Ecowas CTF
Even though our team didn’t take first place this was an exciting Jeopardy CTF for me because i am more of an Attack-defense person, but this taught me some few things, so i have decided to make a write-up on each and every challenge i solved!! GG <!3
Decode_me
First of all, we are giving a random number to solve
looks like the character has a special number which is 2535, i then decided to decode it with hexadecimal first
and then we got a URL encoded text, decoding the URL encoded text gives us this
Which is a base64 value, let decode it
and then we got a flag
grep
we are asked to download a file
through the name of the challenge, i knew i had to use the CLI tool grep
we got a flag!!
Read Me Please
we are giving a file with text at the top and then empty lines
This is called snow steganography, download this tool on your command line with sudo apt install stegsnow
Now use this syntax on the file and you should get an output
Nice, let keep going, copy the output and paste in Cyber Chef and keep clicking the pen button until you get the final flag
Done !!
xss 101
We are given a website :
After several tests of xss
vulnerabilities :
I decided to inspects elements
, which going to the sources
tab gave me an hint on what to do :
The jquery.min.js
file was calling the /win……. directory somehow, so i decided to replace the URL with that :
……..Then we got a Flag
Sentinnelle
We are given an image :
Using image forensics tools like strings, exiftool, steghide, binwalk, bulk extractor, file, foremost, totally gives me nothing
So then i used a tool to bruteforce images called stegseek
and got a .wav
file
using strings on olympio.jpg.out
gives us a a rot47
encoded text at the end of output
Decoding this text gives us a flag
Strings
We are given a file to download :
concatenating out the file gives us a lot of output
As the name of the file implies i used the strings
command piped to grep
to get the flag
sec-fortress@Pwn-F0rk-3X3C:~/EcowasCTF$ strings strings | grep flag
flag{th4t5_4_l0t_0f_5tr1ng5}
Chevrolet Traverse
We are given a website :
Immediately, my mind went to Path Traversals Vulnerability
We have secrets
and almost_there
, Nice !! , let us keep going
We then have flag.txt
, Let navigate there
Nothing, but viewing page-source
gives us a flag
Unix Master
we where given a Netcat Logs to connect to
Connecting seems to gives us some file and a flag.txt file with an asterik in front
After much enumeration, i did ./flag.txt
and got a flag
SoppazShoes
We are giving a website :
Decided to make some navigation and i landed on this shoe page
Clicking on each shoes changes the shoe ID number
After much fuzzing, Number 35 gave a clue
Moved to number 40 and things where clicking
Long-Story short, decided to add it to cart then checkout and i got a flag
Thanks for reading, Farewell!!