Digital Forensics
Fe01
It was an easy one there was a .rtf file when i opened it using (“libre office Writer”) i found:
by clicking (Ctr+A) I selected all the right clicked to choose paragraph - Text Body
the flag appered
the flag was : n𝑖𝐶𝑒𝐴𝑛𝐷𝐸𝑎𝑠𝑦10018
Fe02
it was a PDF File with a black mark that hide some parts of the text, I Opend it using (“Atril Document Viewer”) And that what appered:
i was going to reverse the pdf but i noticed Some thing when i highlight a text it appers
so I easily selected the hole file and found the flag:
And the flag was : n1CeReDaCTION-sureLYNot911081
Fe03
when i unzipped the challenge there was a flag.zip password protected so I knew it’s a simple password cracking Challenge using zip2john I got the hash
Then by using Rockyou.txt to brute force The password it succeeded
and the password was : q1w2e3r4t5y6 by using this passsowrd i was able to extract the text file :
the flag was : CraCKInGJ0b-67189
Fe04
it was an .log file So i tried the first thing I could think of
using the command strings with grep flag
so I did that
strings access.log |grep flag
and that was it the flag appeared
the Flag was: nicESearChIng01812
FM01
It was a weird file i used file to idintfy it but it showed Data file
so i opend it on hex editor to see the header
the Hex was similar to a binary file but the header was wrong So i fixed it by adding the right header
and by using
chmod +x file| ./file
Binary-Exploit-Challenges
Be01
the first thing i tried is running the program it asked for a password so i didn’t know what to do but using (“strings”) as usual
i saw a wired text : this_isNOT-a_PasswORD-ToGuess-Easily so i tried using it as the password and the flag poped
and the Flag was : sImpLEASCiiSTriNGS-32910