CTFtime

 

RESTCON CTF




 

This blog post consists of writeups for :-

  • Basic
    • Basic : 1
    • Basic : 2
    • Broken
    • Garbage
  • OSINT
    • The Discovery
  •  Forensic
    • Magic : 1
    • Dance Monkey

 

BASIC

 

Basic : 1

Solution: You just have to take the mirror image of the given string.

Flag: RESTCON{RESTCON_FLAG}

 

 


Basic : 2

Solution: The equal sign at the end signifies that it has been encrypted using base. So I used CyberChef to convert it using base64.

Flag: RESTCON{RESTCON_2ND_BASIC_FLAG}

 

 


Broken

Solution: The flag was just an inspect away



Flag: RESTCON{H1DD3N}

 

 


Garbage

Solution: A simple strings of the file returned the flag


Flag: RESTCON{GR3P_7HE_FL4G}

 

 



 

OSINT

The Discovery


Solution: I used google search as my first step towards OSINT and found that the given image is of venetian hotel macau room. Then I googled its CEO and found his name on the wikipedia page.

Flag: RESTCON{Sheldon_Adelson}

 

 


 

FORENSIC

Magic : 1


Solution: The file containd a QR code thus I used an online QR code reader and the result obtained was RESTCON{29a9df89e2858e5a25c83b6a00352d19} Then I used hashid to check if I can determine its type. Lastly I used an MD5 cracker to crack it.



Flag: RESTCON{mirr0r}

 


 

Dance Monkey


Solution: Firstly I downloaded the gif. Then I used strings upon the file and found a string in first few lines which looked like it was base encrypted. So I copied it and used CyberChef to decrypt it and found that it actually was a base32 string.


Flag: RESTCON{SMIL3_L!K3_4_M0NK3Y}