Mega CTF 2 - CTF 60

CTF Name: Mega CTF 2
Total Flag: 10
Flag Format: IHC_CTF{}
CTF Link: https://t.me/ctf_invisiblehc/99
Description:
Download the text file and decrypt the text. You will find the first flag. There has a resource for next flag.
Solution:
Stage 1:
After opening the txt file, we discovered a ciphertext. It was encoded using ROT cipher. We decoded it using this website:
We found the flag1 and a hint for flag2.
flag 1: IHC_CTF{W3LC0M3_F14G_1}
Stage 2:
After decoding the ciphertext using CyberChef, we found the flag and a resource for the Next flag.
Decode Recipe: Click Here
flag 2: IHC_CTF{7H475_345Y_F14G_2}
Stage 3:
We got a image After trying various techniques to find the flag within the image, we used the binwalk tool to extract embedded files, using the command: "binwalk -e firmware.img"
This process output give us to a text file. Upon opening this text file, we found a Cipher text encoded using the Caesar Cipher with shift of 19. After decrypting it, we successfully uncovered the flag3 and also obtained a resource hinting at the next flag.
flag 3: IHC_CTF{H1DD3N_F14G_3_1N_1M4G3}
Stage 4:
We found a zip file, unzipped it, and inside there was a txt file. After decrypting the file using CyberChef, we got flag4 and a hint for the next flag.
Recipe to Decode : Click Here
flag 4: IHC_CTF{CRYP70_53R135_F14G_4}
Stage 5:
We got a site link when I went to the website and saw a login page. It asked for a username and lucky number. I put 'admin' for the username and '00' for the lucky number. When I clicked login, I found the flag and a link to the next challenge.
flag 5: IHC_CTF{DUCK_DUCK_G0_15_4_S3CUR3_S34RCH_3NG1N3_5}
Stage 6:
We opened the challenge URL and viewed the source code. Since the source code was quite lengthy, we performed a search for "IHC_CTF" and successfully found the flag. Now, in order to proceed, after reaching the end of the source code, we noticed a file named "script.js." Upon opening that source code and searching for some time, we were able to discover the next flag hint.
flag 6: IHC_CTF{B4BY_DUCK_1S_50_51MP13_6}
Stage 7:
After unzipping the file, we discovered an encoded text consisting of only three words: "I" "H" and "C" The encoding method is simple but tricky. We need to convert "I" to 0, "H" to 1, and "C" to a space. This can be accomplished using the following Python code.
def convert_string(input_string): output_string = '' for char in input_string: if char == 'I': output_string += '0' elif char == 'H': output_string += '1' elif char == 'C': output_string += ' ' else: output_string += char return output_string
input_string = input("Enter a string: ")converted_string = convert_string(input_string)print("Converted string:", converted_string)
After converting it into binary, we can easily decrypt it using CyberChef.
Recipe to Cook: Click Here
After decrypting, we found flag7 and a resource for the next flag.
flag 7: IHC_CTF{PR0GR4MM1NG_M4K35_L1F3_345Y_7}
Stage 8:
We found an image, and upon using this online steganography tool: https://futureboy.us/stegano/decode.pl we uncovered flag8 along with a hint for the next flag.
flag8: IHC_CTF{345Y_57394N0924PHY_8}
Stage 9:
When we opened the challenge link we see a login page and we see this text
"Enter Username & Password for login."
So we try Username as user and Password as pass after click login we found the flag9 and hint for Next flag.
flag: IHC_CTF{V3RY_345Y_F14G_9}
Stage 10:
When we opened the link and checked the URL, https://site.invisiblehc.com/ctf/60/LastOne/index.php?error=1.
we found The value of the link was initially 1, but when we changed it to 0, the flag was displayed on the web page. This was the final flag.
flag: IHC_CTF{M3G4_C7F_3ND3D_10}
Join Our CTF Channel: