MetaCTF CyberGames 2020 write-up

Raj Upadhyay
4 min readOct 25, 2020

Recently I participated in MetaCTF 2020. I was running out of time because I have started solving challenges 2-hour before CTF ends. So due to that, I was able to solve a few challenges. Let’s see how I solved it

Cryptography

1.Crypto Stands For Cryptography

Given string:

TWV0YUNURntiYXNlNjRfZW5jMGRpbmdfaXNfbjB0X3RoZV9zYW1lX2FzX2VuY3J5cHRpMG4hfQ==

Flag: MetaCTF{base64_enc0ding_is_n0t_the_same_as_encrypti0n!}

Welcome to the Obfuscation Games!

Given String:

$s=New-Object IO.MemoryStream(,[Convert]::FromBase64String("H4sIAEFgjl8A/xXMMQrCQBCF4as8FltPIFaCnV3A8jFmn8ngupuYaUS8e5LyL77//vHQcWxLIHWj8Cw2wBd4RWyp2resjMm+pVlOJxzmGWekm8Iu3fU3ScXrwIf1L26C+4CtijukBY3hb/3TCj2Ieh9qAAAA"));IEX (New-Object IO.StreamReader(New-Object IO.Compression.GzipStream($s,[IO.Compression.CompressionMode]::Decompress))).ReadToEnd();

Looks like it’s a PowerShell command so let’s run it.

We got “The Flag is in the encoded payload”

So now we know we need to focus on just below string:

H4sIAEFgjl8A/xXMMQrCQBCF4as8FltPIFaCnV3A8jFmn8ngupuYaUS8e5LyL77//vHQcWxLIHWj8Cw2wBd4RWyp2resjMm+pVlOJxzmGWekm8Iu3fU3ScXrwIf1L26C+4CtijukBY3hb/3TCj2Ieh9qAAAA

Using cipher-identifier I found it’s Base64 string but I am not able to decode it. After a few minutes, I come across the following website.

https://base64.guru/tools/character-encoding

So we need to use Base64 to File converter.

we got one zip file. Let’s unzip it and see what we get

So I opened it in notepad

Flag: MetaCTF{peeling_back_the_flag_one_code_at_a_time}

The Last Great ZIP File

So here we have been given one zip file and we need to recover the password.

So commonly I used the following websites to crack password-protected zip files.

So when I used the above mention website I got the password:

So let’s open a zip file using this password.

We got our flag:

Flag: MetaCTF{crack_the_planet}

Forensics

Forensics 101

So we just need to give an ASCII representation of the magic bytes for a RAR archive.

So google search shows us “mnemonic as Rar!”

so our flag is

Flag: MetaCTF{Rar!}

Staging in 1…2…3

So here we have been given one temp file.

Let’s open it in notepad.

The flag is in front of us

Flag: MetaCTF{definitely_n0t_all_0f_y0ur_sensitive_data}

WEB

High Security Fan Page

So let’s visit the given link

So let’s look at the source code.

So following code looks interesting

So let’s open the javascript file because it's calling the “authenticate()” function.

We found our flag:

Flag: MetaCTF{So_You_Wanna_Play_With_Magic}

Barry’s Web Application

So let’s open the given link

Nothing interesting here

So let’s look at the source code.

Nothing interesting here.

But wait we can see some wired URL path “/dev/webapp/index.html”

let’s remove “/webapp/index.html” from the path.

Let’s open docs/ folder.

So let’s open the flag.txt file.

Flag: MetaCTF{Dont_l3t_y0ur_d1rect0ries_b3_l1st3d}

Thank you

--

--

Raj Upadhyay

Pursuing M. Tech. in Cyber Security and Incident Response. #LoveToPlayCTF #infosec #cybersecurity