Skip to content

Instantly share code, notes, and snippets.

@parksjin01
Last active March 9, 2017 07:59
Show Gist options
  • Select an option

  • Save parksjin01/05e2877ec076abb3b8d000eb0cfa5d7f to your computer and use it in GitHub Desktop.

Select an option

Save parksjin01/05e2877ec076abb3b8d000eb0cfa5d7f to your computer and use it in GitHub Desktop.
Pragyan_CTF 2016 writeup

every_body_is_winner

  • It's bonus prob. Flag is in txt file
  • Flag is igotapoint

Look at these colours

  • If you open png file there are gray-black lines. It's very strange.
  • If you check that lines rbg value and translate it to ascii you can get the flag is [115, 84, 101, 103, 97, 110, 48, 103, 114, 97, 112, 104, 121]
  • Flag is sTegan0graphy

Harry-poter

  • If you open png you can just see letter harry-porter. If you check how many colors used, it's more than two.
  • We can guess 2 methods to solve it.
  • First similar with Look at these colours problem, generate sentence from used color.
  • Second change Non black or white colors to black.
  • Last open file with hex editor.
  • Answer is open image with hex editor. At the end of file there are flags.
  • Flag is wherE ShOUld onE ReaLly lOoK fOr tHis flag(I'm not sure it's right)

BAIL cipher

  • In hint it saids BAIL cipher is made up with Base encoding and Rail cipher.
  • If we first decode Base64 then decode Rail cipher we can get flag
  • Flag is xwxlQW02mu4FOjvb9hF5

I Agree

  • In hint it saids this is used upgrade version of caesar cipher. If you googling this you can know that cipher is vigenere cipher
  • Flag is theforceisstrongwiththisone

B_THE_B05S

  • First you need to input 8 parameters.
  • Parameter should be 'B'.
  • I used B B B B BBBBBBBBBBB B B B as parameter
  • Flag is xfaddBaseqcX

johny

  • If you try to open zip file, it saids type password.
  • Crack zip file password with john the ripper(JtR tool)

crack this

  • If you open problem file with hex editor you can see 1F8B08 which is magic number for gz file
  • Add gz extension to file and unzip it.
  • I couldn't find any more hint so googling it I found my file was wierd. Actually if you unzip then problem.pcap and Clue.txt file will be generated.
  • In pcap file you can know rukgzuzfiuypreymqcja is send.
  • Now we have to decrypt it and It used Portra encryption. Key is localhost so if you decrypt it then you can get key
  • Flag is maytheforcebewithyou
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment