Try   HackMD

HKCERT CTF 2023: Guide to handwavy challenges (II)

ST碼 (I) / ST Code (I) (Misc)

  • Browse /flag1 will result in a QR Code,but it looks uneven
    • If you read the source code of the server carefully, you should know that it is a scalable vector graphic (SVG)
  • View the source code of the image, you can find that there are some rx="0" and rx="1", which are suspicious
    • So this is the reason why the image looks uneven
  • Record these numbers from the top to the bottom, you should get 01101000 01101011 ...
    • Can you guess what is the encoding scheme? __________
  • Using this encoding scheme to decode,you should get hkcert23{...
    • Looks like this is the flag!

Answer:Binary ASCII Code

獄門疆 / MongoJail (Pwn)

Partial Spoiler

  • This challenge seems to be unrelated to "Goku Mon Kyo"
    • But it is related to MongoDB Shell (mongosh)
    • mongosh is a specialized node.js "Read–eval–print" loop (REPL) environment
  • You can enter any Javascript code in a restricted mongosh
  • All built-in variables and functions, and require,module,globalThis are also sealed became undefined
  • What else can we do? Let's have a look on the Reference
    • Built-in objects are all sealed became undefined
    • Expressions & operators can still be used At least you can do addition
      • Spoiler: Which method can be used to open the other side of the seal?

又有寶貝 XSS / Baby XSS again (Web)

  • First, you should have some understanding about XSS challenges in CTF
    • If you have no idea, maybe check out the description from Infant XSS from HKCERT CTF 2021
    • Basically you need to find an XSS vulnerability and send the webpage with the payload to the bot to perform sensitive actions or capture sensitive information, such as Cookie
  • For this challenge, the description has already told you that you can inject script using the src query string parameter, because of the following:
out += """<script src="%s"></script>""" % request.args.get("src", "http://example.com/")
  • But there is Content Security Policy that restricts the source of the script to be from the domain https://hcaptcha.com,https://*.hcaptcha.com or https://pastebin.com:
<meta http-equiv="Content-Security-Policy" content="script-src https://hcaptcha.com https://*.hcaptcha.com https://pastebin.com">

轉蛋模擬器 / Gacha Simulator (Reverse)

Partial Guide

This challenge is best viewed with .NET Framework
This is a pptm file, which is Macro Enabled. Make sure you check out the VBA code under the Developer tab.
https://support.microsoft.com/en-au/office/show-the-developer-tab-e1192344-5e56-4d45-931b-e5fd9bea2d45
Can't see source code? Try this
https://stackoverflow.com/questions/1026483/is-there-a-way-to-crack-the-password-on-an-excel-vba-project
Then there are many ways to solve, like changing the probability, rearrange the encrypted data, decrypt the encrypted data directly, etc. Good luck!

下手ですね / BADES (Crypto)

Challenge Description

In this challenge, we are given an slightly modified Data Encryption Standard (denoted by DES'). Additionally, we are given the two oracles:

  1. encrypt_flag encrypts the flag using DES'-CBC.
  2. encrypt encrypts an arbitrary message using DES'-CBC.

The goal is to retrieve the flag using the above oracle calls.

Partial Guide

With __left_rotations being changed, all keys became weak keys. If we are using electronic codebook (ECB) mode of operation, Encrypt(Encrypt(m))=m, or intuitively, encrypting the same message twice would result in getting the message.

Image Not Showing Possible Reasons
  • The image was uploaded to a note which you don't have access to
  • The note which the image was originally uploaded to has been deleted
Learn More →

Figure 1.

However, in this case, we are using the CBC mode. This is how the a message is encrypted when we use encrypt_flag (or encrypt). At the very beginning, the message is padded to a size of multiple of 8. After that, it is chopped into blocks of 8 bytes:

Image Not Showing Possible Reasons
  • The image was uploaded to a note which you don't have access to
  • The note which the image was originally uploaded to has been deleted
Learn More →

Figure 2.

It is then encrypted to the ciphertext c0c1c2... which is given to us. How can we make use of the "encrypting the ciphertext actually decrypts it" behaviour to recover m1,m2,...?

Let's show how we retrieve m1 by encrypting c0c1:

Image Not Showing Possible Reasons
  • The image was uploaded to a note which you don't have access to
  • The note which the image was originally uploaded to has been deleted
Learn More →

Figure 3.

Since c0(c0c1)=c1, the content we are passing to the encrypt function being c1. In Figure 2, we know Encrypt(c1)=c0m1. Now we can recover m1 by computing c0(c0m1).

Now decrypt the remaining blocks!