# ACE CTF

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F9x934FxhAV44A2SyKjeY%2Fimage.png?alt=media&#x26;token=a1d2ebdb-e52b-44ce-a499-d79b6d9274aa" alt="" width="563"><figcaption><p>23/661 teams</p></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FOC3bI5MkappQCPkvWupF%2Fimage.png?alt=media&#x26;token=b55ba984-24b4-4bf7-ae6d-bb6b3db73be7" alt=""><figcaption><p>21/659 teams CTFtime</p></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FglJprxuNkvknQEUreMJm%2Fscreencapture-acectf-tech-challenges-2025-02-28-15_40_45.png?alt=media&#x26;token=c125ab6a-8102-487a-8eb0-b242c488ffa4" alt="" width="375"><figcaption><p>31/42 solved</p></figcaption></figure>

| Name                                                                                                                                             | category            |
| ------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------- |
| [Buried Deep](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#buried-deep)                                                     | Web                 |
| [Webrypto](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#webrypto)                                                           | Web                 |
| [Token Of Trust](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#token-of-trust)                                               | Web                 |
| [Flag-fetcher](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#flag-fetcher)                                                   | Web                 |
| [Bucket List](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#bucket-list)                                                     | Web                 |
| [Broken Secrets](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#broken-secrets)                                               | Forensics           |
| [Hidden in Traffic](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#hidden-in-the-traffic)                                     | Forensics           |
| [Virtual Hard Disc](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#virtual-hard-disk)                                         | Forensics           |
| [Fractured Frames](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#fractured-frames)                                           | Forensics           |
| [Keyboard Echo](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#keyboard-echo)                                                 | Forensics           |
| [Tabs\&Spaces](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#tabs-and-spaces)                                                | Steganography       |
| [Cryptic Pixels](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#cryptic-pixels)                                               | Steganography       |
| [HeaderHijack](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#headerhijack)                                                   | Steganography       |
| [Fall of 2022](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#fall-of-2022)                                                   | Osint               |
| [The Symphony of Greatness](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#the-symphony-of-greatness)                         | Osint               |
| [For The Fans](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#for-the-fans)                                                   | Osint               |
| [A Little Extra Knowledge Is Dangerous](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#a-little-extra-knowledge-is-dangerous) | Cryptography        |
| [DONOTOPEN](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#donotopen)                                                         | Reverse Engineering |
| [Insanity Check](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#insanity-check)                                               | Misc                |
| [Hash Guesser](https://aurichia.gitbook.io/aurichia-docs/ctfs-tours/2025/ace-ctf#hash-guesser)                                                   | Misc                |

{% stepper %}
{% step %}

### Buried Deep

> "I’m not a hacker. I’m just someone who wants to make the world a little better. But the world isn’t going to change itself."
>
> Submit your answer in the following format: ACECTF{3x4mpl3\_fl4g}
>
> The flag content should be in lowercase letters only.

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FrTsn3jU7eFZ1xODmyxwj%2Fimage.png?alt=media&#x26;token=da48b526-0ba6-4490-9f5d-09cbe78faf71" alt=""><figcaption></figcaption></figure>

then after simple enumeration we can find something interesting in the css

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FPBDE5Xah5EQTEuIVBFOa%2Fimage.png?alt=media&#x26;token=acbf1092-53c6-4a83-ad93-6af306febc73" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FqlhRl6csnOE9UXda8uet%2Fimage.png?alt=media&#x26;token=8fde2047-c3c6-4d1e-abb6-cbadcfe7db57" alt=""><figcaption></figcaption></figure>

we found the 3rd part of the flag? thats weird lol so lets just continue then i found

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FYaxkz6s8KdxpRm9bYGUP%2Fimage.png?alt=media&#x26;token=ab86d76a-d2eb-49b2-b0ce-139bb964f6ff" alt=""><figcaption><p>/robots.txt</p></figcaption></figure>

then i tried going in one by one and we can find the other 2 parts of the flags that are only encoded inside of those endpoints so you can just decode and craft the flag

{% code overflow="wrap" %}

```
ACECTF{1nf1l7r47ing_7h3_5y57em_15_345Y_WH3N_Y0U_KN0W_WH3R3_7h3_53cr3t5_4r3_bur13d}
```

{% endcode %}
{% endstep %}

{% step %}

### Webrypto

> I think we can all agree that most of us grew up watching the iconic cartoon Tom & Jerry. Every kid would feel that surge of adrenaline during the thrilling chases and chaotic conflicts between the mischievous mouse and the ever-determined cat. The excitement of those scenes—the heart-pounding moments of escape—sometimes felt almost real.
>
> But then, I heard a little rumor: what if all those chases were fake? What if Tom and Jerry were actually friends all along? That revelation shook me. I had no one to ask about this mind-bending twist, so I decided to take matters into my own hands—I created a web app to settle this question once and for all.
>
> I know the truth now. Do you think you can uncover it too?

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FQqlTFVO6MetxO58ZMdV6%2Fimage.png?alt=media&#x26;token=cc25eedb-68cb-4d9c-934a-22d9389a9482" alt=""><figcaption></figcaption></figure>

so this challenge just reveals the backend logic of the challenge so first it will compare the value of tom and jerry and then also compare the md5 values after appending the values of tom and jerry to ACECTF

#### exploit :

so we can actually break the logic of the machine just buy inputting arrays to the php like\
endpoint/?tom\[]=1\&jerry\[]=2

so when they check the values of the array \[1] and \[2] are still different and then when they check the values of the md5 from tom / jerry should be possibly an array or NULL so imagine if it returns NULL if im not wrong then it will check if ACECTFNULL == ACECTFNULL ofcouse this will return true and the server will give us the flag

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FqwnLUne83g3n0CEVqau5%2Fimage.png?alt=media&#x26;token=e6bc2267-0fe2-4f56-96e0-a73acb7a5beb" alt=""><figcaption></figcaption></figure>
{% endstep %}

{% step %}

### Token Of Trust

> At first, this web app seems straightforward, but there’s something more lurking beneath the surface. It relies on a token for user authentication, but not everything is as secure as it seems. Look closely, and you might discover that the system’s trust can be manipulated.
>
> The secret is hidden within the way this token is used. Can you find the key to unlock what’s been concealed? The challenge is waiting for you to crack it.
>
> Submit your answer in the following format: ACECTF{3x4mpl3\_fl4g}

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FDAcPf0qITkqreFOIz5fm%2Fimage.png?alt=media&#x26;token=3765643a-9157-4005-962e-d85b4b992f4d" alt=""><figcaption></figcaption></figure>

coming in the website we are getted by the main page that told us about going the /login with a POST header

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FCTCjh40aw2cogoKpLaIQ%2Fimage.png?alt=media&#x26;token=92aa22e4-b4b0-485f-9162-dceda33d15e4" alt=""><figcaption><p>/login</p></figcaption></figure>

going inside the login page he gave use a json payload for us to send to the website

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FAnoKcRKbAIMnUCMibKV6%2Fimage.png?alt=media&#x26;token=d65f98e7-5b0f-47a4-b557-c9b3b9a098f1" alt=""><figcaption></figcaption></figure>

after doing what he told us to do the server will return us a token that by experience we can already tell that this is a jwt cookie exploit after checking the /robots.txt we found the other endpoint called /flag that accepts the jwt cookie so changing the alg to none and changing the username to admin then removing the 3rd part of the jwt we have crafted our payload

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2Fn4OiiLnKSgSHnQaHLtnf%2Fimage.png?alt=media&#x26;token=31d608b9-0c54-42d9-8342-d67d7a0b1c27" alt=""><figcaption></figcaption></figure>
{% endstep %}

{% step %}

### Flag Fetcher

> Hey guys, I created a flag fetcher using some web stacks & technologies. It was supposed to fetch the flag.webp image file which contains the flag but there was some kind of error in doing that. Can you verify it? Maybe just get the flag I don't really care if you fix it or not.

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FErrEBZnVxwOVJrkTEqFD%2Fimage.png?alt=media&#x26;token=9a831db4-af98-4e64-a4ee-0fbe70f63e78" alt=""><figcaption></figcaption></figure>

after coming in the link i saw that the web was suspicious after coming into the  endpoint it has a delay then it automaticly redirects us to picture isnt this weird? talking about the redirect but also the delay so i went to intercept and check  what  was happening

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FYl6AndHVTz6oyNHiTrQx%2FScreenshot%202025-02-28%20001812.png?alt=media&#x26;token=2053ad2b-05f9-495c-805a-196b00cb0f98" alt=""><figcaption></figcaption></figure>

after intercepting then a slight enumeration we can see that the server is taking lots of network that contains the flag and we solved the challenge
{% endstep %}

{% step %}

### Bucket List

> You know what's a bucketlist? In simple terms, it's just a list of wishes people want to achieve before the leavee this world. I found it to be very limiting & ironic because how can you know when you'll leave the world behind? It's better to enjoy every moment and take on every opportunity you can. One of my whishes though is to pet a cat, do you mind checking this one out. So cute.

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FA5FU3O0sokvj2YcdPQHg%2Fimage.png?alt=media&#x26;token=d99576bc-3e22-4152-a772-caad6e8c1fee" alt=""><figcaption></figcaption></figure>

so we were greeted by this cute cat but looking at the url this is not normal it was using AWS bucketlist thing i forgot about the name but we can go to the original page

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FyAmjmz3X9dEZgEW519Zr%2Fimage.png?alt=media&#x26;token=aff5667f-6676-4b40-b78c-c22763d13a9f" alt=""><figcaption></figcaption></figure>

we can see that the server lists all of the endpoints now we just need to find the flag

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FEK3u03t4VURucc32ovNL%2Fimage.png?alt=media&#x26;token=044e0562-98fd-4a40-ad14-25fc0bae3c2a" alt=""><figcaption></figcaption></figure>

just a simple search for txt we found this secret.txt file&#x20;

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F8BxWcepH5NTFlvPiYHUk%2Fimage.png?alt=media&#x26;token=c2cbea6e-7afb-498e-93fb-b64d4b1e8f84" alt=""><figcaption></figcaption></figure>

we found a base64 data

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FWHbdNdE5GVhOJpsMhbHK%2Fimage.png?alt=media&#x26;token=7397c1ea-37c3-482e-9b3f-01a8730da9ba" alt=""><figcaption><p>cyberchef</p></figcaption></figure>

simple decode and we got the flag
{% endstep %}

{% step %}

### Broken Secrets

> You’ve found a suspicious file, but it seems broken and cannot be opened normally. Your goal is to uncover its secrets.
>
> Submit your answer in the following format: ACECTF{3x4mpl3\_fl4g}

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FJeWL6E46qnSSjqzaTPb0%2Fimage.png?alt=media&#x26;token=f3951176-e3b0-4c4e-9801-27ddc0b209be" alt=""><figcaption></figcaption></figure>

when we check the file type it says 7z so i tried using 7z to extract the data

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FgWNtztFsdNvkRgP7kd9m%2Fimage.png?alt=media&#x26;token=578d3d24-7521-4f62-bfad-13f9480cb0b1" alt=""><figcaption></figcaption></figure>

well this is weird word files?

going inside the /media folder we can find a not suspicious folder literally

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F7aBn76kD6PfNGWlHV6cG%2Fimage.png?alt=media&#x26;token=c034336d-df53-4e31-b13e-078193c9893d" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FNUOSfTYEfpRVKPA3irDv%2Fimage.png?alt=media&#x26;token=6f8ed1a9-ef5f-4ad2-817c-8c8368f638ae" alt=""><figcaption></figcaption></figure>

when we xxd we can see the IHDR chunk this is something thats common in pngs so lets try to fix it

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FrVtF0EoS8DVwkl885vps%2Fimage.png?alt=media&#x26;token=51a0bc35-de20-4d82-97f2-d2e39c4cd261" alt=""><figcaption></figcaption></figure>

we only need to fix the first byte of the picture then we can open the picture

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FY2q6uBmKLzxYJPSF36sV%2Fimage.png?alt=media&#x26;token=07ede9f5-be70-4919-a095-9b8a5f7771d0" alt=""><figcaption><p>eog</p></figcaption></figure>
{% endstep %}

{% step %}

### Hidden in the traffic

> A whistleblower tipped us off about a secret communication between two devices. We managed to intercept the network traffic, but the flag is hidden within the data. Your task is to analyze the provided PCAP file, uncover the hidden message, and extract the flag.
>
> Submit your answer in the following format: ACECTF{3x4mpl3\_fl4g}

starting off the challenge we have to understand what the challenge is asking for it saying about a secret communication between two devices

when we first open the file in pcap and when check the data theres a huge load of icmp data thats suspicious from that we can already suspect that icmp is the primary target cause we also know that icmp a protocol makes a devices can comminucate with other devices

i will be using pyshark to get the data from the icmp packets in the capture file

```python
import pyshark

cap = pyshark.FileCapture("mys.pcapng", display_filter="icmp")

hidden_message = b""
for packet in cap:
    if hasattr(packet.icmp, "data"):
        icmp_data = packet.icmp.data.replace(":", "")
        hidden_message += bytes.fromhex(icmp_data)

print("Hidden Message:", hidden_message.decode("utf-8", errors="ignore"))
```

this will take all the data from the icmp packets

> AABCDEFGHIJKLCABCDEFGHIJKLEABCDEFGHIJKLCABCDEFGHIJKLTABCDEFGHIJKLFABCDEFGHIJKL{ABCDEFGHIJKLpABCDEFGHIJKL1ABCDEFGHIJKLnABCDEFGHIJKL6ABCDEFGHIJKL\_ABCDEFGHIJKL0ABCDEFGHIJKLfABCDEFGHIJKL\_ABCDEFGHIJKLDABCDEFGHIJKL3ABCDEFGHIJKL4ABCDEFGHIJKL7ABCDEFGHIJKLhABCDEFGHIJKL}ABCDEFGHIJKLAABCDEFGHIJKLCABCDEFGHIJKLEABCDEFGHIJKLCABCDEFGHIJKLTABCDEFGHIJKLFABCDEFGHIJKL{ABCDEFGHIJKLpABCDEFGHIJKL1ABCDEFGHIJKLnABCDEFGHIJKL6ABCDEFGHIJKL\_ABCDEFGHIJKL0ABCDEFGHIJKLfABCDEFGHIJKL\_ABCDEFGHIJKLDABCDEFGHIJKL3ABCDEFGHIJKL4ABCDEFGHIJKL7ABCDEFGHIJKLhABCDEFGHIJKL}ABCDEFGHIJKL

this is the output that we get i was a bit confused but then when i asked deepseek he seems to know the answer and created this script

```python
# Input string
data = "AABCDEFGHIJKLCABCDEFGHIJKLEABCDEFGHIJKLCABCDEFGHIJKLTABCDEFGHIJKLFABCDEFGHIJKL{ABCDEFGHIJKLpABCDEFGHIJKL1ABCDEFGHIJKLnABCDEFGHIJKL6ABCDEFGHIJKL_ABCDEFGHIJKL0ABCDEFGHIJKLfABCDEFGHIJKL_ABCDEFGHIJKLDABCDEFGHIJKL3ABCDEFGHIJKL4ABCDEFGHIJKL7ABCDEFGHIJKLhABCDEFGHIJKL}ABCDEFGHIJKLAABCDEFGHIJKLCABCDEFGHIJKLEABCDEFGHIJKLCABCDEFGHIJKLTABCDEFGHIJKLFABCDEFGHIJKL{ABCDEFGHIJKLpABCDEFGHIJKL1ABCDEFGHIJKLnABCDEFGHIJKL6ABCDEFGHIJKL_ABCDEFGHIJKL0ABCDEFGHIJKLfABCDEFGHIJKL_ABCDEFGHIJKLDABCDEFGHIJKL3ABCDEFGHIJKL4ABCDEFGHIJKL7ABCDEFGHIJKLhABCDEFGHIJKL}ABCDEFGHIJKL"

# Split the string by "ABCDEFGHIJKL"
parts = data.split("ABCDEFGHIJKL")

# Extract the first character of each part (except the last one, which is empty)
flag = "".join([part[0] for part in parts if part])

print("Extracted Flag:", flag)
```

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FdZ9QtszKuxoN1iFpfCYC%2Fimage.png?alt=media&#x26;token=80fe0e8b-1a42-4bbf-89ea-421211fa8a5d" alt=""><figcaption></figcaption></figure>
{% endstep %}

{% step %}

### Virtual Hard Disk

> One of the first things I learnt when I started learning to hack was linux. It was fun until I hit a ceiling of understanding about the differences in Operating Systems, what's a Shell, Kernel, etc.
>
> But once I got better I started developing a liking towards the terminal and how the Linux operating system is `better` than say Windows, or `worse` in some cases. How none of them is superior, nor the other inferior. We shall find out with this challenge.
>
> Be careful, a lot of fake galfs around.

cause we are going to work with disk things i forgot what its called im gonna use sleuthkit to solve it

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FdHoXTXi0smIpRBTJRZs6%2Fimage.png?alt=media&#x26;token=9163a301-093f-4859-a3b4-dd6261bb4224" alt=""><figcaption></figcaption></figure>

then after we know where the offset it we can just do fls

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FiN2a8eFvFlEbPgYAipvB%2Fimage.png?alt=media&#x26;token=9168be82-3d77-4b45-a6f4-05f1b36a6979" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FKV8Ms64i8pWx8u8lbm9N%2Fimage.png?alt=media&#x26;token=6a457766-08c7-4c4c-84eb-90a2b9255787" alt=""><figcaption></figcaption></figure>

we actually found some interesting stuff so lets try seeing what inside the so called flag

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FdRNJ08lue9rlfVnYUV11%2Fimage.png?alt=media&#x26;token=32a4ead3-55ea-419d-9509-9282806656cb" alt=""><figcaption></figcaption></figure>

so the flag is not yet found so lets get a bit more info i saw one of the files also had a key

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FD40bhj9ORTiXGf9dhPjx%2Fimage.png?alt=media&#x26;token=f82a8a66-7c48-4b92-bad0-ea482591db9e" alt=""><figcaption></figcaption></figure>

so theres also a key for this flag so i begin to think that this flag uses something like vigenere

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FHAF1q8oi7m1JsSE6KpPl%2Fimage.png?alt=media&#x26;token=13641307-002e-47aa-9554-fa656e0cc2e5" alt=""><figcaption></figcaption></figure>

and i was correct and solved the challenge
{% endstep %}

{% step %}

### Fractured Frames

> A forensic investigator retrieved this image from a suspect’s device, but something isn’t right. The structure shows unusual modifications. Could it be that vital information was concealed rather than erased?
>
> Flag Format: ACECTF{3x4mpl3\_fl4g}

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FK09ybUpGKApAIn6lOVLS%2Fimage.png?alt=media&#x26;token=6825ec05-201f-444d-9a18-9086915971ce" alt=""><figcaption></figcaption></figure>

we were given a picture of me JK but the picture looks kinda cut so we can try resizing the picture and maybe find something

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2Ffn7Q6yYJVeqXcEYf2xvp%2Fimage.png?alt=media&#x26;token=ad9a2af9-f443-4575-bdd6-e00870e35f95" alt=""><figcaption></figcaption></figure>

cause this file is a jpg file we can go to the bytes after FF C0 after 8 bits we can resize the picture i just added another 08

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FzrLeiPq51C4E9B8HSWVt%2Fimage.png?alt=media&#x26;token=53229cea-5627-44e7-8be5-004a9702c032" alt=""><figcaption><p>dont ask</p></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FnFutiAZ4NWfbJon8qEwl%2Fimage.png?alt=media&#x26;token=a0dd7f2d-d697-4c4c-b52e-4cd3a8113fa7" alt=""><figcaption></figcaption></figure>

we found the flag

{% endstep %}

{% step %}

### Keyboard Echo

> You have intercepted USB traffic from a device and captured the data in a .pcapng file. However, the keystrokes are encoded and need to be converted into readable text.
>
> Your task is to analyze the provided packet capture, extract the keystrokes, and reconstruct the original input.
>
> Flag Format: ACECTF{3x4mpl3\_fl4g}

i actually never solved USB traffic thing ctf so i started by studying about the vulnerabilty

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FIpOcOU6bv2qdEDtfmoZ9%2Fimage.png?alt=media&#x26;token=823b453e-f6f1-4a5f-bec2-278a3ee77d4a" alt=""><figcaption></figcaption></figure>

but then after i came across this web

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FosDN5mbkLSmOOgHnyf5P%2Fimage.png?alt=media&#x26;token=da4a4a1e-2580-460b-9499-f8022d6362a3" alt=""><figcaption></figcaption></figure>

we found this script that says it can convert the letters also? this is very handy so i used this payload

{% code overflow="wrap" %}

```python
# This script extracts the keypresses from a pcapng file.
import os

pcapng_filename = "abcd.pcapng"
keypress_ids_filename = "keypress_ids.txt"

# create the output for
command_pcapng_to_keypress_ids = (
    f"tshark -r '{pcapng_filename}' -T fields -e usb.capdata > {keypress_ids_filename}"
)
print(
    f"Running the following bash command to convert the pcapng file to 00xx00000 nrs:\n{command_pcapng_to_keypress_ids}"
)
os.system(command_pcapng_to_keypress_ids)

# read keypress id file
switcher = {
    "04": "a",  # or A
    "05": "b",  # or B
    "06": "c",  # or C
    "07": "d",  # or D
    "08": "e",  # or E
    "09": "f",  # or F
    "0A": "g",  # or G
    "0B": "h",  # or H
    "0C": "i",  # or I
    "0D": "j",  # or J
    "0E": "k",  # or K
    "0F": "l",  # or L
    "10": "m",  # or M
    "11": "n",  # or N
    "12": "o",  # or O
    "13": "p",  # or P
    "14": "q",  # or Q
    "15": "r",  # or R
    "16": "s",  # or S
    "17": "t",  # or T
    "18": "u",  # or U
    "19": "v",  # or V
    "1A": "w",  # or W
    "1B": "x",  # or X
    "1C": "y",  # or Y
    "1D": "x",  # or Z
    "1E": "1",  # or !
    "1F": "2",  # or @
    "20": "3",  # or #
    "21": "4",  # or $
    "22": "5",  # or %
    "23": "6",  # or ^
    "24": "7",  # or &
    "25": "8",  # or *
    "26": "9",  # or (
    "27": "0",  # or )
    "2D": "-",  # or _
    "2E": "+",  # or =
    "2F": "[",  # or {
    "30": "]",  # or }
    "31": '"',  # or |
    "33": ";",  # or :
    "34": "'",  # or "
    "35": "`",  # or ~
    "36": ",",  # or <
    "37": ".",  # or >
    "38": "/",  # or ?
}


def readFile(filename):
    fileOpen = open(filename)
    return fileOpen


file = readFile(keypress_ids_filename)
print(f"file={file}")

# parse the 0000050000000000 etc codes and convert them into keystrokes
for line in file:
    if len(line) == 17:
        two_chars = line[4:6]
        try:
            print(
                f"line={line[0:16]}, relevant characters indicating keypress ID: {two_chars} convert keypres ID to letter: {switcher[two_chars]}"
            )
        except:
            pass
```

{% endcode %}

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2Ff2oQ0mp76yDk7tCxjdf2%2Fimage.png?alt=media&#x26;token=989ca7f6-bcd2-44dc-a888-ed1c3e274526" alt=""><figcaption></figcaption></figure>

running the code i seem to only find a part of the flag so i saved the data from the reader to a file then use another script to read the text

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FpH3bxR9TCQfknPo2Ahd1%2Fimage.png?alt=media&#x26;token=a36e3a4f-4089-4b14-a116-6fd9fc9a1e74" alt=""><figcaption></figcaption></figure>

and we found the flag

ACECTF{y0u\_h4v3\_f0und\_17}
{% endstep %}

{% step %}

### Tabs\&Spaces

> A mysterious ZIP file containing a collection of images and a file has been discovered.The task is to retrieve the flag.

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FwS2XqgoqSdzY8HBXUJ4a%2Fimage.png?alt=media&#x26;token=d5e444c7-d436-4d13-a0fc-8569dfe1a421" alt=""><figcaption></figcaption></figure>

atfirst we extract the file we can find a folder filled with hidden picture but there was one picture that was unique than the other

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FOGvckcgXBKl2RIWFU4Qq%2Fimage.png?alt=media&#x26;token=2c9aac12-dec4-4561-92f2-83812e0e19d1" alt=""><figcaption></figcaption></figure>

when doing steghide the file seems to give a txt this is where the actual ctf is lol

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FcWHQoGXxxODzBT63sXfd%2Fimage.png?alt=media&#x26;token=faa3eba7-da85-4a3c-8fad-90dabeb3e468" alt=""><figcaption><p>PS i dont even know why i tried printing a file called "whitespace"</p></figcaption></figure>

from what the challenge is called tabs and spaces we can try to get those and maybe change it to something like binary im just gonna use python to make stuff easier

```python
with open("whitespace_flag.txt", "r") as file:
    content = file.read()

binary_output = ""

for char in content:
    if char == " ":
        binary_output += "0"
    elif char == "\t":
        binary_output += "1"

print(binary_output)
```

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FfztdTLLdEOn6EOsDyNrr%2Fimage.png?alt=media&#x26;token=452b8ef8-1c7e-4308-810b-73649c46752b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FE3vECgSkwjLGHWNjcG95%2Fimage.png?alt=media&#x26;token=4401dc5b-ce5c-453e-986f-2070e54a38c4" alt=""><figcaption></figcaption></figure>
{% endstep %}

{% step %}

### Cryptic Pixels

> This image looks normal at first, but something important is hidden inside. The secret is carefully concealed, making it hard to find.
>
> Your task is to explore the image, uncover the hidden message, and reveal what’s concealed. Do you have what it takes to crack the code and unlock the secret?
>
> Submit your answer in the following format: ACECTF{3x4mpl3\_fl4g}

so from the desc we should read the desc carefully it says do you have what it takes to "crack" the code this will be useful later

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FDbrdvajXKg66caVi8jFk%2Fimage.png?alt=media&#x26;token=c856b413-0883-40e0-be18-e9a63b076be7" alt=""><figcaption></figcaption></figure>

there was embedded data inside the picture so after extracting

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FuozmithO40ARgzS2SA5U%2Fimage.png?alt=media&#x26;token=df2071a6-d0aa-4dc8-bfb5-bb539f8d9d09" alt=""><figcaption></figcaption></figure>

we were given 2 zips but im sure the flag is in the B8 file

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FhaY2eVex75Cy896N6Bf8%2Fimage.png?alt=media&#x26;token=de2d46ed-96da-4bb4-b7c2-683c95489854" alt=""><figcaption></figcaption></figure>

so we actually need to crack the code to the zip we can just use zip3john then john using the most famous and overused wordlist

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FAlx5MEg3mHeTdvn0UOUX%2Fimage.png?alt=media&#x26;token=227230a3-9d1f-4b7c-82ea-18328c33254e" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FphL8uYWXrKwvxdTGUuVU%2Fimage.png?alt=media&#x26;token=0e2d14b3-1869-4cd3-ab87-1f40bbba41b8" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F1QiggGUrf1jhQXf8tj2A%2Fimage.png?alt=media&#x26;token=e57b2bb4-091b-4138-9bbd-b75051e46e8f" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F1j1xQDU6gQQqLf6tCasY%2Fimage.png?alt=media&#x26;token=2e1d1bb7-f516-403d-85ca-ba337315647c" alt=""><figcaption></figcaption></figure>

after cracking then extracting the password we actually got the flag

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FsRUGcVyT7NMjL2JtoQ5P%2Fimage.png?alt=media&#x26;token=c95cdf23-c2dc-4697-b147-68aa0bf73238" alt=""><figcaption></figcaption></figure>

as usual in this ctf we still need to do extra stuff

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FxFcU4nURIETeCSyOnvse%2Fimage.png?alt=media&#x26;token=e723239d-e390-4b60-b896-d6feeafb5f15" alt=""><figcaption></figcaption></figure>

using a rot13 bruteforce tool online we manage to get the flag and solved the challenge
{% endstep %}

{% step %}

### HeaderHijack

> A secret agent's intercepted video file refuses to play. A mysterious checksum file was found alongside it. Your task is to repair the file and retrieve the flag...

so first we were given a zip file and it gave us an mp4 when we do xxd we can see the moov byte so to fix this mp4 we also have to use the moov byte and fix the other parts of the header&#x20;

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2Fbg5PzyzQKq58xSCqmpwf%2Fimage.png?alt=media&#x26;token=2d826e7f-5ec5-4e8b-97c9-2958129bb82e" alt=""><figcaption></figcaption></figure>

> <https://www.file-recovery.com/mp4-signature-format.htm>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FSd022Lj3au0qUjrUFhqX%2Fimage.png?alt=media&#x26;token=e4f450d7-a50e-422c-99ad-3276bf8cc757" alt=""><figcaption></figcaption></figure>

we fixed the video and at the end of the video

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FIsY8prsxOgYNKzmoNxHl%2Fimage.png?alt=media&#x26;token=bfad65eb-f530-4f4c-995c-257231b8b1f0" alt=""><figcaption></figcaption></figure>

thanks to peter breaking the stuffs we actually found the flag
{% endstep %}

{% step %}

### Fall of 2022

> It was a peaceful time — schools were over, college admissions were delayed, and COVID was slowly on the decline. It seemed like the perfect time to relax and check my phone for her txts.
>
> The funny thing is, I never got any. So I considered it just another gloomy year.
>
> Anyways, here’s the domain for this CTF: [acectf.tech](https://acectf.tech/)
>
> What? You already knew this domain? Oh, I guess you’ll have no trouble finding the flag then.
>
> Good Luck!

the way he gave us a domain and not just a full url is sus so i tried doing nslookup

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FoGqTsZa0TIP9OiejI08D%2Fimage.png?alt=media&#x26;token=02dc6357-4652-4139-86be-810ae1c4d521" alt=""><figcaption></figcaption></figure>

and we found the flag
{% endstep %}

{% step %}

### The Symphony of Greatness

> Hey everyone, myself *modernlouis*. I remember starting to explore music outside of my native language years ago. Back then, I was just a kid, trying something completely new and unfamiliar. At first, I did it to feel included with others who were effortlessly singing along to the most popular songs of the time.
>
> Over the years, I listened to a *lot of artists*, but for a long time, I couldn’t settle on an all-time favorite. That changed during the recent pandemic. With all the extra time on my hands, I dove deeper into my love for music. Slowly and without even realizing it, I found myself drawn to a specific kind of sound.
>
> What kind of music, you ask? Well, not the ones filled with meaningless words just to make rhymes. Not the albums entirely focused on heartbreak stories. And definitely not the tracks made just to curse or diss someone—come on, let’s move past that.
>
> *I admire musicians who showcase raw vocal talent, seamlessly blend different genres, and have a a signature sound that was instantly recognizable and highly danceable.*
>
> Now, here’s the challenge: Your task is to figure out which band I’m talking about. The biggest hint? **Me...**
>
> Flag Format: The Flag is the band's name followed by their most streamed song, in this format: **ACECTF{band\_name\_song\_name}**
>
> Example: If the band is One Direction and their most streamed song is Night Changes, then the flag would be: ACECTF{0n3\_d1r3c710n\_n16h7\_ch4n635}

so at first glance we can already see that he uses a weird word called *modernlouis*

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F59ibIx0AOrSjsARgtcSA%2Fimage.png?alt=media&#x26;token=9670241f-8d45-4961-9a55-da7945336d8b" alt=""><figcaption></figcaption></figure>

after looking it up we found a band called modern talking

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F64p6Qm73rgYqe81Pc6WY%2Fimage.png?alt=media&#x26;token=1f9b1fdd-1f87-476d-8c1e-94e1ed45ad8b" alt=""><figcaption></figcaption></figure>

after seeing that we can try to submit the flag and not forget the flag format and we actually solved the challenge

ACECTF{m0d3rn\_74lk1n6\_ch3r1\_ch3r1\_l4dy}
{% endstep %}

{% step %}

### For The Fans

> Yo, I’ve lowkey always been a Drake fan, that’s why my username’s "**DrakeSaltyOVO**". It was literally everywhere on my dashboard until I had to take it down 'cause people just kept hating. But, like, that’s one thing I’ve always related to with my guy Drake, and honestly, I’ve been an even bigger fan ever since. 😂 Ya, laugh all you want, but I’m literally the only one with the flag fr, rofl!

i lowkey was listening to not like us while listening to this

so after my teammate found the twitter i decided to continue and help in finding the flag in the twitter he was talking about a blog so i searched up his username online

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FBKevoZfsXqteN46TA1IN%2Fimage.png?alt=media&#x26;token=9eaedac3-0147-4b9c-a302-ff7e5afb7f69" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FpQL3ctMowBhXDNr1xvN0%2Fimage.png?alt=media&#x26;token=86c8b6af-5687-458c-8219-25cdd32cd2de" alt=""><figcaption></figcaption></figure>

after searching his name in the website we found an account with the same username

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FXesXfc63A35YlaBMWERP%2Fimage.png?alt=media&#x26;token=a2fa86b3-c019-42ca-8856-63a6be699471" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FX4WLPbBmx7v47qoGOMi9%2Fimage.png?alt=media&#x26;token=06a2f27c-dc86-4663-868f-2a938a8f425e" alt=""><figcaption></figcaption></figure>

when doing a base64 from that file header we can already know that its a 7z file so i created a script to save that into a script

{% code overflow="wrap" %}

```python
import base64

# Your Base64-encoded string
encoded_string = "N3q8ryccAAQrDS+tIAAAAAAAAABqAAAAAAAAANGqpB7VL3HfX5dq2a0oNrtZRM2Hum9ExZnUSpeMMG2rzSg6lQEEBgABCSAABwsBAAIkBvEHARJTD3GIJuGJqEfIwbSE/71QeN8hIQEAAQAMIBwACAoBra6o3QAABQEZAQAREwBmAGwAYQBnAC4AdAB4AHQAAAAZABQKAQCfS+NlYELbARUGAQAgAAAAAAA="

# Decode the Base64 string
decoded_data = base64.b64decode(encoded_string)

# Save the decoded data to a file
with open("output.bin", "wb") as file:
    file.write(decoded_data)

print("Decoded data saved to 'output.bin'")
```

{% endcode %}

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FUQ2pwwTk74pvjp9OSVnm%2Fimage.png?alt=media&#x26;token=600bf7d0-6090-4759-8d5e-4ad646e9fd2a" alt=""><figcaption></figcaption></figure>

it was asking for a password i suddenly remembered that the twitter said something about the password and we can expect it was his birthday by confirming the time to crack

and we found it 2000914

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FgjEZWpMQlFWsBZX1pEEn%2Fimage.png?alt=media&#x26;token=09c71c02-a7d1-431b-bde5-ee0e089e06f6" alt=""><figcaption></figcaption></figure>

and we solved the challenge
{% endstep %}

{% step %}

### A Little Extra Knowledge Is Dangerous

> Have you ever heard the quotes, *A little knowledge is a dangerous thing* and *In the land of the blind, the one-eyed man is king*? They strike me as deeply contradictory—one condemning the slightly knowledgeable, while the other exalts them.
>
> This contradiction highlights something unsettling: fairness doesn’t seem to exist in this world. Everyone seems to twist things to suit their own agendas, leading to divisions—arbitrary ones—where people impose their ideologies on others.
>
> What if we eliminated excess knowledge and these divisions altogether? Perhaps then we could live like illiterate cynics—but in peace.
>
> That’s the essence of this challenge I’m presenting to you. Or should I call it a sermon?

we were given this file

> QUNFQ1RGe/MV82dTM1NV95MHVfN3J1bmM0N/zNkXzdoM18zeDdyNF9rbjB3bDN/kNjNfcjRkMG1fNTdyMW42NjY2NjY2NjY2NjU1NTU1NTU1NV/94eHh4eHh4YmJieHh4eHh4Y2N/jY3h9

so i tried doing base 64

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2Fll6pYiLELT6p7a8AoJdJ%2Fimage.png?alt=media&#x26;token=911fae11-1fcb-4133-a580-712b8405f490" alt=""><figcaption></figcaption></figure>

seems like this encoded are separated into parts to make it easier i made into parts too

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FE1ur5I4XFG05qQFgs98e%2Fimage.png?alt=media&#x26;token=396cb4bc-1a17-44aa-98d6-e08639d58403" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FSs87bZgDuDJRKcamG9Xb%2Fimage.png?alt=media&#x26;token=f3dd4747-b9db-4a22-9032-1287bdb03eb6" alt=""><figcaption></figcaption></figure>

by deleting the chars slowly and carefully i managed to extract the flag

> ACECTF{1\_6u355\_y0u\_7runc473d\_7h3\_3x7r4\_kn0wl3d63\_r4d0m\_57r1n66666666666555555555\_xxxxxxxbbbxxxxxxccccx}

and we solved the challenge
{% endstep %}

{% step %}

### DONOTOPEN

> A suspicious script file seems to be hiding something important, but it refuses to cooperate. It's obfuscated, tampered with, and demands a password. Unravel the mystery to uncover the hidden flag.

so we were given a file when i was checking the file using binwalk

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FrroRk1Bcmnu1C6N6I6Lr%2Fimage.png?alt=media&#x26;token=73e242d0-15fb-48fe-bab2-c30d87eeeafe" alt=""><figcaption></figcaption></figure>

thats weird so i extracted the data

we were given a script that has some useless stuff that we can filter out and also a web request thing that i also moved to the bottom&#x20;

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F706bfS60mX1pr1rqXXhu%2Fimage.png?alt=media&#x26;token=c69870d3-6cfd-4547-9ad4-74e97c2d96e0" alt=""><figcaption></figcaption></figure>

{% code overflow="wrap" %}

```python
print(FLAG_PREFIX % hashlib.blake2b(("ACE@SE7EN" + "Vansh").encode("utf-8")).hexdigest()[:32])
```

{% endcode %}

we can just print the above and we can actually get the actual flag without using any of the other distractions
{% endstep %}

{% step %}

### Insanity Check

> You might've breezed through the easy Sanity Check, but this challenge is for true contenders! If you want to prove your sanity is as unhinged as mine, you’ll have to earn it.
>
> How, you ask?
>
> Back when we were building these CTF challenges, everyone would upload their carefully crafted puzzles, and I was the one reviewing them. But me being me—I rejected a ton of them, tossing them straight into the bin for all sorts of reasons. Naturally, my teammates started questioning my sanity, some even calling me insane. But if there was one thing that remained constant, it was the bin. Now, it’s your turn to dig in and you already know where to start... The same place where you proved you were sane!
>
> I think you must be in the Discord server by now - [https://discord.gg/R](https://discord.gg/BWYPxRQPSd)EDACTED

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2FILEvHdaBcKRPTbpMwuD7%2Fimage.png?alt=media&#x26;token=06b38bd5-73ec-441f-8f97-3e0d752f37be" alt=""><figcaption></figcaption></figure>

my friend managed to find a user called pastebin isnt this weird then after getting the hint

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2F9EBSzo3hkBs9PDwUcnFB%2Fimage.png?alt=media&#x26;token=d3612ec5-fe23-4e2d-933f-e75da85b1195" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2781327171-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FMuMceEGBvWN37BjlZKgv%2Fuploads%2Fr6aiR2DSUJrKixOQwNZz%2Fimage.png?alt=media&#x26;token=94953edb-fbec-47e4-8ad2-da325ff179a6" alt=""><figcaption></figcaption></figure>

going inside the paste bin we found the flag
{% endstep %}

{% step %}

### Hash Guesser

> Welcome to the only cracking challenge of ACECTF1.0, here we have a Hash that we need to crack. The target hash has been taken from a very famous wordlist which has around what 14 million passwords? Yeah, but it's not that simple, the target hash has been `base32 encoded` & then `reversed` before generating the `MD5 hash`. I guess that's enough information for you to start, good luck.

so we are provided a code to reverse the stuff and we are provided a nc command to connect to the server so i tried stuffs weirdly the server tells us when a bit is right

like 0/32 when we submit 32 0s we will get 0/32 but when we do all a we will get 1/32 that reminds me of a bitflip attack in picoctf while its different in use but still it could work so after brute forcing the nc we obtained the flag

ACECTF{h45h\_cr4ck1n6\_r3qu1r35\_4\_l177l3\_w17}
{% endstep %}
{% endstepper %}
