Merge pull request #5 from yaudahbanh/Nahamcon-CTF-2023
Add Zombie, JNinjasepak, and tiny little fiberspull/7/head
|
@ -0,0 +1,20 @@
|
|||
# JNInjaspeak
|
||||
> We are all very familiar with Leetspeak, can you crack the code on how JNInjaspeak works?
|
||||
|
||||
## About the Challenge
|
||||
|
||||
Given .apk files, and we must analyzed it to find flag
|
||||
|
||||
[file.apk](files/jninjaspeak.apk)
|
||||
|
||||
## How to Solve
|
||||
|
||||
To solve this, all you need is `strings` command
|
||||
|
||||
The following command is like this `strings file.apk | grep "flag"`
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
flag{1f539e4a706e6181dae9db3fad6a78f1}
|
||||
```
|
After Width: | Height: | Size: 147 KiB |
|
@ -0,0 +1,30 @@
|
|||
# Zombie
|
||||
> Oh, shoot, I could have sworn there was a flag here. Maybe it's still alive out there?
|
||||
|
||||
## About the Challenge
|
||||
|
||||
We given some machine and find the flag
|
||||
|
||||
## How to Solve
|
||||
|
||||
First we gonna look up the directory with `ls -la`
|
||||
|
||||
And you will find some interesting script
|
||||
|
||||
![solve1](images/solve1.png)
|
||||
|
||||
From that script, we analyzed the flag is already deleted, but we can use `ps aux` to see the process of script
|
||||
|
||||
![solve2](images/solve2.png)
|
||||
|
||||
After that we can see the process in `/proc/` directory
|
||||
|
||||
![solve3](images/solve3.png)
|
||||
|
||||
Last we just can cat the flag with `cat /proc/PID/fd/numbers`
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
flag{6387e800943b0b468c2622ff858bf744}
|
||||
```
|
After Width: | Height: | Size: 34 KiB |
After Width: | Height: | Size: 304 KiB |
After Width: | Height: | Size: 194 KiB |
After Width: | Height: | Size: 192 KiB |
|
@ -0,0 +1,24 @@
|
|||
# tiny little fibers
|
||||
> Oh wow, it's another of everyone's favorite. But we like to try and turn the ordinary into extraordinary!
|
||||
|
||||
## About the Challenge
|
||||
|
||||
We given the image file, and we need analyze to find flag
|
||||
|
||||
[images](images/tiny-little-fibers)
|
||||
|
||||
## How to Solve
|
||||
|
||||
To solve this, all you need is `stegsolve`
|
||||
|
||||
You can download here [stegsolve](https://github.com/zardus/ctf-tools/blob/master/stegsolve/install)
|
||||
|
||||
But before you open it to stegsolve, make sure already add the `.jpeg` extension
|
||||
|
||||
After that `Analyse` > `File Format`, just slowly scroll down and you got flag
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
flag{22c534c5abea84bf6c1193e263f7259f}
|
||||
```
|
After Width: | Height: | Size: 7.2 KiB |
After Width: | Height: | Size: 608 KiB |