Introduction This is our first CTF Competition hosted by n0h4ts. We managed to complete 3 challenges which was a decent accomplishment for our first attempt. This is a small writeup of the challenges that my team and I completed.
Fetus Crypto A ROT encryption
Featus Crypto was an easy one. The hint given had the keyword “ROT”, hinting at a ROT Cipher. There are many cipher decryptors online and this challenge was cracked quickly upon release.
Description This file has a flag in plain sight (aka “in-the-clear”).
Process The flag was downloaded on a Windows machine (probably not a good idea), using notepad++ to view the file, the flag was found in the file.
However, using the cat command on a Linux machine, the flag should also be found.
Flag picoCTF{s4n1ty_v3r1f13d_1f6e3b3b} {: file="flag.txt” }
Description Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information…
Process {: width="972” height="589” }
Hex Editor in VSCode
The flag is found in the file, but it is not in plain sight. Using a hex editor, the flag can be found.
The word binary triggered me to use some sort of hex editor to view the file. I used VSCode to view the file, and found the flag.
Description Cryptography can be easy, do you know what ROT13 is?
The flag given: cvpbPGS{arkg_gvzr_V'yy_gel_2_ebhaqf_bs_ebg13_uJdSftmh}
Process Using an online tool for ROT13, we can decode the message to get the flag.
Doing a ROT13 Decryption of cvpbPGS{arkg_gvzr_V'yy_gel_2_ebhaqf_bs_ebg13_uJdSftmh}, I get the flag: picoctf{next_time_i'll_try_2_rounds_of_rot13_hwqfsgzu}
Flag picoctf{next_time_i'll_try_2_rounds_of_rot13_hwqfsgzu} {: file="flag.txt” }