-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathindex.html
186 lines (131 loc) · 8.4 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
<!DOCTYPE html>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<!-- Begin Jekyll SEO tag v2.5.0 -->
<title>secarmy-CTF-2.0 | Writeups of secarmy CTF 2.0</title>
<link rel=stylesheet href="style.css" >
<meta name="generator" content="Jekyll v3.8.5" />
<meta property="og:title" content="secarmy-CTF-2.0" />
<meta property="og:locale" content="en_US" />
<meta name="description" content="Writeups of secarmy CTF 2.0" />
<meta property="og:description" content="Writeups of secarmy CTF 2.0" />
<link rel="canonical" href="https://madhusudanbabar.github.io/secarmy-CTF-2.0/" />
<meta property="og:url" content="https://madhusudanbabar.github.io/secarmy-CTF-2.0/" />
<meta property="og:site_name" content="secarmy-CTF-2.0" />
<script type="application/ld+json">
{"headline":"secarmy-CTF-2.0","@type":"WebSite","url":"https://madhusudanbabar.github.io/secarmy-CTF-2.0/","name":"secarmy-CTF-2.0","description":"Writeups of secarmy CTF 2.0","@context":"http://schema.org"}</script>
<!-- End Jekyll SEO tag -->
<link rel="stylesheet" href="/secarmy-CTF-2.0/assets/css/style.css?v=a1cf2c67b4ff539274dd0d0d8c1ed5f390a46731">
</head>
<body>
<div class="container-lg px-3 my-5 markdown-body">
<h1 class="title" id="secarmy-ctf-20">secarmy-CTF-2.0</h1>
<p>Writeups of secarmy CTF 2.0
my team : Krypton</p>
<p>Originally posted at: <a href="https://madhusudan.live/blog/secarmy-ctf-2-0" >madhusudan.live</a></p>
<h3 class="category" id="welcome">welcome</h3>
<h4 class="challenge" id="1-welcome-all">1) Welcome All</h4>
<p class="flag"> flag : secarmy{w3lc0me_y0u_all}</p>
<p><img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/welcome.png" alt="Welcome All" /></p>
<h4 class="challenge" id="2-netcat">2) Netcat</h4>
<p class="flag"> flag : secarmy{W3lc0m3_T0_S3c4RmyC7F0x02}</p>
<p><img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/welcome%20nc.png" alt="netcat" /></p>
<p> 3) InstaFamous
<p class="flag"> flag : secarmy{w3lc0me_1n$t@_f@m1ly}</p>
<p><img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/Welcomeinstafamous.jpg" alt="instafamous" /></p>
<h3 class="category" id="starters">starters</h3>
<h4 class="challenge" id="1-168">1) “16+8”</h4>
<p class="flag"> flag : secarmy{Num3er_sys73m}</p>
<p>we have given two files with numbers in it </p>
1 ) <pre> 73 65 63 61 72 6d 79 7b</p> </pre>
2 ) <pre> 116 165 155 63 145 162 137 163 171 163 67 63 155 175 </pre>
<p>as the name suggests the first part was hex and the second was octal so doing a simple conversion we got the flag</p>
<h4 class="challenge" id="2-die-basis">2) Die basis</h4>
<p class="flag"> flag : secarmy{fl@g_1s__th3_b@s3}</p>
<p> two files given </p>
1) <pre> ********c2VjYXJteXtmbEBnXzFzXw==******* </pre>
2) <pre> **********L52GQM27MJAHGM35********* </pre>
<p>the first one was base64 and the second one was base32 encoded</p>
<h4 class="challenge" id="3-easy-capture">3) Easy capture</h4>
<p class="flag"> flag : secarmy{h3r3_y0u_c@ptur3} </p>
<p> one’s and zeroes to be converted to text</p>
<pre>01110011 01100101 01100011 01100001 01110010 01101101 01111001 01111011 01101000
00110011 01110010 00110011 01011111 01111001 00110000 01110101 01011111 01100011
01000000 01110000 01110100 01110101 01110010 00110011 01111101</pre>
<h4 class="challenge" id="4-image">4) Image</h4>
<p class="flag"> flag : secarmy{th3_im@ge_s4ys_i7_a11}</p>
<p>doing a simple zsteg revealed the flag</p>
<p><img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/Starters%20Image.png" alt="here's the image" /></p>
<h4 class="challenge" id="5-th3-g1f7">5) Th3 G1f7</h4>
<p class="flag"> flag : secarmy{h3re_1s_th3_g1ft}</p>
<p>same thing again the flag was revealed by a zsteg</p>
<p><img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/Starters%20the%20gift.png" alt="the gift" /></p>
<h3 class="category" id="forensics">forensics</h3>
<h4 class="challenge" id="its-all-in-your-head">its all in your head</h4>
<p class="flag"> flag : secarmy{h3ad3rs_t3ll_a_l0t}</p>
<p>a corrupted png <a href=https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/forensics%20head%20orig.png>file</a> was given</p>
<p>so i tried hexdump but the magic bytes were different from png so i changed them with hexedit which revealed the flag.
<img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/forensics%20head%20flag.png" alt="flag" /></p>
<h4 class="challenge" id="secret">secret</h4>
<p class="flag"> flag : secarmy{ain’t_visible?}</p>
<p> <a href=https://github.com/madhusudanbabar/secarmy-CTF-2.0/raw/master/Secret.pdf>here's</a> the pdf </p>
<p>a pdf with a username and a password hidden by asterisks
after using pdftotext tool the flag was found</p>
<h4 class="challenge" id="the-confusion">the confusion</h4>
<p class="flag"> flag : secarmy{WA3_I7_s0_c0nfu3ing}</p>
<p>flag was split and hidden in two images
the first part was ROT13 and second was ROT47</p>
<h4 class="challenge" id="the-bin">the bin</h4>
<p class="flag"> flag : secarmy{PAST3_B1N_H@S_S0LUT10N}</p>
<table>
<tbody>
<tr>
<td> <pre>here you have the flag :- 61 48 52 30 63 48 4d 36 4c 79 39 77 59 58 4e 30 5a 57 4a 70 62 69 35 6a 62 32 30 76 54 45 30 35 63 57 56 33 64 57 6b 3d </pre></td>
<td> <pre>61 48 52 30 63 48 4d 36 4c 79 39 77 59 58 4e 30 5a 57 4a 70 62 69 35 6a 62 32 30 76 57 6d 52 71 54 6a 6 </pre></td>
</tr>
</tbody>
</table>
<p>hex to text conversion gave two links of pastebin out of which the second one was working flag</p>
<h4 class="challenge" id="save-them">Save them</h4>
<p class="flag"> flag : secarmy{PAST3_B1N_H@S_S0LUT10N}</p>
<h3 class="category" id="binaryreversing">Binary/Reversing</h3>
<h4 class="challenge" id="stringy">Stringy</h4>
<p class="flag"> flag : secarmy{l00k_a7_th3_str1ng5!!}</p>
<p > <a href=https://github.com/madhusudanbabar/secarmy-CTF-2.0/raw/master/stringy>here's</a> the binary</p>
<p>as the name suggests i did strings on the elf which gave me some weird strings
c2VjYXJtH
eXtsMDBrH
X2E3X3RoH
M19zdHIxH
bmc1ISF9H</p>
<p>i tried base64 but it didnt worked then i removed the H at the end and it gave me flag</p>
<h4 class="challenge" id="smash-it">Smash it</h4>
<p class="flag"> flag : secarmy{sm@sh1ng_st@ck_1s_t00_much_fun} </p>
<p> <a href=https://github.com/madhusudanbabar/secarmy-CTF-2.0/raw/master/smash>here’s</a> the binary</p>
<p><img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/binary%20smashit.png" alt="flag " /></p>
<h4 class="challenge" id="f-l-a-s-h">F-L-A-S-H</h4>
<p class="flag"> flag : secarmy{7h1s_w45_345y_p34zy}</p>
<p> <a href=https://github.com/madhusudanbabar/secarmy-CTF-2.0/raw/master/F-L-A-S-H>here’s</a> the binary </p>
<img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/binary%20flash%20flag.png" alt="flag" />
<h4 class="challenge" id="backyard-cow">backyard cow</h4>
<p class="flag"> flag : secarmy{d0<em>y0u_l1k3_c0w_languag3</em>___?}</p>
<p><a href=https://github.com/madhusudanbabar/secarmy-CTF-2.0/raw/master/moo>here’s</a> the binary </p>
<p>on reversing it with radare2 gave me a link to google drive file which has moo written everywhere, then i decoded it with <strong>cow interpreter</strong></p>
<p><img class="img" src="https://raw.githubusercontent.com/madhusudanbabar/secarmy-CTF-2.0/master/binary%20backyardcowflag.png" alt="flag" /></p>
<h3 class="category" id="web">web</h3>
<h4 class="challenge" id="prizes">prizes</h4>
<p class="flag"> flag : secarmy{s0urc3_i5_n3ces5ary}</p>
<h4 class="challenge" id="web_salad">web_salad</h4>
<p class="flag"> flag : secarmy{w3b_buck3t_3nc0un7er3d}</p>
<h4 class="challenge" id="cookie-bank">Cookie Bank</h4>
<p class="flag"> flag : secarmy{the_$hy_c00kie_w1th1n}</p>
<h4 class="challenge" id="silly-mangolian-20">silly mangolian 2.0</h4>
<p class="flag"> flag : secarmy{why_1s_th1s_m0ng0li@n_$uch_@_f00l}</p>
</div>
<script src="https://cdnjs.cloudflare.com/ajax/libs/anchor-js/4.1.0/anchor.min.js" integrity="sha256-lZaRhKri35AyJSypXXs4o6OPFTbTmUoltBbDCbdzegg=" crossorigin="anonymous"></script>
<script>anchors.add();</script>
</body>
</html>