This CTF is one of the CTF's that I had fun playing , it was having multiple categories and was in Jeopardy Style .
This was the first challenge with the description Hello Mr Robot
I directly knew that they want us to check the robots.txt file!
And we have the flag , that was a quick one:) and a fun one!
FLAG : UDOM{d0nt_forg3t_Me_mr_ROBOT}
The next was was named pPOSTMANm , with a description saying celebrate xmas with postman
, so what I do now is copy the link to access the challenge and try see what I get from visiting it:
Nothing at all , I now try to send a POST request to the same link and see what I get:
Yep the FLAG
FLAG : UDOM{xmas_with_POSTMAN}
With a description saying Speak a native language!!!
this totally scared me to hell lol, what's my native language , So I then understood what they mean , and it had something to do with the header Accept-Language
I have to change it to my countries locale and i'll get the flag!
I sent a request in Curl with the header Accept-Language
set with value sw-TZ
FLAG : UDOM{xmas_c3l3br3t3_in_swahili}
Well this one was a classic , the description was see if you can click me
and I said why not hehehe! let's click this web chall!
Okay I wasn't able to click that red button so what I did now was inspect the element of it and see what it has that makes it un-clickable
alright we have that disable
attribute let's remove it and we will surely have the flag
FLAG : UDOM{CL1CK_CL1CK_B00M}
With the description saying can you find the mistake!! and login to get flag
why not? I love finding mistakes and bugs and having to login is the best part LOL, so let's open the web app
And we have a login page , let's try have a look at the source code perhaps we might get something and yes! I did try SQLi didn't work!
Okay we have the password now , let's try login with the password and a different username:
And we get an error that , cyrange
is the one that uses that password to login to the dashboard so yes that's the mistake it's disclosing information! LOL now let's go get the flag!
FLAG : UDOM{S0m3_M1STAK3_MAD3_DEVELOP3R}
This was a fairly easy one with 500 points , with the description saying lets Turn thing Different Now !! come on Big Man
, and I knew that they were trynna mock me LOL , coz I am the big man
YESSIRRRRRRRRR!
Aight now let's quit playing hahaha, So I visit the web and i'm like WTH is this…
a black and white page , well I decide to check the source code
Alright something interesting an image that's linked to the attribute with a base64 encoded data type, so let's open this image on a new tab
I now need some milk, it was that easy and had 500 points
FLAG : UDOM{svg-thingcolor}
Given the description
This should be a tricky one, given a hint in robots.txt , so I followed up and used FFUF to grab the filename:
We already know that it's cgi-bin
, with the command : ffuf -w rockyou.txt -u http://193.122.147.103:9005/cgi-bin/FUZZ.sh
Found it! shelly.sh && shelly.cgi
This is well exploitable but with the help of a quick simple script from my buddy codaholi I was able to finish the job quick!
Now I run the script:
and it gave me a list of files but from it I was able to get the file I need
So now let's read our flag:
FLAG : UDOM{shell_shock_oldtime}
I'll skip the ENCODE category because all of them were pretty straight forward and easy so … i'll jump to MISC
Starting with this challenge named spellback , we are given a string }LLEWLLEPS_nac_uoy{MODU
:
FLAG : UDOM{you_can_SPELLWELL}
This is a fun one , and a challenging one as well, given 57ie9eb182943223bo0b4ej7f17c5e4cb6e
and we have to crack it to get the password and then embed the password in UDOM{password}
format, I first try to identify the hash and then I realize that the hash is actually corrupted or sort of …
Well basically it should be MD5 , so what I did I took an md5sum of a random file and then checked the length of it and then compared them
okay I now realize I have 3 characters that aren't supposed to be there and basically in a MD5 hash alogirthm we dont have some letters such as o
,j
,and i
, let's remove those and then crack the hash!
So now it identifies the hash as MD2,4,5
: 57e9eb182943223b0b4e7f17c5e4cb6e
i'll use an online hash cracker crackstation
And I got the password
FLAG : UDOM{MerryChristmas}
This was a quiet a challenge, given in the description an image which had nothing and a text GERM?Ekrpat{T3FXRAPE+
, so since it's written qwert I decided to try out keyboard change and then converted the text from a layout of Dvorak to Qwerty
FLAG : UDOM{Dvorak_K3YBOARD}
Given a string H4sICAVIx2EAA2FyZmcAC3Xx9612j/IMiA8ONzYOqeUCALTGXewRAAAA
that we have to get a flag from it , well i'm not speaking gibberish , so I sent the string straight to cyberchef :
FLAG : UDOM{GZIP_SW33T}
This challenge only had two solvers me and my bwoi codaholikid
Well it was a fun one actually , so basically we are given an image
but nothing I got from it , I tried binwalking over it but still nothing so then I decided to take the hash and go check it out on virustotal
FLAG : UDOM{TOTAL_virus}
We have this challenge made by my bwoi blackninja , we are given a wav file which has some weird tones inside it and the sounds from it tell me that it's Morse Code , So i directly went to an online morse code decoder
FLAG : WEW1SHM3RRYCHR1SMASSUDOMCYB3RCLUB
Also had two solvers me again and my bwoi @codaholikid , I solved it by guessing lol, but @codaholikid made a loop , I actually guessed a wordlist , since the description was Not everything can be found in rock
and we are given an image , that has something embedded in it with steghide
, so we have to crack the password with stegseek
So we got the password as x4ivygA51F
and the file is extracted as output.txt
but original name is flag.txt
FLAG : UDOM{st3ganography_1n_jpg_w1th_n0t_rockyou}
this was quiet a fun one! , given a file which doesn't have any format , and we have to get the flag , the description is Can you see something inside something?? You see, take me out...
Alright so i first download the image:
So we find a bunch of NO FLAG NO FLAG , let's dig a bit deep
we can see that there is a JFIF header covered overthere so let's use vim
to remove the NO FLAGs and then use eog
to view the image
alright we cleaned it! , so let's view it now
FLAG : UDOM{N0w_Y0u_know_How_bytes_begin_and_end_t0o}
This is another challenge only solved with me and buddy @codaholikid, uwiii, stuff is kinda challenging , hahaha so basically , the description says Can you see in the light?
and we are given a txt file , first thing I do is try and read it but as I do try to read it I came across something , like whitespace , then I realized yes it is whitespace but made with stegsnow, and it also has a password so I have to crack it with a wordlist:
So I wrote a simple script that will help me do the job , excuse my bad coding style :) but as long as it does the jOB then it is elite!
So I made a custom wordlist of mine with all words with merry
from rockyou.txt
and then named the wordlist as merryword.txt
that worked but the only problem is there are alot of results used from every password in the wordlist , so now i'll grep the result
FLAG : UDOM{SN0wcracker_wellDON3}
The description said get me!!!
, and then we are given a zip file
we unzip it we get some fils including .bash_history
which is interesting and we also get flag.txt
They tricked us!! , SHISH!, But I found something interesting ..
I got a pastebin link
From the link I followed the mega link and I downloaded an image , and from the image I was able to get the flag
FLAG : UDOM{its_called_OSINT}
I'll only write about 3 challenges in this category namely; EASY RSA
, MEDIUM RSA
, and Ben Olmstead
We are given a file named rsa.txt
which have information about our p
and q
and n
and of course our ciphertext c
and exponent ,so now this should be easy:
because we are given everything and we dont have to find any factor of n or anything we just have to create our N, I wrote a simple python script that will do all the Dual Prime RSA calculation and give us our plain text back:
Make sure you have xxd
installed , if you dont have you it you can install it with sudo apt-get install xxd
in debian and ubuntu system or pacman -S xxd
in arch based systems
So now let's run our script
┌─[tahaafarooq@cyberwarriors]─[~/Desktop/udomcyber_xmas/bytex/test]
└──╼ $file udom
udom: data
FLAG UDOM{qu1ck_s1mp3l_rsa_13377}
This one was a multi prime RSA challenge we were given rsa.txt
which had the following:
So I took the n
and used factordb to get the prime factors of the n
so as I could the the ps and qs
Okay we have a bunch of ps and qs, had quiet some problem into solving it but came accross a script on github and I edited it abit and I was able to get flag after executing
FLAG : UDOM{Y0U_GO0T_1T_MANY_PRIM3S_13377}
It has a description saying You cant win!!
but I guess I just knew what I was doing LOL, alright so we are given a file named weirdBase.txt
Alright I was scared , I was like "WHAT IS THE NAME OF HELL IS THIS???" but then I googled the name of the challenge and I came accross something similar:
It's a programming language that I didn't know it existed until I read about it now what to do with the weird string…, I took the string to dcode.fr and then it gave me a ping back that it's ASCII85
And from there I decoded the string and I got this:
this was another weird string and now my mind is curropting I'm like hold up what have I just done LOL, but i remembered about Malbolge programming language and I google a compiler for it and I was able to get an online compiler and run it
And I have the flag finally!!
FLAG : UDOM{malbolge_encoder}
I actually solved all challenges with ma buddy codaholikid, and got #1st with my buddy codaholi leading #2nd
Congrats to Nicholaus , Munojr, szdiof, and mrAlienx