Winja CTF Writeup
Cryptography
Esoteric
Flag: flag{es2o@t$e4r&i#c_code-most_difficult_to_program}
We were given with the text
D'`A^?]nIYXWE16Tvus1NpL-KlIH"hgDB{SRba=<)sxqYonsrqj0hPlkdcb(`Hd]#a`_A@VzZY;Qu87MqQP2HlLEiCHG@EDCBA:^!=6543Wx654-Q1qpM'&+*#G'&}|#z@~}_uts9ZYutslqpi/mlNMiha'_d]ba`_^W{[TYXWVOTSLp32HGLKDhBAF?>b%A:?87[543870T.-2+0)Mnm+$H(hg%${zy?}_{t:rq7otmrkj0ngledc)JIedcb[!B^]\UyYXWVU7Mqp3INMLEJCgGFE'=<A@?8\<;4z2V6/4-Q10po'&%I)('g%|{"!x>|{zsxwp6tmrqpi/POkjib(fe^F\"`Y^W{>=YXQu8TMLQPOHlLEJCBAeEDC<;:?8\<;{z8765.R2r*)(L9
I recognized it is malbolge esolang because I have seen this in some other CTFs. So I ran it in an online interpreter for malbolge and got the flag.
Steganography
Believe Your Eyes
Flag: flag{849d97fa58871dad45e81027f861739_maYB3_i_SHOULd_BELIeve-7HeM}
In the site for the challenge, I found this image:
So I ran some basic tools like strings
and exiftool
. When I inspected results got from the exiftool
I found the flag in the layers like flag{849d97fa58871dad4, _SHOULd_BELIeve-7HeM}, 5e81027f861739_maYB3_i
. But, they weren't in order so I reordered them and found the flag.
Hardy
Flag: flag{Di77icu8tyI9now@!!#-Youdidit!!}
Encoded text given with the challenge
This one was not so hard. It was just ciphers inside ciphers. Here is the order of the ciphers:
- Base58
- Morse Code
- Binary
- Decimal to ASCII
And here is the process in cyberchef.
Forensics
Anonymous
Flag: flag{LJryyYW8IbxuZrOcZ4nd-this-is-a-challenge}
In this challenge, you will get a zip file with someone's desktop files inside. So first i tried to find any suspicious files in the folders of the user crazy_crocodile
. So first I checked what files are there in the common directories like Picture/
, Documents/
, Music/
, Downloads/
, etc. But there wasn't any files in any of those directories. Then I tried to list all of the hidden directories and found .config/
directory which contained configuration files for google chrome. So I tried to look for any useful files there and I found the History
file in the Defaults/
folder in the google chrome folder. So I tried cat History
and found a google docs link. I tried visiting the link and tried to submit the title of the file wrapped with flag{}
as the flag and it was right!
Web
b74ass
Flag: flag{D@i7s#o89!0@v&e@_php_master}
I poked around the website for some times and found that if we supply ?debug
in the URL, we would get the source code of the project. And there I found that we need to make the variable final_string
to roseytherehappy
in order to get the flag. But, the PHP code removes every occurrence of roseytherehappy
with function preg_replace
. So how do we solve it? Well, the preg_replace
replaces exact word with nothing. So we could insert a roseytherehappy
inside any of the letters in the roseytherehappy
and it will replace it, and we will get the roseytherehappy
as value. So the payload will look like roseytherehapproseytherehappyy
. And the final URL will look like: https://jerry.winja.site/?value=roseytherehapproseytherehappyy