CTF Writeups

Explore our collection of 126 posts for Capture The Flag writeups and technical guides created by the members and executives of MQCyberSec.

Browse by Section

Filter by Tags

caas
caas
PicoCTF icon PicoCTF web

caas

Now presenting cowsay as a service https://caas.mars.picoctf.net/

medium #command-injection
• by sealldev
Cookies
Cookies
PicoCTF icon PicoCTF web

Cookies

Who doesn't love cookies? Try to figure out the best one. http://mercury.picoctf.net:17781/

easy
• by sealldev
findme
findme
PicoCTF icon PicoCTF web

findme

Help us test the form by submiting the username as `test` and password as `test!` Hint: any redirections?

medium #cyberchef
• by sealldev
GET aHEAD
PicoCTF icon PicoCTF web

GET aHEAD

Find the flag being held on this server to get ahead of the competition http://mercury.picoctf.net:28916/ Hint: Maybe you have more than 2 choices Hint: Check out tools like Burpsuite to modify your requests and look at the responses

easy
• by sealldev
Information
Information
PicoCTF icon PicoCTF forensics

Information

Files can always be changed in a secret way. Can you find the flag? Hint: Look at the details of the file Hint: Make sure to submit the flag as `picoCTF{XXXXX}`

easy #exif #cyberchef
• by sealldev
IntroToBurp
IntroToBurp
PicoCTF icon PicoCTF web

IntroToBurp

Try here to find the flag Hint: Try using burpsuite to intercept request to capture the flag. Hint: Try mangling the request, maybe their server-side code doesn't handle malformed requests very well.

easy
• by sealldev
JAuth
JAuth
PicoCTF icon PicoCTF web

JAuth

Most web application developers use third party components without testing their security. Some of the past affected companies are: Equifax (a US credit bureau organization) - breach due to unpatched Apache Struts web framework CVE-2017-5638 Mossack Fonesca (Panama Papers law firm) breach - unpatched version of Drupal CMS used VerticalScope (internet media company) - outdated version of vBulletin forum software used Can you identify the components and exploit the vulnerable one? Can you become an `admin`? You can login as `test` with the password `Test123!` to get started. Hint: Use the web browser tools to check out the JWT cookie. Hint: The JWT should always have two (2) . separators.

medium #jwt
• by sealldev
JaWT Scratchpad
JaWT Scratchpad
PicoCTF icon PicoCTF web

JaWT Scratchpad

Check the admin scratchpad! https://jupiter.challenges.picoctf.org/problem/58210/ or http://jupiter.challenges.picoctf.org:58210 Hint: What is that cookie? Hint: Have you heard of JWT?

medium #hash-cracking #dictionary-attack #jwt
• by sealldev
Mob psycho
Mob psycho
PicoCTF icon PicoCTF forensics

Mob psycho

Can you handle APKs?

medium #jadx #cyberchef
• by sealldev
Secret of the Polyglot
Secret of the Polyglot
PicoCTF icon PicoCTF forensics

Secret of the Polyglot

The Network Operations Center (NOC) of your local institution picked up a suspicious file, they're getting conflicting information on what type of file it is. They've brought you in as an external expert to examine the file. Can you extract all the information from this strange file? Hint: This problem can be solved by just opening the file in different ways

easy
• by sealldev
Secrets
Secrets
PicoCTF icon PicoCTF web

Secrets

We have several pages hidden. Can you find the one with the flag? The website is running here. Hint: folders folders folders

medium
• by sealldev
Hack the Bot 2 / PwnMe Quals 2025
Hack the Bot 2
🚩 CTFs PwnMe Quals 2025 web

Hack the Bot 2

I've developed a little application to help me with my pentest missions, with lots of useful payloads! I even let users add new payloads, but since I was in a rush I didn't have time to test the security of my application, could you take care of it?

#remote-code-execution
• by sealldev
DNSXSS-over-HTTPS / KalmarCTF 2025
DNSXSS-over-HTTPS
🚩 CTFs KalmarCTF 2025 web

DNSXSS-over-HTTPS

Do you like DNS-over-HTTPS? Well, I'm proxying `https://dns.google/`! Would be cool if you can find an XSS! Report to admin locally: `curl http://localhost:8008/report -H "Content-Type: application/json" -d '{"url":"http://proxy/"}'` Report to admin for the real flag: `curl https://dnxss.chal-kalmarc.tf/report -H "Content-Type: application/json" -d '{"url":"http://proxy/"}'` `https://dnxss.chal-kalmarc.tf/`

#xss #cyberchef
• by sealldev
Ez ⛳ v3 / KalmarCTF 2025
Ez ⛳ v3
🚩 CTFs KalmarCTF 2025 web

Ez ⛳ v3

To get the flag, you need: the mTLS cert, connecting from localhost, ... and break physics? Should be easy! Challenge note: the handout files contains `tls internal` while the hosted challenge mostly use real TLS. NOTE: Remote is working as intended! Even with the redirects.

#authentication-bypass #ssti
• by sealldev
KalmarNotes / KalmarCTF 2025
KalmarNotes
🚩 CTFs KalmarCTF 2025 web

KalmarNotes

Every CTF needs a note taking challenge, here is ours.

#cache-poisoning #xss #csrf
• by sealldev
RWX Bronze / KalmarCTF 2025
RWX Bronze
🚩 CTFs KalmarCTF 2025 misc

RWX Bronze

We give you file read, file write and code execution. But can you get the flag? Let's start out gently. NOTE: If you get a 404 error, try using one of the endpoints described in the handout!

• by sealldev
RWX Silver / KalmarCTF 2025
RWX Silver
🚩 CTFs KalmarCTF 2025 misc

RWX Silver

We give you file read, file write and code execution. But can you get the flag? Apparently that was too much!

• by sealldev
CanYouSee
CanYouSee
PicoCTF icon PicoCTF forensics

CanYouSee

How about some hide and seek?

easy #exif #cyberchef
• by sealldev
Glory of the Garden
Glory of the Garden
PicoCTF icon PicoCTF forensics

Glory of the Garden

This garden contains more than it seems.

easy #exif
• by sealldev
Scan Surprise
Scan Surprise
PicoCTF icon PicoCTF forensics

Scan Surprise

I've gotten bored of handing out flags as text. Wouldn't it be cool if they were an image instead?

easy
• by sealldev
Square Power / PwnMe Quals 2025
Square Power
🚩 CTFs PwnMe Quals 2025 cryptography

Square Power

Using p or N is outdated, let's square N!

• by tulip & h8ckjv
Binary Search
PicoCTF icon PicoCTF general skill

Binary Search

Want to play a game? As you use more of the shell, you might be interested in how they work! Binary search is a classic algorithm used to quickly find an item in a sorted list. Can you find the flag? You'll have 1000 possibilities and only 10 guesses. Cyber security often has a huge amount of data to look through - from logs, vulnerability reports, and forensics. Practicing the fundamentals manually might help you in the future when you have to write your own tools!

easy
• by sclux7
dont-you-love-banners
PicoCTF icon PicoCTF general skill

dont-you-love-banners

Can you abuse the banner?

medium
• by sclux7
PW Crack 4
PicoCTF icon PicoCTF general skill

PW Crack 4

Can you crack the password to get the flag? Download the password checker here and you'll need the encrypted flag and the hash in the same directory too. There are 100 potential passwords with only 1 being correct. You can find these by examining the password checker script.

medium
• by sclux7
serpentine
PicoCTF icon PicoCTF general skill

serpentine

Find the flag in the Python script!

medium
• by sclux7
Key Exchange / KashiCTF 2025
Key Exchange
🚩 CTFs KashiCTF 2025 cryptography

Key Exchange

Someone wants to send you a message. But they want something from you first.

• by tulip
Easy Diffy / PwnMe Quals 2025
Easy Diffy
🚩 CTFs PwnMe Quals 2025 cryptography

Easy Diffy

I managed to generate strong parameters for our diffie-hellman key exchange, i think my message is now safe.

• by tulip
Hack the Bot 1 / PwnMe Quals 2025
Hack the Bot 1
🚩 CTFs PwnMe Quals 2025 web

Hack the Bot 1

I've developed a little application to help me with my pentest missions, with lots of useful payloads! I even let users add new payloads, but since I was in a rush I didn't have time to test the security of my application, could you take care of it ?

#xss
• by sealldev & Solopie
Mafia at the End of the Block 1 / PwnMe Quals 2025
Mafia at the End of the Block 1
🚩 CTFs PwnMe Quals 2025 misc

Mafia at the End of the Block 1

You're an agent, your unit recently intercepted a mob discussion about an event that's going to take place on August 8, 2024. You already know the location, though. A password for the event was mentioned. Your job is to find it and return it so that an agent can go to the scene and collect evidence. Note : The contract is deployed on sepolia network

#network-forensics
• by Ch1maera & sealldev
Say My Name / PwnMe Quals 2025
Say My Name
🚩 CTFs PwnMe Quals 2025 web

Say My Name

Just printing your name, what could go wrong ?

#xss #format-string
• by sealldev & Solopie
Corporate Life 1 / KashiCTF 2025
Corporate Life 1
🚩 CTFs KashiCTF 2025 web

Corporate Life 1

The Request Management App is used to view all pending requests for each user. It’s a pretty basic website, though I heard they were working on something new. Anyway, did you know that one of the disgruntled employees shared some company secrets on the Requests Management App, but it's status was set denied before I could see it. Please find out what it was and spill the tea!

#sql-injection
• by sealldev
Corporate Life 2 / KashiCTF 2025
Corporate Life 2
🚩 CTFs KashiCTF 2025 web

Corporate Life 2

The disgruntled employee also stashed some company secrets deep within the database, can you find them out?

#sql-injection
• by sealldev
Easy Jail 2 / KashiCTF 2025
Easy Jail 2
🚩 CTFs KashiCTF 2025 misc

Easy Jail 2

I made a completely secure calculator this time.

#python-jail
• by sealldev
Game 1 - Untitled Game / KashiCTF 2025
Game 1 - Untitled Game
🚩 CTFs KashiCTF 2025 rev

Game 1 - Untitled Game

We made a game.

#exif
• by sealldev
Game 2 - Wait / KashiCTF 2025
Game 2 - Wait
🚩 CTFs KashiCTF 2025 misc

Game 2 - Wait

We made a game.

• by sealldev
Game 3 - CatSeabank / KashiCTF 2025
Game 3 - CatSeabank
🚩 CTFs KashiCTF 2025 rev

Game 3 - CatSeabank

We made a game.

#spectrogram
• by sealldev
Look at Me / KashiCTF 2025
Look at Me
🚩 CTFs KashiCTF 2025 forensics

Look at Me

There is something wrong with him.. What can it be??

#steganography
• by sealldev
Memories Bring Back You / KashiCTF 2025
Memories Bring Back You
🚩 CTFs KashiCTF 2025 forensics

Memories Bring Back You

A collection of images, a digital time capsule—preserved in this file. But is every picture really just a picture? A photographer once said, "Every image tells a story, but some stories are meant to stay hidden." Maybe it’s time to inspect the unseen and find what’s been left behind.

#autopsy
• by sealldev
Restaurant / KashiCTF 2025
Restaurant
🚩 CTFs KashiCTF 2025 forensics

Restaurant

I just asked for my favourite pasta and they gave me this. Are these guys STUPID? Maybe in the end they may give me something real. (Wrap the text in `KashiCTF{}`)

• by sealldev
Self Destruct / KashiCTF 2025
Self Destruct
🚩 CTFs KashiCTF 2025 misc

Self Destruct

Explore the virtual machine and you might just find the flag. Or a surprise. Maybe....

#autopsy
• by sealldev
SuperFastAPI / KashiCTF 2025
SuperFastAPI
🚩 CTFs KashiCTF 2025 web

SuperFastAPI

Made my verty first API! However I have to still integrate it with a frontend so can't do much at this point lol.

• by sealldev
All DFIR / KnightCTF 2025
All DFIR
🚩 CTFs KnightCTF 2025 forensics

All DFIR

A multi-part forensics for KnightCTF

#steganography #exif #ghidra #autopsy
• by sealldev
All Networks / KnightCTF 2025
All Networks
🚩 CTFs KnightCTF 2025 networks

All Networks

All multi-part networks challenges for KnightCTF

#xss #csrf #reverse-shell #brute-force #network-forensics
• by sealldev
Baby Injection / KnightCTF 2025
Baby Injection
🚩 CTFs KnightCTF 2025 web

Baby Injection

Sometimes, seemingly harmless configuration files can do more than they appear. Can you uncover a hidden flaw and turn it to your advantage?

#remote-code-execution
• by sealldev
Binary Quest / KnightCTF 2025
Binary Quest
🚩 CTFs KnightCTF 2025 rev

Binary Quest

In the far-off kingdom of Valoria, an ancient relic called the “Sacred Flag” lies hidden within a guarded fortress. Legend says only a true knight of cunning and skill can lay claim to its power. Dare you venture into the shadows and emerge victorious? Your journey begins now—onward, brave soul, and seize your destiny in the Binary Quest.

#ghidra
• by sealldev
Easy Path to the Grail / KnightCTF 2025
Easy Path to the Grail
🚩 CTFs KnightCTF 2025 rev

Easy Path to the Grail

Brave knight, your quest is simple yet essential—unlock the secrets hidden in this binary challenge and tread the path to the grail. The journey will test your wits as you reverse the provided binary, uncovering the treasure within.

• by sealldev
Exceeding Knight / KnightCTF 2025
Exceeding Knight
🚩 CTFs KnightCTF 2025 web

Exceeding Knight

In the shadows of the ancient realm, a knight watches over unseen boundaries. The path ahead holds secrets known only to those who dare to explore beyond the ordinary.

• by sealldev
KnightCal / KnightCTF 2025
KnightCal
🚩 CTFs KnightCTF 2025 web

KnightCal

In the realm of ancient codes, only those who enumerate correctly can unveil the hidden flag. Craft your mathematical expressions wisely and uncover the secrets that lie within.

• by sealldev
Knight's Droid / KnightCTF 2025
Knight's Droid
🚩 CTFs KnightCTF 2025 rev

Knight's Droid

For ages, a cryptic mechanical guardian has slumbered beneath the Knight’s Citadel. Some say it holds powerful secrets once wielded by ancient code-wielding Knights. Many have tried to reactivate the droid and claim its hidden knowledge—yet none have returned victorious. Will you be the one to solve its riddles and awaken this legendary machine?

#jadx #brute-force
• by sealldev
Knight's Enigma / KnightCTF 2025
Knight's Enigma
🚩 CTFs KnightCTF 2025 rev

Knight's Enigma

In the shadowed corridors of an ancient fortress, a legendary knight once safeguarded a secret so potent that countless contenders have vanished trying to decipher it. Now the seal has cracked, and echoes of its power seep into the present. Test your courage as you follow cryptic traces left by the knight’s hand, unraveling an enigma steeped in the mysticism of ages past. Will your wits prove enough to break the bindings and uncover the realm’s hidden legacy—or will you, too, fade into the swirling mists of history? The choice—and fate—are yours to determine.

#ghidra
• by sealldev
Knight's Secret / KnightCTF 2025
Knight's Secret
🚩 CTFs KnightCTF 2025 pwn

Knight's Secret

#python-jail
• by sealldev
Luana / KnightCTF 2025
Luana
🚩 CTFs KnightCTF 2025 web

Luana

Show me your skills. Read the /flag.txt

#sandbox-escape
• by sealldev
The Hidden Quest / KnightCTF 2025
The Hidden Quest
🚩 CTFs KnightCTF 2025 osint

The Hidden Quest

The journey begins even before the battle starts! 🕵️‍♂️ In the world of knights and hackers, not everything is as it seems. Somewhere in our recent posts, a secret lies hidden, waiting to be discovered. 🕵️‍♂️ Look closer, think sharper, and let your curiosity guide you. The answer is out there – will you find it? 🛡️ Flag Format : `KCTF{s0mething_here}`

• by sealldev
Worthy Knight / KnightCTF 2025
Worthy Knight
🚩 CTFs KnightCTF 2025 rev

Worthy Knight

The gates of the Crimson Keep stand locked, sealed by cryptic runes from ages past. Many challengers have tested their might against these ancient wards—yet all were found wanting. Will you speak the correct incantation and earn the Keep’s hidden treasures? Prove your valor and stand among legends… if you truly are a Worthy Knight.

#hash-cracking #ghidra
• by sealldev
Cascade Chaos / BackdoorCTF 2024
Cascade Chaos
🚩 CTFs BackdoorCTF 2024 web

Cascade Chaos

A Markdown app that looks harmless... or is it? Can you find the subtle cracks in the system and make things a bit more... interesting? A little creativity goes a long way.

#prototype-pollution #xss #dom-clobbering
• by sealldev
Cursed Credential / BackdoorCTF 2024
Cursed Credential
🚩 CTFs BackdoorCTF 2024 forensics

Cursed Credential

I forgot my Browser's saved password although a friend of mine tells that I can find it if I know my master key. The problem is I dont even remember that, hopefully you can rock your brain and help me out.

#dictionary-attack
• by sealldev
I Like McDonalds / BackdoorCTF 2024
I Like McDonalds
🚩 CTFs BackdoorCTF 2024 cryptography

I Like McDonalds

My friend has created his own hashing service and has given it to me to crack it, can you help me with it. He has promised me a burger for this as I like McDonald's so much , can you help me get some? please :) :)

• by sealldev
Torrent Tempest / BackdoorCTF 2024
Torrent Tempest
🚩 CTFs BackdoorCTF 2024 forensics

Torrent Tempest

I was in the middle of downloading an important file using a peer-to-peer protocol, but something went wrong. I captured all the traffic but I'm a bit lost in this deep sea of data. Can you help me piece the file back together? `https://drive.google.com/file/d/1xXuUaLjswpDGNGm0VagjSJOnpLrHcH94/view?usp=sharing`

#steganography #network-forensics
• by sealldev
VulnKart / BackdoorCTF 2024
VulnKart
🚩 CTFs BackdoorCTF 2024 web

VulnKart

A simple shopping platform.

#hash-cracking #ssti #remote-code-execution #jwt
• by sealldev
Apolo / HackTheBox University CTF 2024
Apolo
🚩 CTFs HackTheBox University CTF 2024 fullpwn

Apolo

In the lawless expanse of the Frontier Cluster, Apolo serves as a beacon of security, working to safeguard the Frontier Cluster's assets from bounty hunters.

#authentication-bypass
• by sealldev
Armaxis / HackTheBox University CTF 2024
Armaxis
🚩 CTFs HackTheBox University CTF 2024 web

Armaxis

In the depths of the Frontier, Armaxis powers the enemy’s dominance, dispatching weapons to crush rebellion. Fortified and hidden, it controls vital supply chains. Yet, a flaw whispers of opportunity, a crack to expose its secrets and disrupt their plans. Can you breach Armaxis and turn its power against tyranny?

#command-injection
• by sealldev
Binary Badresources / HackTheBox University CTF 2024
Binary Badresources
🚩 CTFs HackTheBox University CTF 2024 forensics

Binary Badresources

Recently, a mysterious syndicate from the far reaches of the Frontier has sent shockwaves through the system by deploying a new, deceptive weapon. Disguised as a harmless gift, it lies dormant until a defender unwittingly activates it, instantly compromising the defensive line and paving the way for invaders to seize the stronghold. To reclaim control over the Frontier Cluster and protect their home from further incursions, brave outlaws and daring defenders are scrambling to decode the mechanics of this weapon and devise a way to disable it—before it’s too late. Every domain found in the challenge should resolve to your docker instance. Do not forget to add the port when visiting the URLs.

• by sealldev
Breaking Bank / HackTheBox University CTF 2024
Breaking Bank
🚩 CTFs HackTheBox University CTF 2024 web

Breaking Bank

In the sprawling digital expanse of the Frontier Cluster, the Frontier Board seeks to cement its dominance by targeting the cornerstone of interstellar commerce: Cluster Credit, a decentralized cryptocurrency that keeps the economy alive. With whispers of a sinister 51% attack in motion, the Board aims to gain majority control of the Cluster Credit blockchain, rewriting transaction history and collapsing the fragile economy of the outer systems. Can you hack into the platform and drain the assets for the financial controller?

#jwt
• by sealldev
Clouded / HackTheBox University CTF 2024
Clouded
🚩 CTFs HackTheBox University CTF 2024 fullpwn

Clouded

In the lawless expanse of the Frontier Cluster, Clouded emerges as a beacon of efficiency and security for file sharing. Breakthrough their cloud servers to obtain the secrets to finding the Starry Spur. Allow up to 1 minute for all the services to properly boot.

#xss #xxe #reverse-shell
• by sealldev
Conflict Crusher / HackTheBox University CTF 2024
Conflict Crusher
🚩 CTFs HackTheBox University CTF 2024 coding

Conflict Crusher

Awakened by Lena Starling, you, the legendary Space Cowboy, must assist the Minutemen in their fight against the Frontier Board. Their intercepted data streams hold vital intelligence but are riddled with conflicting keys. Use your skills to resolve these conflicts and unify the data to aid the resistance!

• by sealldev
CryoWarmup / HackTheBox University CTF 2024
CryoWarmup
🚩 CTFs HackTheBox University CTF 2024 rev

CryoWarmup

You've been on ice for a long time, so before you start your journey you'll need to defrost and warm up your skills. As luck would have it, you've forgotten the password to your trusty Electro-Safe-o-Matic, where your most prized possessions are. Can you still remember how to crack in?

#ghidra
• by sealldev
Energy Crystals / HackTheBox University CTF 2024
Energy Crystals
🚩 CTFs HackTheBox University CTF 2024 coding

Energy Crystals

The ancient Starry Spur has been recovered, but its energy matrix remains dormant. As Space Cowboy, your task is to awaken its power by calculating the combinations of energy crystals that match the required energy level.

• by sealldev
Exclusivity / HackTheBox University CTF 2024
Exclusivity
🚩 CTFs HackTheBox University CTF 2024 coding

Exclusivity

Welcome back, Space Cowboy. The Minutemen have intercepted a corrupted data stream from the Frontier Board. Hidden within the stream are critical coordinates, buried under duplicate entries caused by the Board's sabotage.

• by sealldev
exfiltrated entropy / HackTheBox University CTF 2024
exfiltrated entropy
🚩 CTFs HackTheBox University CTF 2024 rev

exfiltrated entropy

An intercepted signal from the Frontier Board carries fragments of hidden directives, veiled in layers of complexity. Unlocking its secrets could reveal their plans and disrupt their control. Will you decipher the commands and turn the tide in the struggle for the Frontier?

#network-forensics
• by sealldev
Freedom / HackTheBox University CTF 2024
Freedom
🚩 CTFs HackTheBox University CTF 2024 fullpwn

Freedom

In these challenging times, the voices of freedom are growing fainter. Help us identify potential vulnerabilities in our systems so we can safeguard them against the Frontier Board, which seeks to silence any dissenting opinions. Allow up to 3 minutes for all the services to properly boot.

#hash-cracking #sql-injection
• by sealldev
Frontier Exposed / HackTheBox University CTF 2024
Frontier Exposed
🚩 CTFs HackTheBox University CTF 2024 forensics

Frontier Exposed

The chaos within the Frontier Cluster is relentless, with malicious actors exploiting vulnerabilities to establish footholds across the expanse. During routine surveillance, an open directory vulnerability was identified on a web server, suggesting suspicious activities tied to the Frontier Board. Your mission is to thoroughly investigate the server and determine a strategy to dismantle their infrastructure. Any credentials uncovered during the investigation would prove invaluable in achieving this objective. Spawn the docker and start the investigation!

• by sealldev
Signaling Victorious / HackTheBox University CTF 2024
Signaling Victorious
🚩 CTFs HackTheBox University CTF 2024 forensics

Signaling Victorious

"In a recent raid with your fellow bounty hunters you managed to recover a memory dump and a backup archive of the Frontier Board's Operation Center! The Board knows the Starry Spurr lies within your grasp and they are getting even more desperate... Uncover whatever secrets lie within the artefacts you are given and find a way to halt the Board's plans!! Note: Carefully read the `readme.txt` in the downloadables!"

#memory-forensics #ghidra
• by sealldev
Wanter Alive / HackTheBox University CTF 2024
Wanter Alive
🚩 CTFs HackTheBox University CTF 2024 forensics

Wanter Alive

A routine patrol through the Frontier Cluster's shadowy corners uncovered a sinister file embedded in a bounty report—one targeting Jack Colt himself. The file’s obfuscated layers suggest it's more than a simple message; it’s a weaponized codNote: Ensure all domains discovered in the challenge resolve to your Docker instance, including the appropriate port when accessing URLs.e from the Frontier Board, aiming to tighten their grip on the stars. As a trusted ally, it's your task to peel back the layers of deception trace its origin, and turn their tools against them. Every domain found in the challenge should resolve to your docker instance. Do not forget to add the port when visiting the URLs.

• by sealldev
Weighted Starfield / HackTheBox University CTF 2024
Weighted Starfield
🚩 CTFs HackTheBox University CTF 2024 coding

Weighted Starfield

The Frontier Starfield signals are destabilized by weighted anomalies. As Space Cowboy, your mission is to restore stability by calculating the maximum stability score from the modified energy signals.

• by sealldev
Word Wrangler / HackTheBox University CTF 2024
Word Wrangler
🚩 CTFs HackTheBox University CTF 2024 coding

Word Wrangler

The Frontier Archives have sent an encrypted ancient text. As Space Cowboy, your task is to decode it by identifying the most frequently used word. This crucial word could unlock secrets vital to the resistance.

• by sealldev
add_to_cartel / SecEdu CTF 2024
add_to_cartel
🚩 CTFs SecEdu CTF 2024 osint

add_to_cartel

Whispers in the digital underground hint at a startling revelation about NO_NO_NO's elusive funding source. Buried in encrypted data streams, links to a cryptic online storefront have surfaced. Could this innocuous merch shop be the key to NO_NO_NO's financial puzzle? Stranger still, the store is offering free merchandise as part of a limited time promotion. Might as well grab some free merch while it’s available? `http://chals.secedu.site:5016`

#man-in-the-middle
• by sealldev & finnersio
coded_conspiracy / SecEdu CTF 2024
coded_conspiracy
🚩 CTFs SecEdu CTF 2024 rev

coded_conspiracy

Our team has discovered a series of binaries on a seized web server associated with NO_NO_NO. These binaries seem to communicate extensively. Your task is to find a way to analyse these messages. `nc chals.secedu.site 5018`

#ghidra #cyberchef #gdb
• by sealldev & finnersio
commitment_issues / SecEdu CTF 2024
commitment_issues
🚩 CTFs SecEdu CTF 2024 osint

commitment_issues

The extremists are believed to be operating under a number of front companies, including Redfield Industries. Intelligence gathering has led to the discovery of the company's website. Careful analysis of how this website was made may reveal crucial information linking back to the extremist group, potentially exposing their true identities or operational details. https://tobiasredfield.github.io/redfield-industries/

• by sealldev
compiled_chaos / SecEdu CTF 2024
compiled_chaos
🚩 CTFs SecEdu CTF 2024 rev

compiled_chaos

The next target has been identified, and agents have cleared the cars of the CL-2384 train, and found an unknown implant device attached to the speed controllers. We were able to produce a firmware dump from the device. We need you to find out what this device is doing, and what information it is collecting or sending! Is anyone really bothered to make their own protocol these days?

#ghidra
• by sealldev & finnersio
digital_doppelganger / SecEdu CTF 2024
digital_doppelganger
🚩 CTFs SecEdu CTF 2024 forensics

digital_doppelganger

An undercover informant has provided this image of what we believe to be a NO_NO_NO member’s screen. Unfortunately, our informant went dark before we could get more context, so it’s up to you. This could hold the final key to understanding NO_NO_NO’s operations.

• by sealldev
in_flight_entertainment / SecEdu CTF 2024
in_flight_entertainment
🚩 CTFs SecEdu CTF 2024 osint

in_flight_entertainment

Intelligence suggests a key NO_NO_NO member travels frequently between multiple countries. A photograph, likely taken by this individual during one of their trips, has been intercepted. Help us find the flight number. This information could be crucial in predicting their movements and potentially intercepting them at an airport. flag format: `<flight number>`.

• by sealldev
Avatar / SecEdu CTF 2024
Avatar
🚩 CTFs SecEdu CTF 2024 osint

Avatar

We've now found a link to a "Leet Hacker" that has probed ORG-B systems a bit. Can you find their alias? `http://ec2-54-79-58-135.ap-southeast-2.compute.amazonaws.com`

• by sealldev
Claw-ful opsec / SecEdu CTF 2024
Claw-ful opsec
🚩 CTFs SecEdu CTF 2024 osint

Claw-ful opsec

What is the name of Cipher's beloved cat?

• by sealldev
Et tu, Cipher? / SecEdu CTF 2024
Et tu, Cipher?
🚩 CTFs SecEdu CTF 2024 web

Et tu, Cipher?

Woah, Cipher seems to have hosted a mysterious website?! I wonder what we can find here? I don't think they're very creative -- perhaps they stole a file name from a list they found online? `win.secedu.site`

#dictionary-attack #brute-force
• by sealldev
Happy Birthday, Cipher! / SecEdu CTF 2024
Happy Birthday, Cipher!
🚩 CTFs SecEdu CTF 2024 osint

Happy Birthday, Cipher!

When is Cipher's birthday? The flag format is: `SECEDU{Month_XX}`, where XX is the date.

• by sealldev
IStG / SecEdu CTF 2024
IStG
🚩 CTFs SecEdu CTF 2024 osint

IStG

The calendar invite has an interesting zip file attached. They very clearly don't want us to see it... What could be inside?

#exif
• by sealldev
Linkage / SecEdu CTF 2024
Linkage
🚩 CTFs SecEdu CTF 2024 cryptography

Linkage

ORG-B has given us a message that is being passed around the organisation. They've found it on a few of their machines, but are unsure what it says. jvvr8--ga0/76/5;/7:/317,cr/qmwvjgcqv/0,amorwvg,cocxmlcuq,amo-. The message was signed by a mysterious "Y". Interesting.

#cyberchef
• by sealldev
PSW / SecEdu CTF 2024
PSW
🚩 CTFs SecEdu CTF 2024 osint

PSW

With knowledge of the attacker's avatar, we can find their github repo. Is there any senstive information that 'was' found here?

• by sealldev
Secret meeting? / SecEdu CTF 2024
Secret meeting?
🚩 CTFs SecEdu CTF 2024 osint

Secret meeting?

Something that might be useful is an email address. What can we find with the information that has now been revealed to us? A particular commit might suggest a secret event may have taken place...

• by sealldev
Secret meeting!? / SecEdu CTF 2024
Secret meeting!?
🚩 CTFs SecEdu CTF 2024 osint

Secret meeting!?

Cipher had a secret meeting!! We should probably report this to the police. The flag should be of the format: `SECEDU{<LAT>,<LONG>}`, where the accuracy of the coordinates is to three decimal places.

• by sealldev
Vaulting / SecEdu CTF 2024
Vaulting
🚩 CTFs SecEdu CTF 2024 forensics

Vaulting

We have retrieved an interesting file with our investigation. What is the password for the decryption script? Wrap whatever the `supersecretpass` is into `SECEDU{}` Flag formatting note: the decryption script requires 3 pieces of information to decrypt the file. Say these 3 pieces are "Super", "Secret" and "Pass", the flag you should enter is `SECEDU{SuperSecretPass}`

#dictionary-attack
• by sealldev
Wayyyy back, I liked? / SecEdu CTF 2024
Wayyyy back, I liked?
🚩 CTFs SecEdu CTF 2024 osint

Wayyyy back, I liked?

Can you find Cipher's favourite colour? Format the flag accordingly: `SECEDU{HH:MM:SS_MM_DD,_YYYY}` This should be when this discussion was recorded.

• by sealldev
Ay ay, CAPtain / SecEdu CTF 2024
Ay ay, CAPtain
🚩 CTFs SecEdu CTF 2024 forensics

Ay ay, CAPtain

They've seen how eaisily we decoded their captured message in week 1, and now they've turned up the heat with some random data. Find what they're sending over our network.

#network-forensics
• by finnersio
Barrier / SecEdu CTF 2024
Barrier
🚩 CTFs SecEdu CTF 2024 cryptography

Barrier

Another secret note in the files that you can't translate. Wonder what the secret is here?

• by sealldev
Destination / SecEdu CTF 2024
Destination
🚩 CTFs SecEdu CTF 2024 forensics

Destination

Interesting, Layton has popped up once or twice before... Why does he have encrypted data? He seems like the kind of guy to use fairly common passwords, I'm sure he can't be too malicious. But, what could his involvement be? What secrets is he hiding? **There is no requirement to brute-force infra here, please avoid doing so** Search for the flag by decrypting the data. `http://files.secedu.site/`

#hash-cracking #dictionary-attack
• by sealldev
Hard-decoded / SecEdu CTF 2024
Hard-decoded
🚩 CTFs SecEdu CTF 2024 rev

Hard-decoded

One of ORG-C's CI units is spewing out some random data. Sometimes this happens, they tell us. Is there something malicious in here??

#ghidra
• by sealldev
Layment Portal / SecEdu CTF 2024
Layment Portal
🚩 CTFs SecEdu CTF 2024 misc

Layment Portal

There is something else they want to quickly test -- a portal where the employees enter their hours. They're worried that Layton may have also tricked the system somehow, and recieved more pay than they had wanted to give out. Automation for this company is a bane.. `nc chals.secedu.site 5005` Hint: Who might have access to this employee portal?

• by sealldev
Photo-oops / SecEdu CTF 2024
Photo-oops
🚩 CTFs SecEdu CTF 2024 osint

Photo-oops

They've cleared out some old files from storage, as they're needing to reference some physical documents due to the partial outage. One of these photos is brought up to your team by an intreigued employee -- it belongs to a `Tanya`, but that's not a name of one of their employees. Where was this photo taken?? Wrap the city name in`'SECEDU{}`. Don't forget to capitalise the city name!

• by sealldev
Score / SecEdu CTF 2024
Score
🚩 CTFs SecEdu CTF 2024 web

Score

After a review, we found that ORG-C is hosting an unusual website on their servers... It looks like they're pretty competitive -- let's make sure they know who's boss! `http://chals.secedu.site:5007/`

• by sealldev
Source / SecEdu CTF 2024
Source
🚩 CTFs SecEdu CTF 2024 web

Source

ORG-C has given us access to one of their file servers -- conveniently served over HTTP without authentication. There is no requirement to brute-force infra here, please avoid doing so. `http://files.secedu.site/`

• by sealldev
Upgrading your diet / SecEdu CTF 2024
Upgrading your diet
🚩 CTFs SecEdu CTF 2024 web

Upgrading your diet

After a review, we found that ORG-C is hosting an unusual website on their servers... How can we break through, and find what secrets lay beneath? `http://chals.secedu.site:5007/`. Hint: This type of challenge is quite confusing.

#jwt
• by sealldev
Are you sure that's all? / SecEdu CTF 2024
Are you sure that's all?
🚩 CTFs SecEdu CTF 2024 forensics

Are you sure that's all?

We've captured a section of network traffic from ORG-A. Can you make sure that no sensitive data is being transmitted in plaintext? We can find some interesting details on the transmitted data by following the TCP stream. What kind of file does this reveal?

#network-forensics
• by sealldev & finnersio
Crawler / SecEdu CTF 2024
Crawler
🚩 CTFs SecEdu CTF 2024 web

Crawler

Instead of properly updating their list of websites when they need to, ORG-A has instead just appended their new pages, and hasn't removed any pages that they've taken down. Find the page that is still up and running. Vuln scans on infrastructure are out of scope, and aren't very relevant here. To be clear, there is no requirement to probe infrastructure in this way.Hint: Is there a conventional way to indicate to crawlers that you don't want a website indexed?

#dictionary-attack
• by sealldev & tulip
Encoded, secret message? / SecEdu CTF 2024
Encoded, secret message?
🚩 CTFs SecEdu CTF 2024 cryptography

Encoded, secret message?

While inspecting logs, we found a message being sent across our internal network. What could this be???

#cyberchef
• by sealldev
Fin 'n' find / SecEdu CTF 2024
Fin 'n' find
🚩 CTFs SecEdu CTF 2024 forensics

Fin 'n' find

One of the employees, Layton, has taken you aside, and is wondering if you can help fix a zip file that they broke. There seems to be some sensitive information hidden inside of it, we might as well have a look at this too (it's within scope) ;)

• by sealldev & finnersio
Loudhailer / SecEdu CTF 2024
Loudhailer
🚩 CTFs SecEdu CTF 2024 forensics

Loudhailer

More traffic from ORG-A. Users were complaining that a server was not working properly. After some investigation, the network administrator captured some strange traffic coming from the server. Can you find if any confidential data has been leaked as a result?

#network-forensics
• by sealldev
Medium-ware / SecEdu CTF 2024
Medium-ware
🚩 CTFs SecEdu CTF 2024 hardware

Medium-ware

We've managed to dump some firmware from an experimental AVR8-driven PLC. Our developer had hardcoded a particular string inside, and promises that it's "secure enough". Find a way to extract this string. This is the flag in its entirety. This is expected to be quite a difficult challenge for week 1. Look for references to `DAT_mem`, revealing the location hiding with offset `0x02d2`. This will also yield a xor operation, `0x97`, that is used to decode a string at the end of the code segment. There is some rubbish data following a predicatable pattern once the xor key is applied. There is random data inside the flag. i.e: `SECEDU{<front>_<random_data>}` This is intentional, keep going until you find a closed bracket `}`.

#ghidra #cyberchef
• by sealldev
Not quite all / SecEdu CTF 2024
Not quite all
🚩 CTFs SecEdu CTF 2024 forensics

Not quite all

The previously captured traffic contained an interesting tidbit towards the end of the file. What was the second line sent in the secret message? The message should wrapped in `SECEDU{}`. If it's another language, do not translate it. The text is in cyrillic, so ASCII doesn't display it nicely. What encoding scheme can cyrillic utilise?

• by sealldev
On the way! / SecEdu CTF 2024
On the way!
🚩 CTFs SecEdu CTF 2024 osint

On the way!

On our way to the main office, one of the employees sent us this photo, telling us that we needed to stop by on our way down. But unfortunately, they forgot to tell us where this was. Nice. Where abouts was this photo taken? Wrap in `SECEDU{}`. If it's a city with one or more words, space with "_". Hint: Don't forget to capitalise the city name

#exif
• by sealldev & tulip
Overflowing with files / SecEdu CTF 2024
Overflowing with files
🚩 CTFs SecEdu CTF 2024 pwn

Overflowing with files

They also seem to have quite an interesting top-secret file delivery system, developed in C of all things?! Find a way to get the contents of the top-secret document. `nc chals.secedu.site 5001`

#gdb
• by sealldev & finnersio
Portal / SecEdu CTF 2024
Portal
🚩 CTFs SecEdu CTF 2024 pwn

Portal

They've given us one of their programs running in the background to us. Let's hope it's not insecure!! (or in your case, that it's not secure instead ;) ) `nc chals.secedu.site 5000`

#buffer-overflow
• by sealldev & tulip
The name's Bossed, M. Bossed! / SecEdu CTF 2024
The name's Bossed, M. Bossed!
🚩 CTFs SecEdu CTF 2024 forensics

The name's Bossed, M. Bossed!

Whilst scanning the network we found an unknown service running on port 4953. What could it be?

#cyberchef
• by sealldev
Baby's First Forensics / DownUnderCTF 2024
Baby's First Forensics
🚩 CTFs DownUnderCTF 2024 forensics

Baby's First Forensics

They've been trying to breach our infrastructure all morning! They're trying to get more info on our covert kangaroos! We need your help, we've captured some traffic of them attacking us, can you tell us what tool they were using and its version? NOTE: Wrap your answer in the `DUCTF{}`, e.g. `DUCTF{nmap_7.25}`

#network-forensics
• by sealldev
back to the jungle / DownUnderCTF 2024
back to the jungle
🚩 CTFs DownUnderCTF 2024 osint

back to the jungle

Did MC Fat Monke just drop a new track????? 👀👀👀

• by sealldev
Bad Policies / DownUnderCTF 2024
Bad Policies
🚩 CTFs DownUnderCTF 2024 forensics

Bad Policies

Looks like the attacker managed to access the rebels Domain Controller. Can you figure out how they got access after pulling these artifacts from one of our Outpost machines?

• by sealldev
Bridget Lives / DownUnderCTF 2024
Bridget Lives
🚩 CTFs DownUnderCTF 2024 osint

Bridget Lives

After dropping numerous 0days last year Bridget has flown the coop. This is the last picture she posted before going dark. Where was this photo taken from? NOTE: Flag is case-insensitive and requires placing inside `DUCTF{}`! e.g. `DUCTF{name_of_building}`

• by sealldev
cityviews / DownUnderCTF 2024
cityviews
🚩 CTFs DownUnderCTF 2024 osint

cityviews

After having to go on the run, I've had to bunker down. Which building did I capture this picture from? NOTE: Flag is case-insensitive and requires placing inside `DUCTF{}`! e.g `DUCTF{building_name}`

• by sealldev
co2 / DownUnderCTF 2024
co2
🚩 CTFs DownUnderCTF 2024 rev

co2

A group of students who don't like to do things the "conventional" way decided to come up with a CyberSecurity Blog post. You've been hired to perform an in-depth whitebox test on their web application.

#prototype-pollution
• by sealldev
Macro Magic / DownUnderCTF 2024
Macro Magic
🚩 CTFs DownUnderCTF 2024 forensics

Macro Magic

We managed to pull this excel spreadsheet artifact from one of our Outpost machines. Its got something sus happening under the hood. After opening we found and captured some suspicious traffic on our network. Can you find out what this traffic is and find the flag! Note: You do not need to run or enable the macro so solve.

#network-forensics
• by sealldev
number mashing / DownUnderCTF 2024
number mashing
🚩 CTFs DownUnderCTF 2024 rev

number mashing

Mash your keyboard numpad in a specific order and a flag might just pop out!

#ghidra
• by sealldev
offtheramp / DownUnderCTF 2024
offtheramp
🚩 CTFs DownUnderCTF 2024 osint

offtheramp

That looks like a pretty cool place to escape by boat, EXAMINE the image and discover the name of this structure. NOTE: Flag is case-insensitive and requires placing inside `DUCTF{}`! e.g `DUCTF{name_of_structure}`

#exif
• by sealldev
parrot the emu / DownUnderCTF 2024
parrot the emu
🚩 CTFs DownUnderCTF 2024 web

parrot the emu

It is so nice to hear Parrot the Emu talk back

#ssti
• by sealldev
SAM I AM / DownUnderCTF 2024
SAM I AM
🚩 CTFs DownUnderCTF 2024 forensics

SAM I AM

The attacker managed to gain Domain Admin on our rebels Domain Controller! Looks like they managed to log on with an account using WMI and dumped some files. Can you reproduce how they got the Administrator's Password with the artifacts provided? Place the Administrator Account's Password in `DUCTF{}`, e.g. `DUCTF{password123!}`

#hash-cracking
• by sealldev
Sun Zi's Perfect Math Class / DownUnderCTF 2024
Sun Zi's Perfect Math Class
🚩 CTFs DownUnderCTF 2024 cryptography

Sun Zi's Perfect Math Class

Everybody!! Sunzi's math class is about to begin!!!

• by sealldev
tldr please summarise / DownUnderCTF 2024
tldr please summarise
🚩 CTFs DownUnderCTF 2024 forensics

tldr please summarise

I thought I was being 1337 by asking AI to help me solve challenges, now I have to reinstall Windows again. Can you help me out by find the flag in this document?

• by sealldev
zoo feedback form / DownUnderCTF 2024
zoo feedback form
🚩 CTFs DownUnderCTF 2024 web

zoo feedback form

The zoo wants your feedback! Simply fill in the form, and send away, we'll handle it from there!

#xxe
• by sealldev