Skip to content

Kaaal-El/Marvel-Vs-DC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

Marvel-Vs.-DC-

CTF writeup

Challenge 1:

  1. Url is given

    "http://10.90.137.137" Let's see what is there.

  2. In Source we can find commented script tag.

  3. Part of which is base64 of "password". So let's look at

    /js/password.js file.

  4. So we have a password but of what? After some time I got a directory listing in images. Observe the length of joker.jpg.

  5. Lets download the file. And do an exif read.

  6. This might be telling that the password we got earlier is the password to extract this file !!??!?!?!.. Let's try.

No luck there.. Plus the password does not look like a password. So I tried too many encodings but no luck. Then a hint was given that the "Timing " matters, and this looks like morse code because it has only two characters "+" and ">".

  1. Decode it online by changing the timing config

    "=" with "+" and "." with ">".

  2. Got "busker" looks like a password. Let's try on joker.jpg

  3. The data looks like rot13. Let's decode it online.

  4. The last part of the data gives it all how to decode the flag. After decoding...

  5. We got base64 if let's decode it too. And finally we have the

    FLAG...

Challenge 2:

  1. Let's do an dirsearch...

  2. robots.txt gives us many files..

  3. Open them one by one and we have some susceptible stuff in

    "batman.php"

  4. Put it all together and we have one big base64 string.

  5. This might suggest th0r directory. "T" in the string is capital but I got a match with "t".

  6. As we can see file.zip let's download...

  7. Unzip...

  8. The file "file" contains string at the end.

  9. Ascii Hex decode it and get the Flag.

About

CTF writeup

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors