ctf-writeup/0ByteCTF 2023/One of the greatest matches...
Muhammad Daffa 4adf31cf8b feat: added 0ByteCTF 2023 2023-08-21 23:33:04 +07:00
..
images feat: added 0ByteCTF 2023 2023-08-21 23:33:04 +07:00
One of the greatest matches of all time.zip feat: added 0ByteCTF 2023 2023-08-21 23:33:04 +07:00
README.md feat: added 0ByteCTF 2023 2023-08-21 23:33:04 +07:00

README.md

One of the greatest matches of all time!

The stage was set for an epic showdown as two of the biggest WWE superstars of their generations, The Rock and John Cena, faced off in a match that was billed as "Once in a Lifetime." The atmosphere in the Sun Life Stadium was electrifying, with fans from around the world eagerly anticipating this clash of titans.

About the Challenge

Given a ZIP file containing 2 images: onfire.jpg and rockvjohn.jpg. These two files have significantly different file sizes, with onfire.jpg being 284 KB and rockvjohn.jpg being 2 MB. (You can download the file [here](One of the greatest matches of all time.zip))

filesize

How to Solve?

The first step is to use the exiftool command to display metadata from a file. So, I will use exiftool on both of these files. Here's the command I used:

exiftool onfire.jpg
exiftool rockvjhon.jpg

exiftool

The exiftool results for rockvjohn.jpg are not interesting, in contrast to the file onfire.jpg. There is a comment that says hatta1902. There is a possibility that this is a password that can be used on the file rockvjhon.jpg considering that the file size is unusual. Here is the command I used, which is steghide to perform file extraction because steganographic techniques have been applied to the file.

steghide

My suspicion turned out to be correct, and there is a file with the .docx extension generated using the command above. Now, we will move to the file readme.docx. When the file is opened, there is a password that locks this file.

docx

To unlock this password, we will need to use John The Ripper to perform password cracking and office2john to convert the document file that will undergo brute force into the john format. Here's the command I used to perform password cracking on the Word document.

office2john readme.docx > hash.txt
john -w=/usr/share/wordlists/rockyou.txt hash.txt

After that, wait for John to successfully crack the password. If you want to see the cracked password, then execute the command below.

john show hash.txt

john

The password for this document is emiliano. Let's open the file using the obtained password.

random_lines

Inside the file, there are seemingly random lines. However, upon closer inspection, these lines are not just lowercase l letters; there are also capital I letters interspersed within the arrangement of lines. If you use the search feature in Word to look for capital I letters, you will find a letter on each page.

example_character

For example, the image above represents pages 7 and 8, forming the characters F and L. If all these characters are collected, you will find a shortlink: https://s.id/1FLAGHERE945. If you open this link, you will be redirected to a locked Pastebin page.

pastebin

Fortunately, there's a hint: the password for the Pastebin is the same as the password to extract the file.

hint

And finally, I entered the password emiliano, which is the password I used to unlock the locked document file.

flag

0byteCTF{JH0N_&_R0cK_Ar3_B3st_Fr1eNd}