Skip to content

Latest commit

 

History

History
132 lines (106 loc) · 6.17 KB

README.md

File metadata and controls

132 lines (106 loc) · 6.17 KB

ShaastraCTF2024

CTF Questions for Shaastra 2024

Q1

Name: Fourier, Laplace and CNN
Logic: convolutional encoding, of order 1 . I.e we shift the string by 1 unit and then sum it up with the original string to generate an encoding with 1 more letter than the original.
Difficulty : 6

Tip

Have you heard of convolution?

Q2

Name: Everest Base Camp
Logic: A random noisy image, wherein the base 36 encodings will contain the password
Difficulty : 6

Tip

You have heard of bases 2, 8,10, and 16... how far do you think we jumped?

Q3

Name: Deep Dive Discovery
Logic: A .jpg file will have a .zip file when extracted will have another .zip file, and this will go on 1000 times, and the last folder will have the flag.txt file
Difficulty: 8

Tip

Images have X and Y axes. Does this file have a Z-axis too?

Q4

Name : Name(A Recursion Reference)
Logic: A recursive algorithm that does not function like normal recursive functions is written. Long story short, an equivalent iterative loop must be figured out and used to generate fibbmod(250)
Difficulty : 8

Tip

Every recursive function has an equivalent iterative form

Q5

Name: The Flip Side of Binary
Logic: The flag is converted to ASCII numbers in binary form. This binary form is 1's complemented and converted back to numbers and placed in a TXT file. This is the same as the 127-ASCII value
Difficulty: 2

Tip

No clue

Q6

Name: Corporate Trails
Logic: We provide an image and tell the person to find the flag hinting at the author's workplace
Difficulty : 6

Tip

Where does this person work?

Q7

Name : Acropolis
Logic: We provide an image of the Acropolis and say - "Shattering the location of this image gives you the answer, Quickly. Submit it like this - 6f79e83ebf4321cad0f70cf9664e4540dbb89e33bce5abc70574589a". We need to scramble the letters in the word "Athens" and submit it in SHA224 hashed format
Difficulty : 5

Tip

Unscramble and Hash

Q8

Name: Decoding Digits
Logic: We provide the file executable and ask them to crack the 6-digit code and submit it as ShaastraCTF{...}. It does not give out a correct answer output even for the correct answer, we must find the answer by observing which input takes the longest to run.
Difficulty : 6

Tip

Is Runtime proportional to the Correct solution?

Q9

Name: SSL Buster
Logic: We provide a .pcapng file of a MySQL Server-Client interaction, and we ask them to print out the base64 encoded raw dump of the TLS-decrypted SSL certificate, in the format ShaastraCTF{...}. The SSL key is in the file comments.
Difficulty : 10

Tip

Use the SSL key to decrypt packets through the TSL protocol.

Q10

Name: Gottfried and Bob Bemer
Logic: Gottfried discovered binary. In the question, the repeated use of two instead of to and too also suggests usage of binary format. Replace uppercase letters by 1, lowercase letters by 0. Split at every 7th letter. Convert every 7 bits to decimal and replace these from ASCII values to characters. The flag is obtained from "iAmTWobOreDOffINdiNGfLaGsIwANTTWodOSoMEThINgMoreinTEresTinGWaItDiDyOUSEEtHatTwoNoyOUdIdNoTiJUSTFouNDtHEFlAGnOwiamgOIngTWoThENEXTqUestIOnyOucANalsoGOiFyouWishTWO"
Difficulty : 6

Tip

There are Two Types of leTTers in This senTence.

Q11

Q11: Name: Going low
There is an assembly file that participants must download. Inside there is a line to give a particular number as input. And there is another target line, i.e. if the code reaches the target line, the input number given is the solution. Op1 calculates (a+b)%256, where a is n^n and b is n!; Without any prime factors of 2. Op2 is a complex way to check if the result of op1 is 1. Can be solved mathematically. The ideal solution is to modify the code to cycle through all possible inputs and find the answer on its own.
Difficulty : 8

Tip

Who knows what op1 does

Q12

Name: Cold & Hot
Logic: Interactive a.exe is given. Players have to guess the number to get the password. The program returns hot and cold opposite to the normal conventions, i.e cold means you are close and hot means you are far from the right answer.
Difficulty : 4

Tip

The convention has been flipped, just like the name!

Q13

Name: Event

Logic: The image cannot be opened so use a hex editor to open it. In the character area, the first part of the flag is given at the end. Compare the magic bytes in the hexadecimal area with that of a jpg and correct it. Now the image can be opened directly and the 2nd part is displayed. The third part can be found by running an executable file by typing the event name, i.e "CTF" (case insensitive).
Difficulty: 6

Tip

No Clue

Q14

Name: RSA
While sleuthing around your network , you see that there is a transmission with RSA encryption. Knowing that its not possible to hack the RSA codes due to the extensive amount of computing power that you would require , you were about to move on ,but something catches your eye , the public key , is only 24 bits long ! You quickly collect the encrypted message and get to work..... What is the decoded message:

Difficulty : 5

Tip

Not needed

Q15

Name: Musical Math
Logic: We give the participants the following statement: "After hacking into xyz's database, you now have access to all the password stored, but they are in their encrypted form. Some quick Data analysis shows that the most commonly encrypted password over there is ********(Replace this with the encrypted form form of 123456 , as this is the most commonly used password in the world). You want to hack into IITM's account , and their encrypted password is _______(Replace with encrypted flag) , can you figure out the decrypted password ?
Difficulty : 7

Tip

The password has been hashed twice
1: 0
2: 1
3: 0
4: 1
5: 2
6: 6
7: 1
8: 3
9: 0
10: 1