<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Yash Jain]]></title><description><![CDATA[All things security]]></description><link>https://blog.yashja.in</link><generator>RSS for Node</generator><lastBuildDate>Thu, 07 May 2026 13:42:07 GMT</lastBuildDate><atom:link href="https://blog.yashja.in/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[CyberTeam India Internship CTF]]></title><description><![CDATA[Web and Forensics
This is my first write-up and third CTF ever
This CTF was a bit weird (no crypto , 50% forensics, WTF!) also the challenges were short but some of them needed out of the box thinking (at least for me).
FILE FOUND — 50
This challenge...]]></description><link>https://blog.yashja.in/cyberteam-india-internship-ctf-906bf43b3329</link><guid isPermaLink="true">https://blog.yashja.in/cyberteam-india-internship-ctf-906bf43b3329</guid><dc:creator><![CDATA[Yash Jain]]></dc:creator><pubDate>Wed, 02 Jan 2019 10:53:46 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633799862/9be7d77a-c00b-4e2b-816a-8813334932b9.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4 id="heading-web-and-forensics">Web and Forensics</h4>
<p>This is my first write-up and third CTF ever</p>
<p>This CTF was a bit weird (no crypto , 50% forensics, WTF!) also the challenges were short but some of them needed out of the box thinking (at least for me).</p>
<h3 id="heading-file-found-50">FILE FOUND — 50</h3>
<p>This challenge is actually the easiest one I have encountered (maybe for forensics only)</p>
<p>We have file that looks like a java compiled class, I will check it anyway with command <strong><em>file .</em></strong></p>
<p>So, now the basic approach will be reading its content to get some hints or flag maybe. You can do this by using either <strong><em>cat</em></strong> or <strong><em>strings,</em></strong> I have used strings which give us the following result.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633766688/09d0b83c-5b52-43f7-b9dd-f554e62aeb83.png" alt /></p>
<p>This is encrypted using caesar cipher.</p>
<p><strong><em>FLAG{FORENSICS_101}</em></strong></p>
<h3 id="heading-help-ann-100">Help Ann — 100</h3>
<p>By using the command <strong><em>file</em></strong>, I get to know that this is a png file, but I am unable to open it.</p>
<p>So, I opened the file using <strong><em>hexeditor</em></strong> to check the header</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633768646/a99dff78-8938-42b3-9aa7-381b6c59a798.png" alt /></p>
<p>It looks like header is broken/corrupted so I replaced it with the png header</p>
<p>or magic number i.e, <strong><em>89 50 4e 47 0d 0a 1a 0a</em></strong></p>
<p>Now, we got an image that is a QR code. So I scanned it on <a target="_blank" href="http://webqr.com">this website</a> and I got the flag.</p>
<p><strong>Flag{Aw3s0m3-Y0u-G0t-th1s}</strong></p>
<h3 id="heading-just-smile-100">Just Smile — 100</h3>
<p>We have an image, so I looked at its content by using <strong><em>strings</em></strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633770722/66e3af81-4755-4daa-94dc-3288749d9da7.png" alt /></p>
<p>It looks like this file contain extra chunk of data after the png ends (IEND)</p>
<p>So, we will try to extract it using <strong><em>binwalk</em></strong></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633773004/c368cce5-1cab-4e9c-be8b-4aae8e4559f0.png" alt /></p>
<p>binwalk — d=’.*” smile.png -e</p>
<p>This gives us an ELF file. I tried to execute it using <strong><em>gdb</em></strong> but it ask for a password.</p>
<p>By reading the content of the file I got a string <strong><em>This_Is_Not_the_Flag_but_Useful</em></strong> and yes this is the password.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633774629/5ec3be74-ccca-4a95-a549-56bdc9b2f015.png" alt /></p>
<p><strong><em>FLAG{APPENEDING_FILES_REALLY!!}</em></strong></p>
<h3 id="heading-light-50"><strong><em>Light — 50</em></strong></h3>
<p>Again we got an image, so as usual I tried reading its content and got something in the end</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633776722/1992177d-20cb-44c9-8927-00a763e76951.png" alt /></p>
<p>This is in binary so I hopped <a target="_blank" href="http://codebeautify.org/binary-to-text">here</a> and quickly got the flag. This was easy, right?</p>
<p><strong><em>Flag{So-L!gHt}</em></strong></p>
<h3 id="heading-wanna-some-biscuits-50">Wanna some Biscuits — 50</h3>
<p>The challenge name clearly suggests for Cookie, so I intercepted the request and sent it to repeater</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633778813/3fe63066-360d-4981-9678-d2c3d04c6295.png" alt /></p>
<p>This looks like it is encoded in base 64, so I decoded and got this</p>
<p><strong><em>O:4:”User”:2:{s:8:”userName”;s:9:”anonymous”;s:7:”isAdmin”;b:0;}</em></strong></p>
<p>This looks like unserialized data of php. After changing it for admin and changing <strong><em>isAdmin</em></strong> value to <strong><em>1. [</em></strong> Also <strong><em>s:9</em></strong> represents the character length of <strong><em>anonymous ]</em></strong> Resultant will look like</p>
<p><strong><em>O:4:”User”:2:{s:8:”userName”;s:5:”admin”;s:7:”isAdmin”;b:1;}</em></strong></p>
<p>I encoded this in base64 and replaced the original cookie and got this response:</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633780218/be6a7bc6-fdbc-49a3-ac5a-9eb5b2bf59f4.png" alt /></p>
<p><strong><em>FLAG{REALLY!!_IN_COOKIES}</em></strong></p>
<h3 id="heading-request-gate-50">request Gate — 50</h3>
<p>Again from challenge name this looks like it is about HTTP requests</p>
<p>So I intercepted the request, forwarded it and got this response</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633781514/ccd1dd58-5bc4-4875-bfcc-f26f69763de9.png" alt /></p>
<p>As obvious I changed the method to PUT but it still throws Error 405 with message <strong><em>Not Allowed.</em></strong> After unsuccessful multiple attempts I thought of accessing the php page that can handle the PUT request in the same directory. So I made a PUT request to <a target="_blank" href="http://35.197.254.240/request-gate/index.php">http://35.197.254.240/request-gate/index.php</a> and Voila!</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633783474/c66e9450-6078-429f-84e6-f05a71665d08.png" alt /></p>
<p><strong><em>M3th0ds!sN0t0nlyG3T0rP0ST</em></strong></p>
<p><strong><em>Curl</em></strong> can be the easy way to this</p>
<p><strong><em>curl -X PUT ‘</em></strong><a target="_blank" href="http://35.197.254.240/request-gate/index.php%27"><strong><em>http://35.197.254.240/request-gate/index.php'</em></strong></a></p>
<h3 id="heading-yellow-duck-100">Yellow Duck — 100</h3>
<p>In this challenge we have URL that contains the .png file but cannot see it online or download so I used <strong><em>Curl,</em></strong> you can also use <strong><em>wget</em></strong></p>
<p>This file looks like it is base64 encoded</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633785048/74f0a5d4-8c27-4de2-9afe-7a875628fa2b.png" alt /></p>
<p>By resemblance of ‘+’ and ‘/’ between strings and default extension, I thought this might be an image encoded in base64, so i decoded this from <a target="_blank" href="http://freeonlinetools24.com/base64-image">here</a> and got a file</p>
<p>Its content doesn’t make any sense to me. So I decided to check hex values of its header</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633787023/db792b1e-93fb-44bf-99d3-48ba8c6c2987.png" alt /></p>
<p>Notice the header, it is similar to the png header so I thought this might be encrypted. I read few write-ups and came to know that it is XORED.</p>
<p>I used <strong><em>xortool</em></strong> to decrypt it , here most frequent character is \00x</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1748633797078/597e59f6-c5bb-43c9-9586-108f144ac423.png" alt /></p>
<p>If you dont know the possible char you can use <strong><em>xortool -b output-onlinepngtools.png</em></strong> . It’ll test for all cases, and u need to check for flag for each output.</p>
<p><strong><em>flag{Y0u_CatchIt_0100110120100}</em></strong></p>
<p>Thank You</p>
<p>Suggestions are welcomed.</p>
<p>For more web based write-ups you can see <a target="_blank" href="https://medium.com/@Mr_R0w07/glug-ctf-web-writeup-490c8448d484">this</a>.</p>
]]></content:encoded></item></channel></rss>