Tenable CTF Writeup
WEB
Stay Away Creepy Crawlers
Find the flag where they keep the creepy crawlers away.
http://167.71.246.232/
Alternate: http://167.71.246.232:8080/
To find the subdirectory, use dirb
dirb http://167.71.246.232/
http://167.71.246.232/robots.txt
flag{mr_roboto}
Source of All Evil
Find the flag here:
http://167.71.246.232/
Alternate: http://167.71.246.232:8080/
Check out the source code and the flag is in comment line.
flag{best_implants_ever}
Can’t Find It
Find the flag here:
http://167.71.246.232/
Alternate: http://167.71.246.232:8080/
Check out the source code and there is a subdirectory as images.
http://167.71.246.232/images/ under this directory, we have the list of index for images subdirectory.
In this sub-directoy, try to list unlisted subdirectory.
http://167.71.246.232/images/flag
flag{404_oh_no}
Show Me What You Got
Find the “indexes” flag here: http://167.71.246.232/
Alternate: http://167.71.246.232:8080/
We knew that images subdirectory has two different file.
http://167.71.246.232/images/aljdi3sd.txt read the file.
flag{disable_directory_indexes}
Header For You Inspiration
Find the flag here: http://167.71.246.232/
Alternate: http://167.71.246.232:8080/
Send the request to Burp Suite and check out the response.
Alternate: Check out the source code and take a look Header.
flag{headersftw}
STEGO
Easy Stego
Can you find the flag?
Download blm1.png
I used the Stereogram Solver to analyze the image.
First of all, I changed the Offset value as 1 from Analyze tab and I had a RGB file.
Then I used Full Red, Full Green, Full Blue option and I had three different images.
flag{Bl4ck_liv3S_MATTER}
Hackerman
What’s the flag?
Download silly_hacker.svg
The file extension is SVG.
An SVG (Scalable Vector Graphics) file can opened by one of any browser or an image tool like Photoshop, Illustrator, or GIMP.
So that I used browser option and than search flag keyword.
flag{m1cr0dot}
Secret Images
We discovered Arasaka operatives sending wierd pictures to each other. It looks like they may contain secret data. Can you find it?
Download crypted1.png and crypted2.png
There are two images and have a same looks, so I used Image Combiner in Analyze tab on Stereogram Solver.
I used XOR option to combination.
flag{otp_reuse_fail}
CRYPTO
Easy Peasy
Find the flag here:
NzMgNzkgNmUgNzQgN2IgNzAgNjIgNjEgNzQgNjUgNmUgNjcgNjYgNWYgNmMgNjIgNjggNWYgNzQgNjIgNjcgNWYgN2EgNzIgN2Q=
I used CyberChef to decode.
- From Base64 to Hex
73 79 6e 74 7b 70 62 61 74 65 6e 67 66 5f 6c 62 68 5f 74 62 67 5f 7a 72 7d - From Hex to Text
synt{pbatengf_lbh_tbg_zr} - ROT 13
flag{congrats_you_got_me}
MISC
Esoteric
Find the flag here:
--[----->+<]>.++++++.-----------.++++++.[----->+<]>.----.---.+++[->+++<]>+.-------.++++++++++.++++++++++.++[->+++<]>.+++.[--->+<]>----.+++[->+++<]>++.++++++++.+++++.--------.-[--->+<]>--.+[->+++<]>+.++++++++.>--[-->+++<]>.
To understand what this code is, I made a plenty of research.
- I searched as “What is esoteric”, “Esoteric cryptography”, “Esoteric coding”.
- I found a clue while researching as “Esoteric coding”.
- Esoteric coding is “An esoteric programming language is a programming language designed to test the boundaries of computer programming language design, as a proof of concept, as software art, as a hacking interface to another language, or as a joke.”.
- And the I found the answer, this coding is Brainfuck.
- Brainfuck is “an esoteric programming language created in 1993 by Urban Müller. Notable for its extreme minimalism, the language consists of only eight simple commands and an instruction pointer. While it is fully Turing complete, it is not intended for practical use, but to challenge and amuse programmers.”.
- The main issue was I don’t know how to decode it and I found this website.
flag{wtf_is_brainfuck}
Reggie McRegex
Find the flag in the attached file containing a haystack. Not including the quotes, the flag will be in the format of “flag{here_is_a_flag}”. The text between the curly braces can consist of lowercase characters and underscores and be a maximum length of 16. You’ll know it when you see it.
Download haystack.txt
I opened the file by LibreOffice and there were 1555 pages, 726 words, 7.257.622 characters, and it is hard to find answer if you think read all of them.
We have three clues given in the question:
- The answer must be start as “flag{“.
- The length of answer must be 16 between the curly braces.
- The answer must be end as “}”.
Firstly, I run grep -o -e '.....................}\b' haystack.txt > haystackv1.txt
to extract ending with "}" and included "flag{".
Dot means number of character in the answer with flag{.
Then, I run grep -o -e '\bflag{.................' haystackv1.txt
to find which value start with "flag{".
Dot means number of character in the answer with }.
flag{thy_flag_is_this}
Quit Messing With My Flags
This flag had an accident. What’s it really supposed to be?
flag{161EBD7D45089B3446EE4E0D86DBCF92}
I copied and pasted the value on Google Search, it’s MD5 and decode it.
flag{P@ssw0rd}
Find The Encoding
DeZmqMUkDJceycJHJPzZet
I used CyberChef to understand what is encoding and it’s Base58.
flag{not_base64}