This challenge was solved by @R3x and @d3xt3r during the CTF. Writeup by @R3x The challenge has two files - an Linux 64 bit executable and a encrypted file. Reversing the executable Running the executable we notice that it takes two command line arguments. The first argument is the input file and the second is... Continue Reading →

This challenge was solved by @R3x and @sherl0ck. This writeup is written by @R3x. The challenge binary was slightly obfuscated. On reversing it we found that the algorithm for encryption was as such. The VM loads a key from the program it's running. The input file is divided into 64 bit blocks Each blocked with the... Continue Reading →

Solved by @slashb4sh, @sherl0ck, and @night_f0x This weekend had a couple of really good CTF's, iCTF and Teaser CONFidence CTF, and our team had loads of fun playing them. In the Teaser CONFidence CTF, there was this really fun kernel challenge which is extremely beginner friendly. This was also the first time me and sl4shb4sh took... Continue Reading →

Writeups of all crypto challenges from CONFidence Teaser CTF 2019

Solved by 4rbit3r I didn't take a look at this challenge until the second day of the CTF. I was stuck on another challenge which we couldn't solve in the end. But I managed to get a shell out of this one. So here's the writeup. The package we download consist of a couple of... Continue Reading →

In this challenge we have a 64bit ELF Binary, when we run it, it asks for an integer input. if the input is wrong it prints "Wrong Input." and if it is correct then flag is printed out. So lets run the binary and give some random integer as input. So to view the... Continue Reading →

Author: s0rc3r3r Points: 100 Intended Solution This is probably the easiest challenge in the Crypto section in InCTF.  The encryption script: As we can see, the encryption is layered, after the message is encrypted using the first public key i.e. first element of 'encryption_keys', the result is then encrypted with the next public key i.e.... Continue Reading →

Solved by HRJ The challenge was great, it had two ways of solving it. We were given website in which we can catch a Pokemon,  rename a Pokemon, see all our Pokemon and buy Pokeball's. These were the functionalities. We were also given the source code of the website which was written using the flask (Link).... Continue Reading →

Solved by sh!v The challenge at the very first look seemed to be too easy. Using binwalk on the png readily showed a zip file with flag.txt. \$ binwalk -e poster.png DECIMAL    HEXADECIMAL    DESCRIPTION --------------------------------------------------------------------- 0                     0x0              ... Continue Reading →