Information#
Version#
By | Version | Comment |
---|---|---|
noraj | 1.0 | Creation |
CTF#
- Name : angstromCTF 2017
- Website : angstromctf.com
- Type : Online
- Format : Jeopardy
- CTF Time : link
10 - The Beginning - Crypto#
Pxevhfx mh tgzlmkhfvmy. Px ahix rhn xgchr hnk vmy. tvmy{utvd_mh_max_ynmnkx}.
ROT 7:
Welcome to angstromctf. We hope you enjoy our ctf. actf{back_to_the_future}.
50 - Image Trickery - Forensics#
What do Twitch emotes have to do with a CTF? No idea, but there's a flag in here somewhere. kappa
With Stegsolve we can see a QR code un blue plane 0 or grey bit plane:
Using WebQR to solve the QR code we found a pastebin link: https://pastebin.com/S9De6WYA (I made a backup link).
The content is a base64 string but I'm not pasting it here as it is very long.
So let's decode it:
$ cat base64.txt| base64 -di > test
$ xxd -l32 test
00000000: 6461 7461 3a69 6d61 6765 2f73 7667 2b78 data:image/svg+x
00000010: 6d6c 3b62 6173 6536 342c 5044 3934 6257 ml;base64,PD94bW
Now it looks like a SVG image in base64. So I kept only the base64 image and removed data:image/svg+xml;base64,
. Then I extracted the image:
$ cat test | base64 -di > image.svg
Display it and read: actf{fa1L_F15H}
, we got the flag.
Note: again and ever, this is not Forensics but Steganography.
60 - Document - Forensics#
Defund wrecked his essay in a text editor to pretend that his file got corrupted.
Word's DOCX (Office Open XML) is just a zip containing some XML files.
Let's try to (partially) fix the archive:
$ zip -FF ./essay.docx --out fixed.zip
Fix archive (-FF) - salvage what can
zip warning: Missing end (EOCDR) signature - either this archive
is not readable or the end is damaged
Is this a single-disk archive? (y/n): y
Assuming single-disk archive
Scanning for entries...
copying: word/settings.xml (936 bytes)
copying: word/fontTable.xml (442 bytes)
copying: word/webSettings.xml (265 bytes)
copying: docProps/app.xml (308 bytes)
copying: docProps/core.xml (332 bytes)
copying: word/styles.xml (2799 bytes)
copying: word/document2.xml (2432 bytes)
copying: word/_rels/document2.xml.rels (232 bytes)
Now unzip it and look at word/document2.xml
:
cat word/document2.xml| grep -i actf
We can see actf{too_bad_for_zip_recovery
, just add the ending curly brace and you have the flag: actf{too_bad_for_zip_recovery}
.