Pragyan and 66 in Bits
Some funny moment while we are solving
This was a joke I swear.
It was a joke, I repeat, It was a joke!