NO ESCAPE CTF 2022
https://ctftime.org/event/1822
CHALL’S
Category | Challenges |
---|---|
MISC | Welcome to NECTF |
MISC | Bad Cake |
MISC | Santa’s Key |
MISC | Star of Bethlehem |
GITHUB | Entrance Exam |
FORENSICS | X-mas Carol |
PWN | The Real Santa |
OSINT | X-mas Castle |
TRIVIA | Smart Brains |
Welcome to NECTF
Just inspect it CTRL
+ SHIFT
+ I
FLAG
NECTF{w3LC0M3_t0_N3CTF}
Bad Cake
Here’s the source of the badcake.dat
file
I just realised there’s a PNG information in .dat
file so I accidentaly convert into a .png
format, and how unexpected the .png
file contain a image of QR-Code
After scanning the QR-Code here’s the result, there’s message in base64
Then after I decoded base64, we got Hex output
We can use https://asciitohex.com to decoded Hex into ASCII
FLAG
NECTF{TH1$_1$_Y0UR_GO0D_C@K3}
Santa’s Key
We given a python file called incorrect.py
After I execute that python file, we got an error message that we need to encrypt the Hexadecimal numbers.
The solution is, We need to rewrite the code and changes some code, and here’s the result of code to get output like this
FLAG
NECTF{S@nTa's_k3y_h3r3}
Star of Bethlehem
All we need to do it’s just check the list of strings of that BrightStar ELF Shared Library
file ,
using strings
command to solve this chall. Then we can found the flag
Got ya.. flag!!
FLAG
NECTF{STaR_Of_BeTheLeHeM}
Entrance Exam
https://github.com/NOESCAPECTF-LIVE/Welcome_to_NoEscape_EntranceExam
There is a python file calleded intro.py, let’s go ahead run it
Just decode from Hex into ASCII using https://asciitohex.com
Here’s the result https://classroom.github.com/a/moOw9e6t
We need to enroll that classroom assignment, just Accept it
And that was a flag!
FLAG
NECTF{C0ng@T$,Y0u_R_3nr0l13d}
X-mas Carol
We given a file .mp3
the audio, and is just a ordinary song of christmas, and there’s a strange corrupt voice or maybe something information.
So I decided to using Audio Tools - Sonic Visulizer to see any information of the audio, and it doesn’t help us.
I tried to see strings of the Audio file, not just a default string of the audio, I found a many of text NECTF in the file.
Look.. there’s a .txt
file on the last chunk of the image strings.
I extracted using binwalk
and it’s true, the chall image contain of carol.txt
file, then I opened that and Found the Flag.
FLAG
NECTF{J1ngl3s_@alL_th3_wAy}
The Real Santa
We given a binary elf file called realSanta
, I thought that this chall was difficult, however it’s not.
Just open the IDA debugger and we’ve got the part of the Flag
FLAG
NECTF{EUR3KA}
X-mas Castle
We given an image of place and we need to identify visual of that image, so I just search it using Google Lens and we got the Place, is Santa Bárbara
I was submitted the flag just using NECTF{santa_bárbara}
and it’s wrong, the actual flag it’s include castle
string
FLAG :
NECTF{santa_bárbara_castle}
Smart Brains
mhsn pz olyl vusf. Qbza zbitpa.
Just decode it using https://www.dcode.fr/caesar-cipher and you get the result part of the flag of any rot decode,
FLAG
NECTF{falg}