본문 바로가기

#CTF 2021

Shakti CTF 2021 write up

반응형

토요일, 03 4 2021, 06:30 UTC — 일요일, 04 4 2021, 18:30 UTC

 

[Forensics]

 

 

 

chall.png

 

If you look at HxD, you can see that there are two header signatures.

So, I was delete one header signature.

 

 

Flag : shaktictf{Y0U_4R3_aM4z1nG!!!!}

 


 

 

There are several packets with a 'pastebin address'.

One of them are real flag.

 

Flag : shaktictf{Th15_w4s_eA5Y!!}

 


 

 

strings network2.pcapng

I got some numbers.

 

 

 

Change decimal numbers to ASCII characters.

 

 

Then change the ascii text to base64.

.... I got fake flag.. 'n0tth4tea5y'

 

I can see many website address packet in wireshark.

One of them is strange. 'TUtxt.galf' 

reversereverse this text.

flag.txt!!

 

change the ascii to raw and reverse.

f=open("reverse hex.txt")

data=f.read().split(' ')
print(' '.join(reversed(data)))

flag.zip file save. 

The file has a password.

The password is fake flag!!!

pw : n0tth4tea5y

 

Flag : shaktictf{g00d_lUcK_4_tH3_n3xT_cH411eNg3}

 


 

 

The file has wrong header signature and IDAT chunks.

 

png header signature : 89 50 4E 47 0D 0A 1A 0A

IDAT : 49 44 41 54

 

Flag : shaktictf{Y4YyyyY_y0u_g0t_1T}

 


Check cmdscan among the Volatility options, there is base64 strings.

 

I got part 1 flag.

 

filescan | grep Part

I found Part 2.png file.

dumpfiles Part 2.png

 

zsteg -a part2.png

so I got part2 flag.

 

 

 

반응형

'#CTF 2021' 카테고리의 다른 글

UMDCTF 2021 write up  (0) 2021.04.19
RITSEC CTF 2021 Write up  (0) 2021.04.11
Tenable CTF 2021 write up  (0) 2021.02.23
SecureBug CTF 2021 write up  (0) 2021.02.19
TrollCAT CTF 2021 write up(2)  (0) 2021.02.07