본문 바로가기
반응형

utctf4

UTCTF 19' Write-up / Low Sodium Bagel This one is also an interesting problem. I downloaded a picture from the server and I opened it. I could see a bagel image. Actually, I am a newbie of CTF competition so whenever I see the picture I always have an assumption that picture has a hidden message, which is steganography. So I tried to decode it. There are tons of steganographic decoder website, however, below one only supports jpeg f.. 2019. 3. 15.
UTCTF 19' Write-up / [basics] forensics [basics] forensics100My friend said they hid a flag in this picture, but it's broken!by balex This problem is the last one for the beginner. I downloaded the secret.jpg file, however, I couldn't open it. I just got "file cannot be readable" error message. So I checked the file type on linux environment (Actually, I use WSL, Windows Subsystem for Linux). And then, I found out the file's extension.. 2019. 3. 15.
UTCTF 19' Write-up / [basics] re [basics] re100I know there's a string in this binary somewhere.... Now where did I leave it?by balex This problem was really easy one if you know the usage of IDA application. I just opened the file and I got flag right away.Flag : utflag{str1ng5_15_4_h4ndy_t00l} Reference site : https://utctf.live/challenges#[basics]%20re 2019. 3. 15.
UTCTF 19' Write-up / [basics] crypto This time I took part in UTCTF. This is my approach. When I open the file, it has a binary string so I made a small code to figure out what messages in it a = "01010101 01101000 ...... " (Copy from the file)a = a.split(" ")d = "" for i in range(len(a)): d += chr(int("0b" + a[i], 2)) After that, I found below message, especially the encoding part. Uh-oh, looks like we have another block of text, .. 2019. 3. 10.
반응형