
| Challenge Name | Challenge link | Type |
|---|---|---|
| Lazaretto ✔ | Download | Forensics |
| Hotel ✔ | Download | Forensics |
| Subscription | Download | Forensics |
| Geology | docker pull cyctf/geology | Forensics |
| imPOSTer ✔ | Download | Forensics |
| Mach ✔ | Download | Mobile |
Lazaretto
Challege Description

Writeup
we were provided with an ad1 file using FTKimager we were able to open it and it had only windows event logs

So i just dumped the files and using the famous ericzimmerman tool EvtxECmd i was able to pares the full events into a csv file using this command
.\EvtxECmd.exe -d .\Logs\ --csv out
from the csv it was an easy analysis by just filtring the level of the event and the events that has an executables it was only one event so it was easy
now we have all the data we needed to but in the flag format
first part was the signutre id which was in payloadData1 Ransom:Win32/Blocker
secound part was the file name which was in the ExecutableInfo makepcfaster.exe
and last the delivery ip which was in the same place as the seconed part 192.168.1.8
putting it into the flag format and that was it we have the flag
CyCTF{Ransom:Win32/Blocker:makepcfaster.exe:192.168.1.8}
Hotel
Challenge description



Writeup
this was supposed to be a warm up challenge as it said in the description but it didn’t have any solves before the hints ware realease
once the hint 1 realease i knew for sure that it’s in the MFT file
so i started doing my Dump thig with strings to get the flag
while greping CyCTF it has nothing so i knew that it must be encoded so I did something more idiotice i encoded the CyCTF{ part
using CyberChef

and now just by using the magic of strings i grep this part Q3lDVEZ7 and got the flag

strings \$MFT |grep Q3lDVEZ7
using CyberChef i decodced the base and got the flag

CyCTF{MFT_C4N_S70RE_S3NS1TIV3_1NF0RM4710N}
imPOSTer
Challege Description

Writeup
This challenge was the one that i enjoyed the most in the CTF
we were provided by a ZIP file of an system files so i un zipped the file and start checking
i went to User 74mo Document and found an outlook data folder so i checked it which has pst file
so using OST-viewer i opend the pst file
it had some mails from 74mo to some developer about website then 74mo asked for his database to be encrypted
the developer sent him the way he did the encryption and the dummy key and that was our starting point

the challenge name ha POST in it and the email confirm it was a site dev thing so i went to app data to find what was installed
so i found in the Roaming folde Postman installed and has some data so i needed to open the database saved from post man or the requests to find the website so i installed Postman and tryed to load the db to it but i couldn’t so i used an idea to copy all the files of the POST man to mine but alsio didn’t work
by ferther invastigating and searching i knew it’s posible to do that but i have to get the post man right version
so i kept checking to find in the main log file it had the version which was 7.0.6

so I searched for it till i downloaded it from postman site now i have the right post man coping the IndexedDB folder to my postman folder i was able to get the requests sent by the user

it had post requests for some secret keys when i first looked i knew for sure that one of them is the flag
so i needed to decrypt it
but i need a key while checking more in the requests i found a request to get the key and it had the file name and it’s size
the size info was very important for me to get the key

so i knew the file name and size but it’s not apperes on any part of the desk image
but as we noticed how very tiny is this file so i checked it on the MFT File
I didn’t need to use anytools just open it on hexEditor and search for the keyFile.txt

so we got the key LuIT&HjIFwZQGsDW back to the mail files we knew that the encryption was AES with CPC mode
also we know that the IV was the reverse of the key and know we have every thing to get the flag
i deceded to try the secret1337 first as its the one the seems to be the flag
"secret1337": "6d7e4022adb41576dbe67f234dbec2f5fef1859256647c9bfb601feeb2c092cdd1e58d8253d13577bdea701fdbddd07c"
using cyperchef to decrypt the AES we got the flag

CyCTF{p0stm4n_g0t_74mo_bust3d_r3alb4d!!}
#Geology
Challege Description



Writeup
I didn’t solve this one during the CTF but I solved it after
using dive over the image i as we are checking there was modification over the access.log is happend in this layer
31badd250be9ebc7cef96087907d2174a95445289d8593e568adb89a4a36e474
so i just downloaded the image layers and checked for the access.log of the apache server
docker save cyctf/geology > geology.tar
by untaring the file and going to the 31badd250be9ebc7cef96087907d2174a95445289d8593e568adb89a4a36e474 folder we got the complete access log
so i just extracted it
using any text viewer i went through the log to find there was a base64 Q3lDVEZ7TDRZZXI1XzRuRF9sNHllcjVfMGZfQzBOdDQxbmVSMn0K in the logs
by decodeing it we have the flag

CyCTF{L4Yer5_4nD_l4yer5_0f_C0Nt41neR2}
Mach
Challege Description

Writeup
for this one i didn’t knew any thing about mobile but i knew my strings so i just
unzipped the ipa file using 7zip then did strings on the binary re
strings re
found hex data

when decoded it gives the flag
CyCTF{R3_15_4W350M3}