image

Digital Forensics

Fe01

It was an easy one there was a .rtf file when i opened it using (“libre office Writer”) i found:

1

by clicking (Ctr+A) I selected all the right clicked to choose paragraph - Text Body

2

the flag appered flag

the flag was : n𝑖𝐶𝑒𝐴𝑛𝐷𝐸𝑎𝑠𝑦10018

Fe02

it was a PDF File with a black mark that hide some parts of the text, I Opend it using (“Atril Document Viewer”) And that what appered:

1

i was going to reverse the pdf but i noticed Some thing when i highlight a text it appers

2

so I easily selected the hole file and found the flag: flag

And the flag was : n1CeReDaCTION-sureLYNot911081

Fe03

when i unzipped the challenge there was a flag.zip password protected so I knew it’s a simple password cracking Challenge using zip2john I got the hash

1

Then by using Rockyou.txt to brute force The password it succeeded johend

and the password was : q1w2e3r4t5y6 by using this passsowrd i was able to extract the text file : flag

the flag was : CraCKInGJ0b-67189

Fe04

it was an .log file So i tried the first thing I could think of

using the command strings with grep flag

so I did that

strings access.log |grep flag

and that was it the flag appeared

flag

the Flag was: nicESearChIng01812

FM01

It was a weird file i used file to idintfy it but it showed Data file

1

so i opend it on hex editor to see the header

2

the Hex was similar to a binary file but the header was wrong So i fixed it by adding the right header

the fixed header

and by using

chmod +x file| ./file

flag

Binary-Exploit-Challenges

Be01

the first thing i tried is running the program it asked for a password so i didn’t know what to do but using (“strings”) as usual

1

i saw a wired text : this_isNOT-a_PasswORD-ToGuess-Easily so i tried using it as the password and the flag poped

flag

and the Flag was : sImpLEASCiiSTriNGS-32910

Web-Writeups