NepHack 3.0 Walkthrough
NepHack is an annual Jeopardy-style Capture the Flag (CTF) competition with a set of tasks/challenges that reveal clues that guide the participant in solving various kind of technical challenges.
I decided to join NepHack 3.0 as I was very new to the cyber-security community and wanted to make some friends.
The competition started in 25th January 2020 at 10 am GMT+545 and ended on 26th January at 5.
Here is the brief walkthrough to the challenges and their solutions that were presented in NepHack 3.0.
P.s I am a complete beginner thus my methodologies might differ completely from the experts, feel free to correct me if I am wrong and feedbacks.
We will be starting from fairly easy ones and do others in no particular order.
FORENSICS ->Crockford
It seems like the text is encrypted in Crockford Base 32 encoding.
CDWPWTB3C5P5YSKCC5KQPRVJDXHPPSKFE9J76BB2C5SPACSJBXYG
If we Google Crockford decipher and navigate to the website, Crockford Base32 Decoder
RECON > SOCIAL
So what comes in our mind when we hear the word social?
Facebook, right.
So the organizer of the event were Cynical Technology.
So we need to check their facebook page.
Cynical’s Facebook Page
And if we head to About Us section,
We get something like this,
The text looks like encoded in base64, so we decode it using following bash script.
echo ‘Y3luaWNhbF9mbGFne1dlX0xvdmUtU29jaWFsX01lZGlhfQ’ | base64 -d
we get the flag,
cynical_flag{We_Love-Social_Media}
CRYPTO -> ROOT
So inside the root.txt file, we get the following text.
Pvcure grkg vf grpuavdhr bar bs gur rneyvrfg naq fvzcyrfg zrgubq bs rapelcgvba grpuavdhr. Vg’f fvzcyl n glcr bs fhofgvghgvba pvcure{plavpny_synt}>>plavpny_synt{Pvcure_grkg_jr_ner_ureb}.Erghea gur arj fgevat trarengrq.
So the text looks like encoded with ROT13 algorithm. and if we decode that using website ROT13 Decoder .
We get the flag, cynical_flag{Cipher_text_we_are_hero}
RECON -> Do you know?
So we see in another challenge named Sub-ject, we can see something like this,
So we get the flag as, cynical_flag{bugv.io}
MISC -> Look
So we get the file look.zip
Inside the look.zip , it looks as if there are 200+ folders and each with a flag.txt inside them.
We need to look into all sub-folders and all the flag.txt files,
We can do this using following bash script,
cat -A look.zip | grep cynical_flag
and we get the flag as,
cynical_flag{you_made_it_through_maze}
MISC -> Math Genius
So from the description, the first number looks like a DMS link. We can open website using DMS link as, http://<DMS-Number>
It is quite impossible for us to enter the value manually .
We use following script written in JavaScript and spam the script in console 10 or more times .
num1 = parseInt(document.querySelectorAll(“form span”)[1].innerHTML);
num2 = parseInt(document.querySelectorAll(“form span”)[3].innerHTML);
sign = document.querySelectorAll(“form span”)[2].innerHTML; sign = sign.trim(); result =””;
if(sign==’+’){
result = num1+num2; }
else if(sign==’-’){
result = num1-num2; }
else if(sign==’*’){
result = num1*num2; }
else if(sign==’/’){
result = num1/num2; }
else if(sign==’%’){
result = num1%num2; }
document.querySelectorAll(“form input”)[1].value=result;
document.querySelector(“button”).click();
and Voila!!! The flag is there
TBC