0xL4ugh CTF Write-up

Raj Upadhyay
4 min readJan 16, 2021

So after a long time, I participated in CTF.

Let’s see how I was able to solve a few challenges.

Misc

1.Sanity check

So let’s go to the Discord page.

Any we find our flag in “TOPIC”

Flag: 0xL4ugh{welc0m3_t0_Our_Firs7_CTF}

Noisy

So let’s download this zip file and see what’s inside of the zip.

So let’s open it with Audacity.

Nothing interesting here so let’s change it to a spectrogram.

So let’s adjust the frequency to view the flag properly.

Flag:0xL4ugh{Sp3c7r0_1s_Gr347}

Gesture

So let’s see what’s inside this zip file.

So let’s first open it with a notepad

Looks like some wired text is inside this file. So I did a google search and I found that this file is used to store pattern lock sequence. So after a few minutes of google search, I found this amazing Github repository. (https://github.com/MGF15/P-Decode)

So we got Pattern and our flag.

Flag:0xL4ugh{75214863}

1990

So let’s open the zip file.

So again I opened it with Audacity but nothing interesting to listen to this wave file and I found that it was a DTMF tone.

with this Website, I was able to decode DTMF tome. (https://unframework.github.io/dtmf-detect/#/)

So now I used “SMS Phone Tap Code Cipher decoder to decode this thing.”

(https://www.dcode.fr/multitap-abc-cipher)

Flag:0xL4ugh{NOTEVERYTHINGONSAMEWAY}

Forensics

Baby Shark

So let’s open a zip file.

So it’s the forensic challenge I opened this file with Wireshark.

And the first thing I did was “Export Objects” and I was able to see many files.

So I opened all the files one by one. Login.php file was interesting

So email is “flag” and password is our flag. So after a few times, I was able to decode it. ( it was base58 string)

Flag: 0xL4ugh{W1R3SH4ARK_I5_N0I53Y}

WEB

Cakes Shop

So let’s open the URL.

So as we can we have one cake shop where we need to buy the flag but our balance is : 0. So I immediately looked into cookie. and able to figure out that if I change the value of the cookie then my balance field is also modified.

Flag:0xL4ugh{baSe_32_Cook!es_ArE_FuNny}

Thank you for reading.

--

--

Raj Upadhyay

Pursuing M. Tech. in Cyber Security and Incident Response. #LoveToPlayCTF #infosec #cybersecurity