TryHackMe – CTF Collection vol 1

1 – Can you decode the following?

VEhNe2p1NTdfZDNjMGQzXzdoM19iNDUzfQ==

echo VEhNe2p1NTdfZDNjMGQzXzdoM19iNDUzfQ== | base64 -d

THM{ju57_d3c0d3_7h3_b453}

2 – Meta meta.

Meta! meta! meta! meta……………………………..

I’m hungry, I need the flag.

Download attachment: findme.jpg

Steghide didn’t find anything with the passphrase meta – good first guess though

Try inspecting file metadta by running: file Findme.jpg

Nothing useful there. Moved on, and started googling image metadata analysis on linux and the recommendation was to use EXIF…

Installing EXIF and using it on findme.jpg reveals…

THM{3x1f_0r_3x17}

3 – Mon, are we going to be okay?

Something is hiding. That’s all you need to know.

It is sad. Feed me the flag.

Download attachment: extinction.jpg

First instinct is steghide and feed it the old flag as the passphrase. This didn’t work but using EXIF on the image reveals something is not right:

Tried poking around on a few things but didn’t get anywhere. Decided to google “exif corrupt data” and found this threat recommending use of exiftool: https://askubuntu.com/questions/1075308/corrupt-data-reported-by-exif

Running it did reveal more:

After messing around for a while poking around, I looked at the hint and it revealed we did need to use steghide…..so my initial suspicion was correct but it did not want to actually be fed the flag as a passphrase. After trying various passphrases (sad, the flag, flag, theflag, etc..) I finally just hit enter and provided no passphrase and, of course, that worked.

4 – Erm…Magick

Huh, where is the flag?

Did you find the flag?

Well this one worked out very quickly for me. When copying the question to paste here it grabbed the whole line and revealed “hidden” test in white font color:

THM{wh173_fl46}

Alternatively, inspecting page element would reveal the same:

5 – QRrrrr

Such technology is quite reliable

More flag please!

Download attachment: QR.jpg

THM{qr_m4k3_l1f3_345y}

6 – Reverse it or read it?

Both works, it’s all up to you.

Found the flag?

Download attachment: hello.hello

cat hello.hello

THM{345y_f1nd_345y_60}

7 – Another decoding stuff

Can you decode it?

3agrSy1CewF9v8ukcSkPSYm3oKUoByUpKG4L

Oh, Oh, Did you get it?

Tried base64 decode

Tried base32 decode

Tried some ROT ciphers

Tried Caesar cipher

Googled the string andf first result was base58 decode

Found a tool, copy/pasted, and:

THM{17_h45_l3553r_l3773r5}

8 – Left or Right

Left, right, left, right… Rot 13 is too mainstream. Solve this

MAF{atbe_max_vtxltk}

Reading into the prompt, it sounds like it will be a ROT cipher but not standard.

Left, right, left, right – makes me think it will be alternating rotation directions

We don’t know the ROT interval, but we do know how the flag string should begin:

THM{

Plotting this out quickly in excel we can see it’s ROT20 but not alternating directions

Complete for the rest of the letters:

THM{HAIL_THE_CAESAR}

9 – Make a comment

No downloadable file, no ciphered or encoded text. Huh …….

I’m hungry now… I need the flag

Inspect element and find a comment with the flag:

THM{4lw4y5_ch3ck_7h3_c0m3mn7}

10 – Can you fix it?

I accidentally messed up with this PNG file. Can you help me fix it? Thanks, ^^

What is the content?

Download attachment: spoil.png

Look up png magic number on Wikipedia:

hexedit spoil.png

first 4 values were wrong so edited that and save the file

THM{y35_w3_c4n}

11 -Read it

Some hidden flag inside Tryhackme social account.

Did you found the hidden flag?

After some googling of the username who created the room “DesKel” you find this post:

THM{50c14l_4cc0un7_15_p4r7_0f_051n7}

12 -Spin my head

What is this?

++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>++++++++++++++.————.+++++.>+++++++++++++++++++++++.<<++++++++++++++++++.>>——————-.———.++++++++++++++.++++++++++++.<++++++++++++++++++.+++++++++.<+++.+.>—-.>++++.

Can you decode it?

Splitting the string at each period shows 15 lines:

This lines up with the fact that the flag is 15 characters long:

After researching quite a bit online and trying some things out I was still stumped. My theory was that line one contained intial information about how to process (up until the ] ) and then the first character began half way through that line. Later revelations lead me to believe that was correct but not something a human would understand how to decode.

Gave up and looked at the hint: binaryfuck

Googling this reveals Brainf**k is a minimalist programmation language that takes its name from two words that refer to a kind of cerebral masturbation.

Copy/pasting in didn’t reveal anything but then I noticed a different example put spaces before and after [ and ] respectively as well as after every period

This seems to line up with the first line in the screenshot below revealing how it should be processed and then each of the 15 characters follows ending in a period

Decoded result is: THM{0h_my_h34d}

13 – An exclusive!

Exclusive strings for everyone!

S1: 44585d6b2368737c65252166234f20626d

S2: 1010101010101010101010101010101010

Did you crack it? Feed me now!

Started to think that the 17 1’s lined up with the 17 characters in the answer but didn’t know where to go from there.

Hint was: S1 XOR S2

Cat > flag13.py

Vim flag13.py

python3 flag.py

THM{3xclu51v3_0r}

Need to spend more time on this one…I needed to reference a walkthrough on what to put in the script

14 – Binary walk

Please exfiltrate my file 🙂

Flag! Flag! Flag!

Download file: hell.jpg

Tried steghide with no password

Moved on to stegcracker with rockyou.txt:

While waiting for that, decided to google Binary Walk:

I think I’m going down the wrong path with stenography.

Looks like there is a hello_there.txt file embedded

Not sure how binwalk works so run: binwalk –help

See:

THM{y0u_w4lk_m3_0u7}

15 – Darkness

There is something lurking in the dark.

What does the flag said?

Download: dark.png

Download and install GIMP and then open the image:

Adjust lightness up and it reveals the hidden flag:

THM{7h3r3_15_h0p3_1n_7h3_d4rkn355}

16 – A sounding QR

How good is your listening skill?

P/S: The flag formatted as THM{Listened Flag}, the flag should be in All CAPS

What does the bot said?

Download attachment: QRCTF.png

Scanning QR Code brings you to soundcloud page:

https://soundcloud.com/user-86667759/thm-ctf-vol1

Voice track speaks:

“The flag is s-o-u-n-d-i-n-g-q-r”

THM{soundingqr}

17 – Dig up the past

Sometimes we need a ‘machine’ to dig the past

Targetted website: https://www.embeddedhacker.com/

Targetted time: 2 January 2020

Did you found my past?

Waybackmachine:

Select Jan 02 archive:

THM{ch3ck_th3_h4ckb4ck}

18 – Uncrackable!

Can you solve the following? By the way, I lost the key. Sorry >.<

MYKAHODTQ{RVG_YVGGK_FAL_WXF}

Flag format: TRYHACKME{FLAG IN ALL CAP}

The deciphered text?

Tried looking at ROT ciphers but nothing seemd worthwhile

Put the initial part of the decoded and encoded side by side to compare in excel:

Pattern appears: -6, +6, ___, -6, +6, ___, -6, +6, ____

The ___ seems to be +11 for most circumstances and then -13 when +11 would cycle past the end of the alphabet

Continuing this pattern:

TRYHACKME{YOU_FOUND_THE_KEY}

After solving this way, I looked at some writups and discovered this is a vigenere cipher: https://shafdo.github.io/pages/blog/ctf/ctf_collection_Vol_1/

19 – Small bases

Decode the following text.

581695969015253365094191591547859387620042736036246486373595515576333693

What is the flag?

Had to look at the hint here:

THM{17_ju57_4n_0rd1n4ry_b4535}

20 -Read the packet

I just hacked my neighbor’s WiFi and try to capture some packet.

He must be up to no good. Help me find it.

Did you captured my neighbor’s flag?

Download: flag.pcapng

Open this file up in wireshark:

Search packet details for string “thm}”

THM{d0_n07_574lk_m3}

Completed 9:17 PM on 10/17/2020