Merge pull request #5 from yaudahbanh/Nahamcon-CTF-2023

Add Zombie, JNinjasepak, and tiny little fibers
pull/7/head
Muhammad Daffa 2023-06-26 20:13:15 +07:00 committed by GitHub
commit 88bcee2a93
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
11 changed files with 74 additions and 0 deletions

View File

@ -0,0 +1,20 @@
# JNInjaspeak
> We are all very familiar with Leetspeak, can you crack the code on how JNInjaspeak works?
## About the Challenge
Given .apk files, and we must analyzed it to find flag
[file.apk](files/jninjaspeak.apk)
## How to Solve
To solve this, all you need is `strings` command
The following command is like this `strings file.apk | grep "flag"`
![flag](images/flag.png)
```
flag{1f539e4a706e6181dae9db3fad6a78f1}
```

Binary file not shown.

Binary file not shown.

After

Width:  |  Height:  |  Size: 147 KiB

View File

@ -0,0 +1,30 @@
# Zombie
> Oh, shoot, I could have sworn there was a flag here. Maybe it's still alive out there?
## About the Challenge
We given some machine and find the flag
## How to Solve
First we gonna look up the directory with `ls -la`
And you will find some interesting script
![solve1](images/solve1.png)
From that script, we analyzed the flag is already deleted, but we can use `ps aux` to see the process of script
![solve2](images/solve2.png)
After that we can see the process in `/proc/` directory
![solve3](images/solve3.png)
Last we just can cat the flag with `cat /proc/PID/fd/numbers`
![flag](images/flag.png)
```
flag{6387e800943b0b468c2622ff858bf744}
```

Binary file not shown.

After

Width:  |  Height:  |  Size: 34 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 304 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 194 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 192 KiB

View File

@ -0,0 +1,24 @@
# tiny little fibers
> Oh wow, it's another of everyone's favorite. But we like to try and turn the ordinary into extraordinary!
## About the Challenge
We given the image file, and we need analyze to find flag
[images](images/tiny-little-fibers)
## How to Solve
To solve this, all you need is `stegsolve`
You can download here [stegsolve](https://github.com/zardus/ctf-tools/blob/master/stegsolve/install)
But before you open it to stegsolve, make sure already add the `.jpeg` extension
After that `Analyse` > `File Format`, just slowly scroll down and you got flag
![flag](images/flag.png)
```
flag{22c534c5abea84bf6c1193e263f7259f}
```

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.2 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 608 KiB