### ELF STATION this one was pretty straight forward but scared the competitors with the fact that it's in assembly ![](https://i.imgur.com/HDVyYsV.png) Alright well basically I just realized there was a more easy way to solve this than my way which was to read the assembly code LOL, okay so basically , what we do is use `gcc` to compile the `*.s` file to a binary and then use `radare2` to reverse it and read the disassembled output: ![](https://i.imgur.com/XADz8MS.png) Alright with that been done now let's read the disassembled output: ![](https://i.imgur.com/chUrrik.png) okay the main function asks for an input and then returns the price you need to pay, but there is also another function that is available ![](https://i.imgur.com/0KS6SJt.png) From it join the words and you get the flag `h4k-it{jingle_bells_jingle_bells}` ### SANTA FROM DA HOOD now this was my fav ,Given a ZIP file which has an image of Santa from the hood LOL , and we have to figure out what's inside it , maybe we have an embedded file or something it's probably and obviously steganography ![](https://i.imgur.com/JYcsh0D.png) So first thing I do is check for metadata inside that image ! and I was able to get the name of the artist but it was strange : ![](https://i.imgur.com/aVziNmt.png) `Arist` was `merrychrismass` so I now decide to try and check for embedded files using steghide, but it asked for a password and I gave the password as the name of the artist and voila worked like charm! ``` ┌─[tahaafarooq@cyberwarriors]─[~/Desktop/gameofhacks/krismasi/rev/santa/test] └──╼ $steghide --info santa.jpg "santa.jpg": format: jpeg capacity: 1.4 KB Try to get information about embedded data ? (y/n) y Enter passphrase: embedded file "flag.txt": size: 42.0 Byte encrypted: rijndael-128, cbc compressed: yes ``` So we have `flag.txt` inside it , now let's extract it out and read that flag! ``` └──╼ $steghide extract -sf santa.jpg Enter passphrase: wrote extracted data to "flag.txt". ``` ``` └──╼ $cat flag.txt h4k-it{Santa_i_W4Nt_icecream_for_kRISMAS} ``` and we have the flag! `h4k-it{Santa_i_W4Nt_icecream_for_kRISMAS}` ### WELCOME This is the third challenge , which says welcome probably the most easiest since it's the welcoming challenge, So I just download the binary and then run it: ``` ┌─[tahaafarooq@cyberwarriors]─[~/Desktop/gameofhacks/krismasi/rev/santa/test] └──╼ $./welcome Hello , Merry Christmas!!! Are you enjoying this CTF ? Y or N Y h4k-it{letS_h4k_f0r_r00t} ``` And we get the flag! `h4k-it{letS_h4k_f0r_r00t}` ### SANTATALK Well this one is a fun one , so from the description you get a straight up hint from it and definetly you will realize that the numbers passed through every conversation chat is actually a hex value so taking all that and converting it to ascii we get the flag: ![](https://i.imgur.com/dQmcGf7.png) ``` └──╼ $./santatalk SANTA ~ DAD ~ CHAT ~ ROOM Santa : I bought 68 gifts Clause : So what about the rest 34? Santa : Dad CHillll!, The house 6B doesn't get gifts! Clause : You are really dumb my son! Give 2D extra gifts... Santa : Oh No!! The maid from there wanted to 69 :) Clause : And lemme guess ... you didn't do shit! Not even a 74! Santa : Almost......but I tried my best , i'll prolly go to 7B next time Clause : What you mean next time???? ! Listen buy 77 Gifts I change my mind Clause : Oh wait 65 is enough Santa : 65 gifts right?Clause : NO U DUMBA** I WANT 70 ! ARE YOU DEAF OR SOMN..... Clause : I'll 69 u instead!! OH GOSH Santa : Okay 74 is enough tho Santa : The houses 79 , 5F , 77 and 6F from candyland , 6F from techland, have all been good! Clause : Give them 70 gifts each Clause : Dont Give ANything TO HOUSE 7D!!!!! ``` So I took all those values and combined them : `68346B2D69747B7765706974795F776F6F707D` and from my terminal I just paste all that and then reverse it with `xxd` and I get the flag: ``` ┌─[tahaafarooq@cyberwarriors]─[~/Desktop/gameofhacks/krismasi/rev/santa/test] └──╼ $echo "68346B2D69747B7765706974795F776F6F707D" | xxd -r -p h4k-it{wepity_woop} ``` `h4k-it{wepity_woop}` --- ``` 25th | 12 | 2021 | @tahaafarooq (twitter) ```