DeconstruCTF 2021 Write-ups
This will be my write-up for some random challenges from DeconstruCTF 2021!
Forensics
1. The Missing Journalist
Using binwalk -e filename
we can extract a message.pdf
…
2. Teg Rads
We’re given a PDF with some redacted info, so I open it up in Google Docs;
So, I after looking at the pdf tree, streams and objects I open it up in sublime text to see if some parts decode the encoded data properly, and it did.
Now for the last part, we need to extract a p4.txt
using binwalk.
We can decrypt it using Vigenère Cipher with the key alexa
, the challenge creator, as seen inside the raw PDF data.
So our flag becomes, dsc{publ1c_d15pl4y_0f_fq3gq10n_b4nn3d}
3. Mike
Using stegsolve, we can filter out a channel to see the hidden data, which looked like Spotify song codes we can scan.
So, I decided to take a look at the official music video at that frozen time on the machine;
4. Detective Telephone
We’re given a flag.wav
file which has some keypad tones in it. That can be some encoded message, so I tried extracting the DTMF tones from it using an online extractor, and after trying many different cryptic operations on it, no intelligible message was found. Then I tried this tool, and noticed that it extracted more tones than the online one.
Cryptography
1. Stars and Shapes
!!! Flash Warning !!!
We have another gif,
At first, seeing the flag braces I thought it was a mono-substitution cipher that had something to do with number of angles that each shape had. But later, some of the frames with different combination of shapes gave the same number, so due to collision that can not be it.
Then a teammate suggested to check out Braille Cipher, which solved it.
2. RSA - 3
As my teammate solved both RSA -1 & RSA -2, I’m including this one here to complete the crypto set.
We’re provided with a RSA public key .pub
file, and we are asked to find the private key exponent d
.
To retrieve the modulus value n
and public key exponent e
, we can use openssl rsa -pubin -in mykey.pub -text -noout
I will use the python script from here, after entering the correct values in decimal for modulus and public key exponent.
Look into Wiener’s attack on RSA!