### ELF STATION
this one was pretty straight forward but scared the competitors with the fact that it's in assembly

Alright well basically I just realized there was a more easy way to solve this than my way which was to read the assembly code LOL, okay so basically , what we do is use `gcc` to compile the `*.s` file to a binary and then use `radare2` to reverse it and read the disassembled output:

Alright with that been done now let's read the disassembled output:

okay the main function asks for an input and then returns the price you need to pay, but there is also another function that is available

From it join the words and you get the flag
`h4k-it{jingle_bells_jingle_bells}`
### SANTA FROM DA HOOD
now this was my fav ,Given a ZIP file which has an image of Santa from the hood LOL , and we have to figure out what's inside it , maybe we have an embedded file or something it's probably and obviously steganography

So first thing I do is check for metadata inside that image ! and I was able to get the name of the artist but it was strange :

`Arist` was `merrychrismass` so I now decide to try and check for embedded files using steghide, but it asked for a password and I gave the password as the name of the artist and voila worked like charm!
```
┌─[tahaafarooq@cyberwarriors]─[~/Desktop/gameofhacks/krismasi/rev/santa/test]
└──╼ $steghide --info santa.jpg
"santa.jpg":
format: jpeg
capacity: 1.4 KB
Try to get information about embedded data ? (y/n) y
Enter passphrase:
embedded file "flag.txt":
size: 42.0 Byte
encrypted: rijndael-128, cbc
compressed: yes
```
So we have `flag.txt` inside it , now let's extract it out and read that flag!
```
└──╼ $steghide extract -sf santa.jpg
Enter passphrase:
wrote extracted data to "flag.txt".
```
```
└──╼ $cat flag.txt
h4k-it{Santa_i_W4Nt_icecream_for_kRISMAS}
```
and we have the flag!
`h4k-it{Santa_i_W4Nt_icecream_for_kRISMAS}`
### WELCOME
This is the third challenge , which says welcome probably the most easiest since it's the welcoming challenge, So I just download the binary and then run it:
```
┌─[tahaafarooq@cyberwarriors]─[~/Desktop/gameofhacks/krismasi/rev/santa/test]
└──╼ $./welcome
Hello , Merry Christmas!!!
Are you enjoying this CTF ? Y or N
Y
h4k-it{letS_h4k_f0r_r00t}
```
And we get the flag!
`h4k-it{letS_h4k_f0r_r00t}`
### SANTATALK
Well this one is a fun one , so from the description you get a straight up hint from it and definetly you will realize that the numbers passed through every conversation chat is actually a hex value so taking all that and converting it to ascii we get the flag:

```
└──╼ $./santatalk
SANTA ~ DAD ~ CHAT ~ ROOM
Santa : I bought 68 gifts
Clause : So what about the rest 34?
Santa : Dad CHillll!, The house 6B doesn't get gifts!
Clause : You are really dumb my son! Give 2D extra gifts...
Santa : Oh No!! The maid from there wanted to 69 :)
Clause : And lemme guess ... you didn't do shit! Not even a 74!
Santa : Almost......but I tried my best , i'll prolly go to 7B next time
Clause : What you mean next time???? ! Listen buy 77 Gifts I change my mind
Clause : Oh wait 65 is enough
Santa : 65 gifts right?Clause : NO U DUMBA** I WANT 70 ! ARE YOU DEAF OR SOMN.....
Clause : I'll 69 u instead!! OH GOSH
Santa : Okay 74 is enough tho
Santa : The houses 79 , 5F , 77 and 6F from candyland , 6F from techland, have all been good!
Clause : Give them 70 gifts each
Clause : Dont Give ANything TO HOUSE 7D!!!!!
```
So I took all those values and combined them :
`68346B2D69747B7765706974795F776F6F707D`
and from my terminal I just paste all that and then reverse it with `xxd` and I get the flag:
```
┌─[tahaafarooq@cyberwarriors]─[~/Desktop/gameofhacks/krismasi/rev/santa/test]
└──╼ $echo "68346B2D69747B7765706974795F776F6F707D" | xxd -r -p
h4k-it{wepity_woop}
```
`h4k-it{wepity_woop}`
---
```
25th | 12 | 2021 | @tahaafarooq (twitter)
```