├── .gitattributes ├── AZERTY ├── chall.txt └── desc.txt ├── Blaise's Publicity ├── blaise.txt └── desc.txt ├── Bob the Builder ├── com.cyberhackctf.zip └── desc.txt ├── BrainTap ├── BrainTap.txt └── desc.txt ├── Carry Something ├── IIDKing_Challenge3.exe └── desc.txt ├── Change My Mind ├── challange .jpg └── desc.txt ├── Colorful World ├── desc.txt └── image.png ├── Config Treasure ├── desc.txt └── foreware.zip ├── Covid ├── corona.txt └── desc.txt ├── Crazy Forensics ├── Movie-clip.mp4 ├── Somthing-fishy.jpg ├── challange.zip └── desc.txt ├── Cuff Cuff ├── PE_Detective_Challenge4.exe └── desc.txt ├── Don't RIP └── desc.txt ├── Elizabeth's Love ├── Weird_audio.wav └── desc.txt ├── Fooood ├── desc.txt └── image.jpeg ├── Grunt └── desc.txt ├── Head-to-Head └── desc.txt ├── Hike Up! └── desc.txt ├── Hola! └── desc.txt ├── It's a Trap! └── Challenge5.1.exe ├── Journey to Program ├── desc.txt └── web.zip ├── Jumping Jack ├── desc.txt └── jumpingjack.txt ├── Magic Boxes ├── Challenge2.exe └── desc.txt ├── New Character ├── desc.txt └── newcharacter.txt ├── Not so easy ├── desc.txt └── not_so_easy.txt ├── Null Entropy ├── ciphertext.txt ├── desc.txt └── encrypt.py ├── OS NET ├── Os-net .txt └── desc.txt ├── Party Popper └── desc.txt ├── Pwned! └── desc.txt ├── So_easy ├── desc.txt └── so-easy.txt ├── Socially Exclusive ├── ciphertext.txt ├── desc.txt └── socially_exclusive.py ├── Storage ├── desc.txt └── storage.png ├── Stump └── desc.txt ├── Subway Surfer └── desc.txt ├── Switch Eyes └── desc.txt ├── Threadify ├── chall.exe └── desc.txt ├── Traffic Jam ├── desc.txt └── network_traffic.pcap ├── Trivial Privacy ├── ciphertext.txt ├── desc.txt └── you_may_need_this └── We Love Fillers └── desc.txt /.gitattributes: -------------------------------------------------------------------------------- 1 | # Auto detect text files and perform LF normalization 2 | * text=auto 3 | -------------------------------------------------------------------------------- /AZERTY/chall.txt: -------------------------------------------------------------------------------- 1 | YEHACMGSQWBTLBQTV? -------------------------------------------------------------------------------- /AZERTY/desc.txt: -------------------------------------------------------------------------------- 1 | I think I need a new typing assist. Can you recommend me any? 2 | 3 | Author: Ansh Bhawnani 4 | 5 | 100 -------------------------------------------------------------------------------- /Blaise's Publicity/blaise.txt: -------------------------------------------------------------------------------- 1 | The author is on web, 2 | The web posseses delusion 3 | What would you do, 4 | To find the solution? 5 | -------------------------------------------------------------------------------- /Blaise's Publicity/desc.txt: -------------------------------------------------------------------------------- 1 | A rookie has tried to harden the identity of Mr. Blaise, with a modern day public key algorithm. Can you find out the secret message of Mr. Blaise? 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Blaise's%20Publicity 4 | 5 | Author: Ansh Bhawnani 6 | 7 | 400 -------------------------------------------------------------------------------- /Bob the Builder/com.cyberhackctf.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Bob the Builder/com.cyberhackctf.zip -------------------------------------------------------------------------------- /Bob the Builder/desc.txt: -------------------------------------------------------------------------------- 1 | Find the Dev name 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Bob%20the%20Builder 4 | 5 | Author: Mrunal 6 | 7 | 500 -------------------------------------------------------------------------------- /BrainTap/BrainTap.txt: -------------------------------------------------------------------------------- 1 | ++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>++++++++.----------.+++++++++++++.<++++++++++++++++++.>--------.-----.>+++..<++++++++++.>+++++++++++++++++++.<+++++++++++++++++++++.<+++.>---------------------.>-.<-------------.<--.>+++++++++++++.++++++.+.++++++++++++++++++.-------------------------.>---------------.<+++++++++++.<+.>----------------.-----.+++++++++++++.>---.<---.----------.+++++++++++++.<--.>--------.-----.+++++.>++++++++++++++++++.<++++.>----------------.<------------.>++++++++++++++++.<++++++++.-----.+++++++++++++++++.<+.>-------.+++++.<++++++++++++++++.---------------.>-----.>----------------.<-------------.>++++++++++++++++. 2 | 3 | Flag Format: cyberhack{ABCD} --- Note: All characters are in capital letters without any space. -------------------------------------------------------------------------------- /BrainTap/desc.txt: -------------------------------------------------------------------------------- 1 | We are tapping some logical units and by mistake, we lost in some taps. Solve the problem for us. 2 | Flag Format: cyberhack{} 3 | 4 | Author: R0X4R 5 | 6 | 150 -------------------------------------------------------------------------------- /Carry Something/IIDKing_Challenge3.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Carry Something/IIDKing_Challenge3.exe -------------------------------------------------------------------------------- /Carry Something/desc.txt: -------------------------------------------------------------------------------- 1 | Follow the call to find your hidden code that holds the flag. 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Carry%20Something 4 | 5 | Author: Raja Prabhu 6 | 7 | 250 -------------------------------------------------------------------------------- /Change My Mind/challange .jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Change My Mind/challange .jpg -------------------------------------------------------------------------------- /Change My Mind/desc.txt: -------------------------------------------------------------------------------- 1 | Change my mind by solving this challenge. 2 | 3 | Author: Jatan Vora 4 | 5 | 100 -------------------------------------------------------------------------------- /Colorful World/desc.txt: -------------------------------------------------------------------------------- 1 | I like colors! Do you? 2 | 3 | Authors: Mrunal Chawda 4 | 5 | 120 -------------------------------------------------------------------------------- /Colorful World/image.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Colorful World/image.png -------------------------------------------------------------------------------- /Config Treasure/desc.txt: -------------------------------------------------------------------------------- 1 | Flag format: cyberhack{token} 2 | 3 | Author: Mrunal Chawda & Jatan Vora 4 | 5 | 500 -------------------------------------------------------------------------------- /Config Treasure/foreware.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Config Treasure/foreware.zip -------------------------------------------------------------------------------- /Covid/corona.txt: -------------------------------------------------------------------------------- 1 | 2 | Author : Dr zang ku li (twitter.com/zangu135) 3 | 中國最主要的傳染病專家之一說,印度在covid-19病例中的發展軌跡緊隨美國之後,有可能類似地達到平 4 | 穩狀態,而不是很快達到高峰。 5 | 新冠肺炎 |印度確診冠狀病毒病例的互動地圖 6 | ^旗^ 確 診 冠 狀 病 7 | 中國covid-19戰略的主要負責人張文宏說,由於印度已經有一 8 | 些社區傳播的跡象,因 ^旗^ 此它更有可 ,能順 應 美 國和歐洲 9 | 的趨勢,而不是將案件限制在很小的數目。也是上海華山醫院傳染病科主任 10 | 11 | 他說:“不要只看案件數。” “在美國和歐洲,成千上萬的病例超過了印度。歐洲人的生活仍然沒有停止,他們正在準備恢復工作,學校和企業。” 12 | 張博士周三發表了上述評論,同時與中國大使館安排了在線交流,與印度的 13 | 中國國民進行互動,並就印度的戰略,測試和案件的未來發展提出了問題。 14 | ^旗^ コ不る它な 是很 快些社區 15 | 16 | 關於印度人的免疫力是否高於世界其他國家的問題(這一問題在中國已引起廣泛爭 17 | 議),張博士說,印度的發病率表明情況並非如此。他說,但是,他很感動地看到人們在應對這 18 | 種流行病方面有多“鎮靜”,這表明他們的確具有很高的“精 19 | 神免疫力”。 20 | 21 | corona map :https://github.com/nanak-singh/coronamap 22 | 23 | 饒向衛生部長詢問了該國疫苗開發的狀況。部長說:“全世界都在嘗試開發COVID-19的疫苗。有10 24 | 25 | "shìjiè dōu zài chángshì kāifā COVID-19 de yìmiáo. Yǒu 100 duōzhǒng hòuxuǎn yìmiáo chǔyú bùtóng de fāzhǎn shuǐpíng. Shìjiè wèishēng zǔzhī (WHO) zhèngzài xiétiáo nǔlì. Yìndù yě zài jījí zuò chū gòngxiàn zài yìndù yěyǒu 14 míng " 26 | 27 | 三發表了上述評論,同時與中國大使館安 28 | 排了在線交流,與印度的 29 | 30 | ^旗^xsix5sn限制在很 -------------------------------------------------------------------------------- /Covid/desc.txt: -------------------------------------------------------------------------------- 1 | Sometimes, not all things are left translated! 2 | 3 | Format - cyberhack{translated_word} 4 | 5 | Author: Mrunal Chawda 6 | 7 | 200 -------------------------------------------------------------------------------- /Crazy Forensics/Movie-clip.mp4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Crazy Forensics/Movie-clip.mp4 -------------------------------------------------------------------------------- /Crazy Forensics/Somthing-fishy.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Crazy Forensics/Somthing-fishy.jpg -------------------------------------------------------------------------------- /Crazy Forensics/challange.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Crazy Forensics/challange.zip -------------------------------------------------------------------------------- /Crazy Forensics/desc.txt: -------------------------------------------------------------------------------- 1 | Flag format: cyberhack{DeletedDate_time} 2 | 3 | Author: Mrunal Chawda & Jatan vora 4 | 5 | 450 -------------------------------------------------------------------------------- /Cuff Cuff/PE_Detective_Challenge4.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Cuff Cuff/PE_Detective_Challenge4.exe -------------------------------------------------------------------------------- /Cuff Cuff/desc.txt: -------------------------------------------------------------------------------- 1 | Hack the way, but you will not get your favourite message box. 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Cuff%20Cuff 4 | 5 | Author: Raja Prabhu 6 | 7 | 300 -------------------------------------------------------------------------------- /Don't RIP/desc.txt: -------------------------------------------------------------------------------- 1 | I am the border router of an autonomous system. How many routing protocols am I most likely to be running? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 20 -------------------------------------------------------------------------------- /Elizabeth's Love/Weird_audio.wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Elizabeth's Love/Weird_audio.wav -------------------------------------------------------------------------------- /Elizabeth's Love/desc.txt: -------------------------------------------------------------------------------- 1 | This is a very popular and reputed bot. You know him. 2 | 3 | Author: Jatan Vora 4 | 5 | 400 -------------------------------------------------------------------------------- /Fooood/desc.txt: -------------------------------------------------------------------------------- 1 | My friend wants to go eat somewhere, please tell me the nearest restaurant from the place where my friend is. 2 | 3 | He sent me a photo! You know what to do ;-) 4 | 5 | Flag Format - cyberhack{restaurant-name} 6 | 7 | Author: http.deep 8 | 9 | 150 -------------------------------------------------------------------------------- /Fooood/image.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Fooood/image.jpeg -------------------------------------------------------------------------------- /Grunt/desc.txt: -------------------------------------------------------------------------------- 1 | I am a very popular open source IDS. If I want to block a TCP connection by a socket, what response (resp) mechanism should I use? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 25 -------------------------------------------------------------------------------- /Head-to-Head/desc.txt: -------------------------------------------------------------------------------- 1 | Nancy is requesting the DNS for a hostname. I am requesting the same server with Nancy's source address in the request, for a different domain, but at the same time. What am I trying to achieve? What is that term called? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 20 -------------------------------------------------------------------------------- /Hike Up!/desc.txt: -------------------------------------------------------------------------------- 1 | The company has to send a receipt of the payment made by Michael. But they are waiting for the order to be ready. They send the receipt with the order. So if the order is delayed, the receipt is too. This technology is popular in TCP communication. What is it called? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 20 -------------------------------------------------------------------------------- /Hola!/desc.txt: -------------------------------------------------------------------------------- 1 | Ever heard about access points? How are they identified by other devices? They transmit something special, periodically. 2 | 3 | Flag format: cyberhack{ANSWER} 4 | 5 | Author: Ansh Bhawnani 6 | 7 | 10 -------------------------------------------------------------------------------- /It's a Trap!/Challenge5.1.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/It's a Trap!/Challenge5.1.exe -------------------------------------------------------------------------------- /Journey to Program/desc.txt: -------------------------------------------------------------------------------- 1 | Follow the path to the journey to program. 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Journey%20to%20Program 4 | 5 | Author: Mrunal Chawda 6 | 7 | 250 -------------------------------------------------------------------------------- /Journey to Program/web.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Journey to Program/web.zip -------------------------------------------------------------------------------- /Jumping Jack/desc.txt: -------------------------------------------------------------------------------- 1 | Sometimes, we need to jump back and forth? 2 | 3 | Author: Ansh Bhawnani 4 | 5 | 120 -------------------------------------------------------------------------------- /Jumping Jack/jumpingjack.txt: -------------------------------------------------------------------------------- 1 |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| -------------------------------------------------------------------------------- /Magic Boxes/Challenge2.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Magic Boxes/Challenge2.exe -------------------------------------------------------------------------------- /Magic Boxes/desc.txt: -------------------------------------------------------------------------------- 1 | Correct MessageBox holds your flag. 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Magic%20Boxes 4 | 5 | Author: Raja Prabhu 6 | 7 | 200 -------------------------------------------------------------------------------- /New Character/desc.txt: -------------------------------------------------------------------------------- 1 | Me and friends are doing some tree root testing can you find the fertilizers. 2 | 3 | https://github.com/bittentech/cyberhackctf/blob/master/New%20Character/newcharacter.txt 4 | 5 | Author: R0X4R 6 | 7 | 400 -------------------------------------------------------------------------------- /New Character/newcharacter.txt: -------------------------------------------------------------------------------- 1 | t3Neb4EG00}I%1}3Jml<7gmigJIBPFuE -------------------------------------------------------------------------------- /Not so easy/desc.txt: -------------------------------------------------------------------------------- 1 | me and ROT are playing with some keys but I don't know how he missed the 13th key. Can you please find it for me and decrypt the net for me. 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Not%20so%20easy 4 | 5 | Author: R0X4R 6 | 7 | 500 -------------------------------------------------------------------------------- /Not so easy/not_so_easy.txt: -------------------------------------------------------------------------------- 1 | *key: 2 | 3 | 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 4 | 5 | *flag: 6 | 7 | FlrOd>?YnYrKnUjG>YOV>>C>L2b::pOD5Y>YF1T>?o?Y?La1CU>Uk,Br:O>FFvbB>BNT>Y>odp?YnD9:OFrG>2bSO>G,L:MF>6Fv>vK1>;?Dp:>DrGF1F1X1T,?YrLM>CV>Ub,>1G,OBp?R>FKp>F>lNH>cAb:ph;?DrX>HA5 8 | 9 | -------------------------------------------------------------------------------- /Null Entropy/ciphertext.txt: -------------------------------------------------------------------------------- 1 | TlRRcUtpb3FLaW9xS2lvcUtpb3FLaW9xS2lvcUtpb3FLaW9xS2pNMlpEUXpZU29xS2lvcUtpb3FLaW9xS2lvcUtpb3FLaW9xS2lvcUtpb3FNVFkxT0dVM0tpb3FLaW9xS2lvcUtpb3FLaW9xS2lvcUtpb3FLaW9xS2lwaVlqSmpaR0ZpWXpBeVlUQTFPR1k0WXpNNU16WmhOV1prTm1Sa1pETmpOVEEwT1RFPQ== -------------------------------------------------------------------------------- /Null Entropy/desc.txt: -------------------------------------------------------------------------------- 1 | The management staff has constantly insisted Mr. Chris Brown Chandelier to induce maximum randomness into their security algorithms. He always denied it due to the budget problems, but we think he lacks knowledge of standard applications of symmetric ciphers. Can you show him what problem his actions can produce? 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Null%20Entropy 4 | 5 | NOTE: The '*' character in the string means the correct byte is redacted. 6 | 7 | Author: Ansh Bhawnani 8 | 9 | 400 -------------------------------------------------------------------------------- /Null Entropy/encrypt.py: -------------------------------------------------------------------------------- 1 | from Crypto.Cipher import AES 2 | import binascii, sys 3 | from flag import flag 4 | 5 | key = "3N7g309d6Y7enT**" 6 | IV = flag 7 | 8 | message = 'Security is not a joke, mind it. But complete security is a myth' 9 | 10 | def encrypt(message,passphrase): 11 | aes = AES.new(passphrase, AES.MODE_CBC, IV) 12 | return aes.encrypt(message) 13 | 14 | print("Encrypted data: ", binascii.hexlify(encrypt(message,key)).decode()) 15 | -------------------------------------------------------------------------------- /OS NET/Os-net .txt: -------------------------------------------------------------------------------- 1 | iAAAAAX.;m1paA"iK'bJQ3DL7mk[g,1'Doxd1,lPXNM3UTaKoco3"ox;IFCiky{1TJNxhrYel;5K'"TKYg"Q7LBr1x6Lbfb>oApGQ2ou[R8pnAo] -------------------------------------------------------------------------------- /OS NET/desc.txt: -------------------------------------------------------------------------------- 1 | I was working on my website and encrypted your flag with a python code can you find the key to decode the encrypted text. 2 | 3 | Change a with big a it will help you. 4 | 5 | https://github.com/bittentech/cyberhackctf/tree/master/OS%20NET 6 | 7 | Author: R0X4R 8 | 9 | 400 -------------------------------------------------------------------------------- /Party Popper/desc.txt: -------------------------------------------------------------------------------- 1 | I am more organized than my competitor. We both help you to receive mails. Which port gives immunity to my competitor? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 15 -------------------------------------------------------------------------------- /Pwned!/desc.txt: -------------------------------------------------------------------------------- 1 | My friend Inndy pwned a website. He said it is not on a domain name, just an IP Address. Can you help me find out that IP address? 2 | 3 | Note: If IP is 10.10.10.1 then flag would be cyberhack{10.10.10.1} 4 | 5 | 150 -------------------------------------------------------------------------------- /So_easy/desc.txt: -------------------------------------------------------------------------------- 1 | It's so easy. 2 | 3 | Author: R0X4R 4 | 5 | 100 -------------------------------------------------------------------------------- /So_easy/so-easy.txt: -------------------------------------------------------------------------------- 1 | ZXlKaGJHY2lPaUpJVXpVeE1pSjkuZXcwS0lDQWlZWFYwYUc5eUlqb2dJbEl3V0RSU0lpd05DaUFnSW1ac1lXY2lPaUFpTTJFMWVWOWphRE5sWVRWNUlnMEtmUS5BcDJ6c3RkSVdKNjVISHlXQTNSOU5pOF9IeHRlR2lRQWFBVlk4MGZERzdFLW1OaUJVLVlYa215dGVadUVpQlQ4ZGNIcDhFbjcxS0dUWnBDYVFnY0FmUQ== -------------------------------------------------------------------------------- /Socially Exclusive/ciphertext.txt: -------------------------------------------------------------------------------- 1 | 0f150e091e040d0f07173f1c5f021833013533205d0a5f331f181928355d222b33345c3e11 2 | -------------------------------------------------------------------------------- /Socially Exclusive/desc.txt: -------------------------------------------------------------------------------- 1 | Steven's mom is so worried about his social life. He is so engrossed into something that he has no friends at all. Can you help his mom find out what Steven is engaged into? 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Socially%20Exclusive 4 | 5 | Author: Ansh Bhawnani 6 | 7 | 150 -------------------------------------------------------------------------------- /Socially Exclusive/socially_exclusive.py: -------------------------------------------------------------------------------- 1 | import random 2 | from flag import flag 3 | 4 | key = "This needs to be private lol" 5 | 6 | for i in range(len(key)): 7 | ciphertext = "" 8 | for j in range(len(flag)): 9 | ciphertext += chr(ord(flag[j]) ^ ord(key[i])); 10 | -------------------------------------------------------------------------------- /Storage/desc.txt: -------------------------------------------------------------------------------- 1 | My friend sent me a photograph. I wanna know the zipcode of that place in the image. 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Storage 4 | 5 | Author: http.deep 6 | 7 | 200 -------------------------------------------------------------------------------- /Storage/storage.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Storage/storage.png -------------------------------------------------------------------------------- /Stump/desc.txt: -------------------------------------------------------------------------------- 1 | I am an OS. I am simple. I can help you in DNS. I have a term for the resolver that I have. Do you know? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 10 -------------------------------------------------------------------------------- /Subway Surfer/desc.txt: -------------------------------------------------------------------------------- 1 | IPSec is my passion. It's a commonly used technique in VPNs. In which mode it is used for such applications? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 15 -------------------------------------------------------------------------------- /Switch Eyes/desc.txt: -------------------------------------------------------------------------------- 1 | I was not given much recognition in HTTP/1.0. But now I have my own identity in HTTP/1.1. I was separated from temporary movement code. What is my status code? 2 | 3 | Flag format: cyberhack{ANSWER} 4 | (Replace spaces with '_' if more than one word) 5 | 6 | Author: Ansh Bhawnani 7 | 8 | 25 -------------------------------------------------------------------------------- /Threadify/chall.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Threadify/chall.exe -------------------------------------------------------------------------------- /Threadify/desc.txt: -------------------------------------------------------------------------------- 1 | Find the strings to reveal the hidden flag. 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Threadify 4 | 5 | Author: Raja Prabhu 6 | 7 | 100 -------------------------------------------------------------------------------- /Traffic Jam/desc.txt: -------------------------------------------------------------------------------- 1 | They asked to rebuild the key storage. Can you get me something that can accomplish it? 2 | 3 | Flag format: cyberhack{path} 4 | 5 | Author: Mrunal Chawda 6 | 7 | 150 -------------------------------------------------------------------------------- /Traffic Jam/network_traffic.pcap: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/bittentech/cyberhackctf/506911df776514413ff4f11d6e6ec17790d8cd0d/Traffic Jam/network_traffic.pcap -------------------------------------------------------------------------------- /Trivial Privacy/ciphertext.txt: -------------------------------------------------------------------------------- 1 | 138300746588820253048699262846685433355109334397200087236421330822271432475481688654171403259707743229205040896184092303924072351895392963065987061613528789935177765876727651841806356329667093429488777949586358111639582866999992453267833390557040147433026930307835810905027841968204900930959456995167314494398 -------------------------------------------------------------------------------- /Trivial Privacy/desc.txt: -------------------------------------------------------------------------------- 1 | Whenever we are in trouble, Michael comes as a saviour. What is his secret to this solution? 2 | 3 | https://github.com/bittentech/cyberhackctf/tree/master/Trivial%20Privacy 4 | 5 | Author: Ansh Bhawnani 6 | 7 | 300 -------------------------------------------------------------------------------- /Trivial Privacy/you_may_need_this: -------------------------------------------------------------------------------- 1 | ⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠖⠢⠠⠖⠲⠠⠖⠶⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠂⠲⠢⠠⠖⠆⠠⠖⠴⠠⠖⠢⠠⠖⠴⠠⠖⠢⠠⠖⠢⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠂⠲⠒⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠖⠒⠠⠖⠆⠠⠖⠴⠠⠖⠲⠠⠂⠲⠆⠠⠖⠲⠠⠖⠢⠠⠖⠢⠠⠶⠂⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠴⠠⠂⠲⠂⠠⠖⠲⠠⠂⠲⠲⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠖⠲⠠⠖⠲⠠⠖⠂⠠⠖⠲⠠⠂⠲⠢⠠⠖⠲⠠⠖⠆⠠⠖⠖⠠⠖⠶⠠⠖⠖⠠⠂⠲⠆⠠⠖⠶⠠⠖⠂⠠⠖⠖⠠⠶⠴⠠⠖⠖⠠⠂⠲⠆⠠⠖⠖⠠⠶⠂⠠⠖⠲⠠⠖⠶⠠⠖⠒⠠⠶⠂⠠⠖⠶⠠⠖⠶⠠⠖⠒⠠⠖⠴⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠖⠂⠠⠖⠢⠠⠖⠂⠠⠖⠲⠠⠖⠢⠠⠖⠲⠠⠖⠖⠠⠖⠲⠠⠖⠂⠠⠖⠲⠠⠖⠂⠠⠖⠲⠠⠂⠲⠖⠠⠖⠲⠠⠖⠒⠠⠖⠲⠠⠖⠂⠠⠖⠢⠠⠖⠂⠠⠖⠒⠠⠖⠴⠠⠖⠲⠠⠖⠂⠠⠖⠲⠠⠂⠲⠲⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠖⠒⠠⠖⠲⠠⠖⠂⠠⠖⠲⠠⠂⠲⠆⠠⠖⠲⠠⠖⠆⠠⠖⠖⠠⠖⠶⠠⠖⠢⠠⠖⠂⠠⠖⠲⠠⠖⠲⠠⠖⠢⠠⠖⠒⠠⠖⠖⠠⠂⠲⠖⠠⠖⠲⠠⠂⠲⠂⠠⠖⠖⠠⠖⠒⠠⠖⠖⠠⠖⠶⠠⠖⠲⠠⠖⠢⠠⠖⠲⠠⠖⠲⠠⠖⠲⠠⠂⠲⠲⠠⠖⠖⠠⠂⠲⠆⠠⠖⠲⠠⠖⠢⠠⠖⠖⠠⠖⠢⠠⠖⠖⠠⠖⠖⠠⠖⠒⠠⠖⠆⠠⠖⠖⠠⠖⠲⠠⠖⠲⠠⠶⠴⠠⠖⠢⠠⠶⠴⠠⠖⠲⠠⠖⠂⠠⠖⠲⠠⠖⠂⠠⠖⠖⠠⠖⠢⠠⠖⠒⠠⠖⠴⠠⠖⠖⠠⠂⠲⠂⠠⠖⠴⠠⠂⠲⠂⠠⠖⠢⠠⠖⠢⠠⠖⠶⠠⠶⠴⠠⠖⠢⠠⠖⠂⠠⠖⠒⠠⠶⠂⠠⠖⠆⠠⠂⠲⠆⠠⠖⠲⠠⠂⠲⠒⠠⠖⠶⠠⠖⠴⠠⠖⠶⠠⠖⠂⠠⠖⠢⠠⠖⠆⠠⠖⠲⠠⠖⠒⠠⠖⠲⠠⠖⠶⠠⠖⠒⠠⠶⠂⠠⠖⠲⠠⠂⠲⠒⠠⠖⠖⠠⠶⠴⠠⠖⠶⠠⠖⠢⠠⠖⠒⠠⠖⠶⠠⠖⠒⠠⠖⠲⠠⠖⠶⠠⠖⠖⠠⠖⠖⠠⠂⠲⠲⠠⠖⠖⠠⠂⠲⠲⠠⠖⠖⠠⠖⠲⠠⠖⠢⠠⠖⠲⠠⠖⠖⠠⠶⠴⠠⠖⠆⠠⠂⠲⠖⠠⠖⠖⠠⠖⠖⠠⠖⠲⠠⠂⠲⠆⠠⠖⠲⠠⠖⠶⠠⠖⠲⠠⠂⠲⠢⠠⠖⠖⠠⠖⠆⠠⠖⠲⠠⠂⠲⠒⠠⠖⠒⠠⠖⠲⠠⠖⠖⠠⠖⠆⠠⠖⠒⠠⠖⠆⠠⠖⠢⠠⠶⠴⠠⠖⠖⠠⠂⠲⠒⠠⠖⠲⠠⠖⠖⠠⠖⠶⠠⠖⠆⠠⠖⠲⠠⠂⠲⠒⠠⠖⠢⠠⠖⠶⠠⠖⠖⠠⠖⠢⠠⠖⠒⠠⠖⠶⠠⠖⠢⠠⠖⠆⠠⠖⠢⠠⠖⠴⠠⠖⠶⠠⠶⠂⠠⠖⠶⠠⠶⠂⠠⠖⠒⠠⠖⠲⠠⠖⠖⠠⠖⠂⠠⠖⠖⠠⠖⠆⠠⠖⠲⠠⠖⠲⠠⠖⠒⠠⠖⠢⠠⠖⠖⠠⠖⠒⠠⠖⠶⠠⠖⠒⠠⠖⠢⠠⠖⠒⠠⠖⠖⠠⠖⠢⠠⠖⠲⠠⠖⠖⠠⠖⠒⠠⠶⠴⠠⠖⠖⠠⠶⠴⠠⠖⠒⠠⠖⠶⠠⠖⠖⠠⠶⠴⠠⠖⠲⠠⠂⠲⠆⠠⠖⠖⠠⠶⠂⠠⠖⠶⠠⠖⠶⠠⠖⠢⠠⠂⠲⠂⠠⠖⠶⠠⠖⠲⠠⠖⠴⠠⠂⠲⠂⠠⠖⠢⠠⠖⠴⠠⠖⠶⠠⠖⠂⠠⠖⠢⠠⠖⠶⠠⠖⠒⠠⠶⠂⠠⠖⠖⠠⠖⠂⠠⠖⠖⠠⠖⠆⠠⠖⠶⠠⠖⠲⠠⠖⠢⠠⠖⠆⠠⠖⠶⠠⠶⠂⠠⠖⠶⠠⠶⠴⠠⠖⠒⠠⠖⠲⠠⠖⠲⠠⠂⠲⠂⠠⠖⠖⠠⠖⠢⠠⠖⠢⠠⠖⠖⠠⠖⠖⠠⠖⠢⠠⠖⠲⠠⠂⠲⠂⠠⠖⠲⠠⠂⠲⠲⠠⠖⠢⠠⠖⠢⠠⠖⠒⠠⠖⠂⠠⠖⠲⠠⠂⠲⠒⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠖⠢⠠⠖⠶⠠⠂⠲⠂⠠⠖⠢⠠⠖⠖⠠⠖⠶⠠⠖⠆⠠⠖⠒⠠⠖⠆⠠⠖⠒⠠⠶⠴⠠⠖⠲⠠⠂⠲⠢⠠⠖⠆⠠⠂⠲⠆⠠⠖⠒⠠⠶⠴⠠⠖⠲⠠⠖⠆⠠⠖⠢⠠⠖⠶⠠⠖⠒⠠⠖⠖⠠⠖⠶⠠⠶⠴⠠⠖⠶⠠⠂⠲⠂⠠⠖⠖⠠⠂⠲⠆⠠⠖⠲⠠⠖⠶⠠⠖⠶⠠⠶⠴⠠⠖⠲⠠⠂⠲⠲⠠⠖⠒⠠⠖⠖⠠⠖⠶⠠⠖⠢⠠⠖⠖⠠⠂⠲⠂⠠⠖⠢⠠⠖⠴⠠⠖⠶⠠⠂⠲⠂⠠⠖⠖⠠⠖⠆⠠⠖⠢⠠⠖⠲⠠⠖⠲⠠⠖⠶⠠⠖⠲⠠⠂⠲⠂⠠⠖⠶⠠⠶⠴⠠⠖⠆⠠⠂⠲⠆⠠⠖⠆⠠⠂⠲⠆⠠⠖⠖⠠⠖⠢⠠⠖⠒⠠⠶⠂⠠⠖⠖⠠⠖⠖⠠⠖⠶⠠⠖⠢⠠⠖⠖⠠⠖⠖⠠⠖⠖⠠⠖⠂⠠⠖⠲⠠⠶⠴⠠⠖⠢⠠⠶⠴⠠⠖⠢⠠⠶⠂⠠⠖⠢⠠⠖⠲⠠⠖⠖⠠⠖⠲⠠⠖⠲⠠⠖⠂⠠⠖⠢⠠⠖⠢⠠⠖⠴⠠⠂⠲⠂⠠⠖⠢⠠⠶⠂⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠖⠢⠠⠖⠢⠠⠖⠒⠠⠖⠖⠠⠶⠴⠠⠖⠲⠠⠖⠖⠠⠖⠖⠠⠖⠖⠠⠖⠢⠠⠖⠆⠠⠖⠖⠠⠖⠂⠠⠖⠖⠠⠂⠲⠂⠠⠖⠲⠠⠖⠲⠠⠖⠶⠠⠖⠴⠠⠖⠖⠠⠖⠂⠠⠖⠢⠠⠶⠴⠠⠖⠲⠠⠖⠶⠠⠖⠒⠠⠖⠶⠠⠖⠢⠠⠖⠴⠠⠖⠖⠠⠂⠲⠆⠠⠖⠶⠠⠖⠆⠠⠖⠖⠠⠖⠒⠠⠖⠢⠠⠶⠴⠠⠖⠢⠠⠖⠂⠠⠖⠲⠠⠂⠲⠆⠠⠖⠲⠠⠖⠆⠠⠖⠖⠠⠖⠶⠠⠖⠢⠠⠖⠂⠠⠖⠲⠠⠖⠒⠠⠖⠲⠠⠂⠲⠖⠠⠖⠖⠠⠖⠒⠠⠖⠲⠠⠂⠲⠢⠠⠖⠢⠠⠖⠴⠠⠖⠢⠠⠖⠖⠠⠖⠆⠠⠂⠲⠆⠠⠖⠢⠠⠖⠖⠠⠖⠢⠠⠶⠂⠠⠖⠲⠠⠖⠢⠠⠖⠢⠠⠖⠲⠠⠖⠒⠠⠶⠴⠠⠖⠲⠠⠖⠖⠠⠖⠖⠠⠖⠶⠠⠖⠖⠠⠖⠢⠠⠖⠖⠠⠶⠴⠠⠖⠶⠠⠖⠢⠠⠖⠖⠠⠖⠆⠠⠖⠲⠠⠂⠲⠖⠠⠖⠖⠠⠖⠂⠠⠖⠖⠠⠂⠲⠂⠠⠖⠒⠠⠖⠢⠠⠖⠒⠠⠖⠖⠠⠖⠒⠠⠖⠖⠠⠖⠢⠠⠖⠖⠠⠖⠒⠠⠖⠒⠠⠖⠲⠠⠖⠶⠠⠖⠖⠠⠖⠲⠠⠖⠢⠠⠖⠒⠠⠖⠖⠠⠂⠲⠢⠠⠖⠢⠠⠂⠲⠂⠠⠖⠲⠠⠂⠲⠖⠠⠖⠲⠠⠶⠂⠠⠖⠖⠠⠂⠲⠲⠠⠖⠢⠠⠖⠶⠠⠖⠖⠠⠂⠲⠂⠠⠖⠒⠠⠖⠶⠠⠖⠲⠠⠖⠂⠠⠖⠴⠠⠂⠲⠂⠠⠖⠢⠠⠖⠂⠠⠖⠲⠠⠶⠴⠠⠖⠶⠠⠖⠖⠠⠖⠢⠠⠖⠲⠠⠖⠖⠠⠖⠶⠠⠖⠒⠠⠶⠴⠠⠖⠶⠠⠶⠂⠠⠖⠢⠠⠶⠂⠠⠖⠲⠠⠖⠆⠠⠖⠢⠠⠖⠖⠠⠖⠒⠠⠖⠖⠠⠖⠲⠠⠖⠶⠠⠖⠢⠠⠖⠲⠠⠖⠖⠠⠂⠲⠢⠠⠖⠖⠠⠖⠶⠠⠖⠒⠠⠖⠢⠠⠖⠒⠠⠖⠆⠠⠖⠶⠠⠶⠴⠠⠖⠒⠠⠖⠢⠠⠖⠖⠠⠖⠶⠠⠖⠖⠠⠂⠲⠢⠠⠖⠲⠠⠂⠲⠢⠠⠖⠒⠠⠖⠖⠠⠖⠖⠠⠖⠲⠠⠖⠲⠠⠖⠒⠠⠖⠖⠠⠂⠲⠂⠠⠖⠖⠠⠂⠲⠖⠠⠖⠢⠠⠖⠶⠠⠖⠶⠠⠶⠂⠠⠖⠶⠠⠖⠲⠠⠖⠶⠠⠶⠴⠠⠖⠶⠠⠶⠂⠠⠖⠒⠠⠖⠂⠠⠖⠶⠠⠶⠴⠠⠖⠶⠠⠖⠒⠠⠖⠢⠠⠶⠂⠠⠖⠖⠠⠖⠲⠠⠖⠢⠠⠖⠖⠠⠖⠢⠠⠖⠆⠠⠖⠢⠠⠖⠶⠠⠖⠖⠠⠂⠲⠲⠠⠖⠖⠠⠖⠶⠠⠖⠶⠠⠖⠖⠠⠖⠒⠠⠶⠂⠠⠖⠒⠠⠖⠒⠠⠖⠖⠠⠂⠲⠢⠠⠖⠖⠠⠂⠲⠒⠠⠖⠢⠠⠖⠒⠠⠖⠲⠠⠂⠲⠆⠠⠖⠆⠠⠂⠲⠆⠠⠖⠖⠠⠖⠲⠠⠖⠒⠠⠖⠖⠠⠖⠒⠠⠖⠂⠠⠖⠆⠠⠂⠲⠆⠠⠖⠆⠠⠂⠲⠖⠠⠖⠒⠠⠶⠂⠠⠖⠶⠠⠶⠴⠠⠖⠒⠠⠖⠴⠠⠖⠖⠠⠖⠒⠠⠖⠢⠠⠖⠶⠠⠖⠶⠠⠖⠂⠠⠖⠆⠠⠂⠲⠆⠠⠖⠶⠠⠖⠖⠠⠖⠢⠠⠶⠴⠠⠖⠴⠠⠂⠲⠂⠠⠖⠖⠠⠶⠴⠠⠖⠖⠠⠂⠲⠆⠠⠖⠢⠠⠂⠲⠂⠠⠖⠢⠠⠖⠴⠠⠖⠖⠠⠖⠲⠠⠖⠆⠠⠂⠲⠆⠠⠖⠶⠠⠖⠒⠠⠖⠖⠠⠂⠲⠢⠠⠖⠲⠠⠂⠲⠒⠠⠖⠲⠠⠖⠆⠠⠖⠖⠠⠂⠲⠆⠠⠖⠖⠠⠶⠴⠠⠖⠒⠠⠖⠂⠠⠖⠖⠠⠖⠶⠠⠖⠒⠠⠖⠖⠠⠖⠖⠠⠶⠴⠠⠖⠒⠠⠖⠴⠠⠖⠒⠠⠖⠆⠠⠖⠲⠠⠖⠂⠠⠖⠖⠠⠶⠴⠠⠖⠲⠠⠖⠶⠠⠖⠒⠠⠖⠒⠠⠖⠲⠠⠂⠲⠆⠠⠖⠢⠠⠖⠢⠠⠖⠶⠠⠖⠒⠠⠖⠶⠠⠶⠴⠠⠖⠶⠠⠖⠂⠠⠖⠲⠠⠖⠢⠠⠖⠖⠠⠶⠴⠠⠖⠖⠠⠂⠲⠲⠠⠖⠒⠠⠖⠂⠠⠖⠶⠠⠖⠴⠠⠖⠶⠠⠖⠒⠠⠖⠶⠠⠖⠂⠠⠖⠶⠠⠂⠲⠂⠠⠖⠒⠠⠖⠂⠠⠖⠢⠠⠖⠖⠠⠖⠖⠠⠂⠲⠒⠠⠖⠆⠠⠂⠲⠆⠠⠖⠖⠠⠖⠶⠠⠖⠶⠠⠖⠲⠠⠖⠖⠠⠖⠂⠠⠖⠖⠠⠂⠲⠲⠠⠖⠲⠠⠖⠶⠠⠖⠲⠠⠶⠂⠠⠖⠢⠠⠖⠶⠠⠖⠒⠠⠖⠂⠠⠖⠢⠠⠖⠆⠠⠖⠖⠠⠂⠲⠂⠠⠖⠒⠠⠖⠆⠠⠖⠢⠠⠖⠒⠠⠖⠲⠠⠖⠢⠠⠖⠒⠠⠖⠖⠠⠖⠒⠠⠖⠴⠠⠖⠶⠠⠖⠆⠠⠖⠖⠠⠂⠲⠢⠠⠖⠖⠠⠂⠲⠒⠠⠖⠲⠠⠖⠖⠠⠖⠒⠠⠖⠆⠠⠖⠲⠠⠂⠲⠢⠠⠖⠖⠠⠖⠒⠠⠖⠲⠠⠂⠲⠖⠠⠖⠶⠠⠖⠖⠠⠖⠖⠠⠂⠲⠢⠠⠖⠴⠠⠂⠲⠂⠠⠖⠢⠠⠖⠖⠠⠖⠶⠠⠶⠂⠠⠖⠲⠠⠖⠒⠠⠖⠖⠠⠂⠲⠂⠠⠖⠒⠠⠖⠒⠠⠖⠶⠠⠖⠶⠠⠖⠒⠠⠂⠲⠲⠠⠖⠒⠠⠂⠲⠲⠠⠖⠴⠠⠂⠲⠂⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠲⠠⠖⠢⠠⠖⠲⠠⠂⠲⠢⠠⠖⠲⠠⠖⠲⠠⠖⠆⠠⠖⠴⠠⠖⠢⠠⠖⠴⠠⠖⠢⠠⠖⠢⠠⠖⠲⠠⠖⠆⠠⠖⠲⠠⠂⠲⠒⠠⠖⠲⠠⠶⠂⠠⠖⠲⠠⠖⠒⠠⠖⠆⠠⠖⠴⠠⠖⠲⠠⠂⠲⠆⠠⠖⠲⠠⠖⠢⠠⠖⠢⠠⠶⠂⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲⠠⠖⠆⠠⠂⠲⠲ -------------------------------------------------------------------------------- /We Love Fillers/desc.txt: -------------------------------------------------------------------------------- 1 | Helo Dear Bob. 2 | I hope you are at home and safe. Please tell a method how do I include just a period in a line. This server will terminate my message when I send a dot. 3 | Take care, Alice. 4 | 5 | . 6 | 7 | 8 | Flag format: cyberhack{ANSWER} 9 | (Replace spaces with '_' if more than one word) 10 | 11 | Author: Ansh Bhawnani 12 | 13 | 30 --------------------------------------------------------------------------------