Mega CTF 2 - CTF 60

IHC Blog
CTF Name: Mega CTF 2
Total Flag: 10
Flag Format: IHC_CTF{}

Description: 
Download the text file and decrypt the text. You will find the first flag. There has a resource for next flag. 

Solution:

Stage 1:
After opening the txt file, we discovered a ciphertext. It was encoded using ROT cipher. We decoded it using this website:
We found the flag1 and a  hint for flag2.

flag 1: IHC_CTF{W3LC0M3_F14G_1}

Stage 2:
After decoding the ciphertext using CyberChef, we found the flag and a resource for the Next flag.
Decode Recipe: Click Here 

flag 2: IHC_CTF{7H475_345Y_F14G_2}

Stage 3:
We got a image After trying various techniques to find the flag within the image, we used the binwalk tool to extract embedded files, using the command: "binwalk -e firmware.img"
This process output give us to a text file. Upon opening this text file, we found a Cipher text encoded using the Caesar Cipher with shift of 19. After decrypting it, we successfully uncovered the flag3 and also obtained a resource hinting at the next flag.

flag 3: IHC_CTF{H1DD3N_F14G_3_1N_1M4G3}

Stage 4:
We found a zip file, unzipped it, and inside there was a txt file. After decrypting the file using CyberChef, we got flag4 and a hint for the next flag.

Recipe to Decode : Click Here

flag 4: IHC_CTF{CRYP70_53R135_F14G_4}

Stage 5: 
We got a site link when I went to the website and saw a login page. It asked for a username and lucky number. I put 'admin' for the username and '00' for the lucky number. When I clicked login, I found the flag and a link to the next challenge.

flag 5: IHC_CTF{DUCK_DUCK_G0_15_4_S3CUR3_S34RCH_3NG1N3_5}

Stage 6: 
We opened the challenge URL and viewed the source code. Since the source code was quite lengthy, we performed a search for "IHC_CTF" and successfully found the flag. Now, in order to proceed, after reaching the end of the source code, we noticed a file named "script.js." Upon opening that source code and searching for some time, we were able to discover the next flag hint.

flag 6: IHC_CTF{B4BY_DUCK_1S_50_51MP13_6} 

Stage 7: 
After unzipping the file, we discovered an encoded text consisting of only three words: "I" "H" and "C" The encoding method is simple but tricky. We need to convert "I" to 0, "H" to 1, and "C" to a space. This can be accomplished using the following Python code.

def convert_string(input_string):
    output_string = ''
    for char in input_string:
        if char == 'I':
            output_string += '0'
        elif char == 'H':
            output_string += '1'
        elif char == 'C':
            output_string += ' '
        else:
            output_string += char
    return output_string

input_string = input("Enter a string: ")
converted_string = convert_string(input_string)
print("Converted string:", converted_string) 

After converting it into binary, we can easily decrypt it using CyberChef.

Recipe to Cook: Click Here 

After decrypting, we found flag7 and a resource for the next flag.

flag 7: IHC_CTF{PR0GR4MM1NG_M4K35_L1F3_345Y_7}

Stage 8:
We found an image, and upon using this online steganography tool: https://futureboy.us/stegano/decode.pl  we uncovered flag8 along with a hint for the next flag.

flag8: IHC_CTF{345Y_57394N0924PHY_8}

Stage 9: 

When we opened the challenge link we see a login page and we see this text
"Enter Username & Password for login." 
So we try Username as user and Password as pass after click login we found the flag9 and hint for Next flag.

flag: IHC_CTF{V3RY_345Y_F14G_9}

Stage 10:
When we opened the link and checked the URL,  https://site.invisiblehc.com/ctf/60/LastOne/index.php?error=1. 
we found The value of the link was initially 1, but when we changed it to 0, the flag was displayed on the web page. This was the final flag.

flag: IHC_CTF{M3G4_C7F_3ND3D_10}

Join Our CTF Channel: