HACON-2020 write-up
Recently I participated in HACON-2020 CTF, it was a really nice experience. ( i was not able to solve more challenges due to I am playing Multiple-CTFs, so here i was able to solve two challenges)
EAsy WEb
First, when we open the given link, we see something like this
When we pass any username and password we get one hint like this:
It’s jwt token so we need to decode it online. ( i used jwt.io website)
we found the username and password. So submitting this after then we get another hint.
So it looks like ceser code. so after decoding it we found “flagfile” this and when we append it to the current URL we get the following webpage.
So I don’t see any interesting things here, so I did view-page source, and boom we found the flag.
Flag : HACSEC{Y0u_g0T_I7}
ARE u SuRE
The text file was as following
So at first look, I know this is Malbolge language. (http://www.malbolge.doleczek.pl/)
Flag : HACSEC{3so7eRiC_Is_M3Ss3d_Up}