angstromCTF 2017 - Write-ups

Information#

Version#

By Version Comment
noraj 1.0 Creation

CTF#

  • Name : angstromCTF 2017
  • Website : angstromctf.com
  • Type : Online
  • Format : Jeopardy
  • CTF Time : link

10 - The Beginning - Crypto#

Pxevhfx mh tgzlmkhfvmy. Px ahix rhn xgchr hnk vmy. tvmy{utvd_mh_max_ynmnkx}.

ROT 7:

Welcome to angstromctf. We hope you enjoy our ctf. actf{back_to_the_future}.

50 - Image Trickery - Forensics#

What do Twitch emotes have to do with a CTF? No idea, but there's a flag in here somewhere. kappa

With Stegsolve we can see a QR code un blue plane 0 or grey bit plane:

blue plane 0 grey bit plane

Using WebQR to solve the QR code we found a pastebin link: https://pastebin.com/S9De6WYA (I made a backup link).

The content is a base64 string but I'm not pasting it here as it is very long.

So let's decode it:

$ cat base64.txt| base64 -di > test

$ xxd -l32 test
00000000: 6461 7461 3a69 6d61 6765 2f73 7667 2b78  data:image/svg+x
00000010: 6d6c 3b62 6173 6536 342c 5044 3934 6257  ml;base64,PD94bW

Now it looks like a SVG image in base64. So I kept only the base64 image and removed data:image/svg+xml;base64,. Then I extracted the image:

$ cat test | base64 -di > image.svg

Display it and read: actf{fa1L_F15H}, we got the flag.

Note: again and ever, this is not Forensics but Steganography.

60 - Document - Forensics#

Defund wrecked his essay in a text editor to pretend that his file got corrupted.

Word's DOCX (Office Open XML) is just a zip containing some XML files.

Let's try to (partially) fix the archive:

$ zip -FF ./essay.docx --out fixed.zip
Fix archive (-FF) - salvage what can
	zip warning: Missing end (EOCDR) signature - either this archive
                     is not readable or the end is damaged
Is this a single-disk archive?  (y/n): y
  Assuming single-disk archive
Scanning for entries...
 copying: word/settings.xml  (936 bytes)
 copying: word/fontTable.xml  (442 bytes)
 copying: word/webSettings.xml  (265 bytes)
 copying: docProps/app.xml  (308 bytes)
 copying: docProps/core.xml  (332 bytes)
 copying: word/styles.xml  (2799 bytes)
 copying: word/document2.xml  (2432 bytes)
 copying: word/_rels/document2.xml.rels  (232 bytes)

Now unzip it and look at word/document2.xml:

cat word/document2.xml| grep -i actf

We can see actf{too_bad_for_zip_recovery, just add the ending curly brace and you have the flag: actf{too_bad_for_zip_recovery}.

Share