THM-CTF collection Vol.1-Writeup

Mohamed Ali
6 min readNov 21, 2024

--

Sharpening up your CTF skill with the collection. The first volume is designed for beginner.

Find This Room: CTF collection Vol.1

Task 1 Author note

Just another random CTF room created by me. Well, the main objective of the room is to test your CTF skills. For your information, vol.1 consists of 20 tasks and all the challenges are extremely easy. Stay calm and Capture the flag. :)

Note: All the challenges flag are formatted as THM{flag}, unless stated otherwise

Task 2 What does the base said?

Can you decode the following?

VEhNe2p1NTdfZDNjMGQzXzdoM19iNDUzfQ==

Task 3 Meta meta

Task 4 Mon, are we going to be okay?

Task 5 Erm……Magick

This question has nothing immediately noticeable. There is nothing to download and nothing visible. If we highlight the page, we’ll see that the flag becomes visible because it is the same color as the background.

Task 6 QRrrrr

Such technology is quite reliable.

Task 7 Reverse it or read it?

Both works, it’s all up to you.

Task 8 Another decoding stuff

Can you decode it?

3agrSy1CewF9v8ukcSkPSYm3oKUoByUpKG4L

Task 9 Left or right

Left, right, left, right… Rot 13 is too mainstream. Solve this

MAF{atbe_max_vtxltk}

Task 10 Make a comment

No downloadable file, no ciphered or encoded text. Huh …….

Task 11 Can you fix it?

I accidentally messed up with this PNG file. Can you help me fix it? Thanks, ^^

We convert the file to Hexadecimal, edit the file and replace the amount of “magic numbers” from a PNG file, after this we can obtain our image by rendering it with CyberChef.

So as we searched on google and we found that the standard magic numbers of the png image are 89 50 4E 47

We have to just replace it.

Now our last step is to render the image from updated hexadecimal code which we did use cyber chef where we have to render the image from updated code

Task 12 Read it

Some hidden flag inside Tryhackme social account.

But provided hint cleared it for us. So here we got a chance to explore our google dork technique. And the perfect dork came to be

inurl:"reddit.com" &intext:"THM" & intitle:"tryhackme"

Task 13 Spin my head

What is this?

++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>++++++++++++++. — — — — — — .+++++.>+++++++++++++++++++++++.<<++++++++++++++++++.>> — — — — — — — — — -. — — — — -.++++++++++++++.++++++++++++.<++++++++++++++++++.+++++++++.<+++.+.> — — .>++++.

This task was spinning my mind as it told me to decode it but we were clueless about it that’s why we had to go for a hint, and they indicated to its “BINARYFUCK”

Task 14 An exclusive!

Exclusive strings for everyone!

S1: 44585d6b2368737c65252166234f20626d
S2: 1010101010101010101010101010101010

In this task, we got 2 strings but we didn’t know what to do with these strings but our saviour hint shows to XOR these strings.

Now we can relate exclusive and XOR.

Use This Script :

s1 = "44585d6b2368737c65252166234f20626d"
s2 = "1010101010101010101010101010101010"

a = hex(int(s1, 16) ^ int(s2, 16))[2:]
print(bytes.fromhex(a).decode('utf-8'))

Task 15 Binary walk

Please exfiltrate my file :)

As this task name suggests a binary walk and clue also directed us to binwalk, it is a tool binwalk that is helpful in steganography. But it is only used to extract the hidden file from the images.

Task 16 Darkness

There is something lurking in the dark.

We have to evaluate our image by filtering various colours in an image using stegsolve. We can download stegsolve with these terminal commands

wget http://www.caesum.com/handbook/Stegsolve.jar -O
stegsolve.jar
chmod +x stegsolve.jar

Now just we have to open the image with the stegsolve

Task 17 A sounding QR

How good is your listening skill?

P/S: The flag formatted as THM{Listened Flag}, the flag should be in All CAPS

Task 18 Dig up the past

Sometimes we need a ‘machine’ to dig the past

Targetted website: https://www.embeddedhacker.com/
Targetted time: 2 January 2020

In this task as a title relates to the past the only thing that pops up in our mind is the Wayback machine and the time and date in the description make our doubt clear.

So, for checking past captures or archives of any site we can use the Wayback Machine. After analyzing the output, we can see there is a capture of the website on 2nd Jan 2020

But when we visited that website, we got our 18th flag.

Task 19 Uncrackable!

Can you solve the following? By the way, I lost the key. Sorry >.<

MYKAHODTQ{RVG_YVGGK_FAL_WXF}

Flag format: TRYHACKME{FLAG IN ALL CAP}

Task 20 Small bases

Decode the following text.

581695969015253365094191591547859387620042736036246486373595515576333693

This task was also of cryptography. In this task, the hints say (dec-> hex -> ASCII) we have to simply follow these tips that are converting decimal to hex first

Use : Decimal > Hex

Copy This Hex :

54484D7B31375F6A7535375F346E5F307264316E3472795F62343533357D

Get To : Hex — Ascii

Task 21 Read the packet

I just hacked my neighbor’s WiFi and try to capture some packet. He must be up to no good. Help me find it.

In this task when we download the file it’s a pcapfile. So, it cleared that it’s a Wireshark file

Use http filter and http stream

--

--

Mohamed Ali
Mohamed Ali

No responses yet