01 logo

Bsides Indore Practice CTF

Cryptography and forensic challenges

By Samyakt Published about a year ago 3 min read
Like

Greetings to all! Here is a beginner practice CTF from Bsides Indore. The practice CTF will continue until May 2023. It is strongly recommended that beginners attempt this CTF to better understand the tools, methodologies, and learning concepts.

Visit: http://livectf.bsidesindore.in/

What is CTF?

A CTF refers to a game in which players make use of their skills in order to solve problems or break into the system of an opponent. Below are the different types of CTFs –

  1. Jeopardy style: Players are required to solve certain problems to earn "flags" (a specific string of text). The flag is then submitted to a website or scoring engine in exchange for points.
  2. Attack-defense: Two teams are created in this type of scenario: Red Team (which attempts to breach the system) and Blue Team (which seeks to defend the system).

Cryptography Challenges

1.BrainF**ked

    The Cipher name is already included in the title of this challenge, which makes it very obvious. This challenge can be solved by below URL https://www.dcode.fr/brainfuck-language

    2. Rotten Flag?

    The name of the challenge gives a hint about Rot cipher, which is a simple character substitution that is based on the shift and rotation of N letters in an alphabet.

    Use this to solve the above challenge https://www.dcode.fr/rot-cipher.

3. esrever

It looks like a reverse string, So we tried to reverse the given string by using this amazing online tool https://gchq.github.io/CyberChef/#recipe=Reverse('Character')&input=Cg

4. Dots and Dashes

Those who play CTF regularly can easily recognize this cipher as Morse code. Use this link https://www.boxentriq.com/code-breaking/morse-code to solve this challenge.

5. Basic Nature

In this challenge the string is given in base32 form, We have used cyberchef for decoding, We can also use this command for decoding

echo “NRUXMZL3N54TGX2EJJPWEYLTMVPWEYLENBQV6QSBKNCX2===” | base32 -d

6. Another Basic Nature?

This challenge is similar to the above one, Base64 is used on this challenge, using cyberchef, we can easily decode this.

7. Vinegar

In this given challenge, Vigenere Cipher is used, We can use the below link for solving this challenge https://www.dcode.fr/vigenere-cipher.

8. AK47

This challenge is all about ROT47, We have to use cyberchef https://gchq.github.io/CyberChef/#recipe=ROT47(47) for decoding.

9. Solve for PAT

The challenge presented here is quite interesting. In this challenge, we have provided a waterfromtap file attached in which we have found the following string.

The filename (waterfromtap) appears to be unknown, but if we analyze it properly, we find that it is related to tap encryption, so we have used it. https://cryptii.com/pipes/tap-code#:~:text=The%20tap%20code%20or%20knock,to%20communicate%20with%20each%20other. for solving the challenge.

In order to obtain the flag, We must convert the asterisk sign into a dot sign, then use the above-mentioned link.

10. World War II

In this challenge, If we analyze the description then we got the UKW C, If we google UKW C then we get to know that this challenge is regarding the enigma machine.

We need to use this link to solve the above challenge https://cryptii.com/pipes/P2CeCw.

11. Dev Lan What?

In this challenge, we have used this site https://www.devglan.com/online-tools/aes-encryption-decryption to decrypt the AES cipher.

Forensic Challenges

1. Elastic String

In this challenge we have given one attached image, We only need to use the strings tool for getting the flag.

Command: strings ctf.jpg

2. El As Bee

In this challenge we have been given a png image, So We have used the zsteg tool to find hidden data.

You can use this site https://github.com/zed-0xff/zsteg for downlode the zsteg tool.

It is that simple, folks!

Look forward to new CTF articles, so follow me on LinkedIn.

cybersecurity
Like

About the Creator

Samyakt

BYT3

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.