Nithilan Valan Week 4 CTF Report Hacktify Internship
Nithilan Valan Week 4 CTF Report Hacktify Internship
Description: Web 2.0 challenges in CTFs typically involve exploiting modern web
applications that rely on dynamic content, AJAX, APIs, and client-side interactions.
These challenges may include XSS (Cross-Site Scripting), CSRF (Cross-Site Request
Forgery), SQL Injection, IDOR (Insecure Direct Object References), API
vulnerabilities, and logic flaws. They often require understanding how web
applications interact with users and servers, leveraging JavaScript, cookies, session
management, and API endpoints to find security loopholes.
1. Initial Reconnaissance: After opening the given URL, I saw that there was a
keypad for a PIN to be entered.
2. Exploitation: I typed /robots.txt at the end of the URL. That opened a page
which gave the correct PIN: 1928. I entered that PIN in the keypad.
Flag: flag{V13w_r0b0t5.txt_c4n_b3_u53ful!!!}
Category: Web 2.0 (The World – Points: 150)
Description: Web 2.0 challenges in CTFs typically involve exploiting modern web
applications that rely on dynamic content, AJAX, APIs, and client-side interactions.
These challenges may include XSS (Cross-Site Scripting), CSRF (Cross-Site Request
Forgery), SQL Injection, IDOR (Insecure Direct Object References), API
vulnerabilities, and logic flaws. They often require understanding how web
applications interact with users and servers, leveraging JavaScript, cookies, session
management, and API endpoints to find security loopholes.
1. Initial Reconnaissance: I opened the given URL and noticed that there were
many directories in it.
4. Flag Retrieval: The flag was revealed in the output of the decoder.
Flag: FLAG{Y0u_hav3_4xpl0reD_th3_W0rLd!}
Category: Network Forensics (Corrupted – Points: 100)
1. Initial Reconnaissance: I tried to open the PNG image file, but an error
message came, stating that the file is either corrupted or its format is not
supported. I realized that this was because the image file’s header was
corrupted.
2. Exploitation: I uploaded the file to hexed.it where I could see all the bytes of
the file. The first row contained 8 bits (1 byte) which was the byte of the file’s
header. I changed those 8 values to: 89 50 4E 47 0D 0A 1A 0A. Then I saved
the new image file.
3. Flag Retrieval: After opening the uncorrupted image file, I found the flag to
be displayed in the image.
Flag: flag{m3ss3d_h3ad3r$}
Category: Network Forensics (Shadow web – Points: 150)
protocols. This MULTIverse of packets contains some Form Data which can reveal
the secrets of the Web. Try to find these secrets that are scattered to get a flag.
Flag: flag{mult1pl3p4rtsc0nfus3s}
Category: Reverse Engg (Lost in the Past – Points: 150)
Challenge Overview: I enjoyed making small projects when I was at a young age! I
used to love hiding random funny texts in my projects that no one else could
understand but myself. Coincidentally, I found a project file of something I made at
that time. But it’s been so long, I can’t find that text. Can you help me find it?
1. Initial Reconnaissance: I learned that the given aia file can be renamed into a
zip file so that it can extracted to reveal compressed files.
2. Exploitation: After renaming the file to zip and extracting its contents, I
noticed that there were 3 compressed files: Screen1.scm, Scrum.bky, and
project.properties. I noticed that in Scrum.bky, there was a text box field
named, Cipher, in the XML code with the value:
7=28LE__0>F490C6GbCD?8N. I found out that the cipher is ROT47
encrypted. I created a python code to decode that ROT47 encrypted cipher.
3. Flag Retrieval: The flag was revealed in the output after running the ROT47
decoder python program.
Flag: flag{t00_much_rev3rs1ng}
Category: Reverse Engg (Decrypt Quest – Points: 200)
1. Initial Reconnaissance: I noticed that the given file had a lot of base64
encoded text.
2. Exploitation: I used base64 decoder to decode that text. In the decoded text
result, I saw a java program with a large cipher table that contained a Google
drive link in a comment. I opened that link and it led me to file called kEY.txt
which contained a brainfuck program. Using the brainfuck translator on
dcode.fr, I found a hint where I needed to learn about Unix Epoch Year to
find the flag. I googled about it, and found out that Unix Epoch time started
on January 1st, 1970. I kept the year 1970 in mind. I modified the java program
such that it brute forces the decryption of the cipher table from 1 till its
maximum value and creates and stores a file with all the input integers and
corresponding flag outputs. I ran that program and saw that the created file
had 1106 outputs. I pressed Ctrl+F to search for ‘1970’.
3. Flag Retrieval: I saw that input integer 571 had a flag that contained ‘1970’,
which was the correct flag.
Flag: flag{hjwilj111970djs}
Category: OSINT (Time Machine – Points: 100)
and intelligence. This includes data from social media, public records, websites, and
more.
Challenge Overview: Mr. TrojanHunt has power to travel time. He is hiding some
extremely confidential file from the government. Can you help NIA to get secrets of
TrojanHunt?
Flag: flag{Tr0j3nHunt_t1m3_tr4v3l}
Category: Crypto (Wh@t7he#### – Points: 100)
encoding it in such a way that only authorized parties can access and understand it.
signatures.
Challenge Overview: A file with an encrypted message is given. You should find out
what encryption algorithm was used and decrypt that to get the flag.
Flag: flag{R3vers3ddd_70_g3t_m3}
Category: Crypto (Success Recipe – Points: 150)
encoding it in such a way that only authorized parties can access and understand it.
signatures.
Challenge Overview: My friend who is a Chef sent me this recipe but i can't
understand it He likes to write in weird languages Can you help me?
Flag: flag{y0u_40+_s3rv3d!}