Bsides Indore Practice CTF

Samyakt Jain
4 min readApr 7, 2023

--

Greetings to all! Here is a beginner practice CTF from Bsides Indore. The practice CTF will continue until May 2023. It is strongly recommended that beginners attempt this CTF to better understand the tools, methodologies, and learning concepts.

Visit: http://livectf.bsidesindore.in/

Cryptography Challenges

  1. BrainF**ked

The Cipher name is already included in the title of this challenge, which makes it very obvious. The following URL can be used to solve this challenge: https://www.dcode.fr/brainfuck-language

2. Rotten Flag?

The name of the challenge gives a hint about Rot cipher, which is a simple character substitution that is based on the shift and rotation of N letters in an alphabet.

Use this to solve the above challenge https://www.dcode.fr/rot-cipher

3. esrever

It looks like a reverse string, So we tried to reverse the given string by using thisamazing online tool https://gchq.github.io/CyberChef/#recipe=Reverse('Character')&input=Cg

4. Dots and Dashes

Those who play CTF regularly can easily recognize this cipher as Morse code. Use this link https://www.boxentriq.com/code-breaking/morse-code to solve this challenge.

5. Basic Nature

In this challenge the string is given in base32 form, We have used cyberchef for decoding, We can also use this command for decoding

echo “NRUXMZL3N54TGX2EJJPWEYLTMVPWEYLENBQV6QSBKNCX2===” | base32 -d

6. Another Basic Nature?

This challenge is similar to the above one, Base64 is used on this challenge, using cyberchef, we can easily decode this.

7. Vinegar

In this given challenge, Vigenere Cipher is used, We can use the below link for solving this challenge https://www.dcode.fr/vigenere-cipher.

8. AK47

This challenge is all about ROT47, We have to use cyberchef https://gchq.github.io/CyberChef/#recipe=ROT47(47) for decoding.

9. Solve for PAT

The challenge presented here is quite interesting. In this challenge, we have provided a waterfromtap file attached in which we have found the following string.

  • *** **** * * *** ***** ** **** **** **** *** **** **** ***** **** **** ** * *** **** **** ** *** ** * *****

The filename (waterfromtap) appears to be unknown, but if we analyze it properly, we find that it is related to tap encryption, so we have used it. https://cryptii.com/pipes/tap-code#:~:text=The%20tap%20code%20or%20knock,to%20communicate%20with%20each%20other. for solving the challenge.

In order to obtain the flag, We must convert the asterisk sign into a dot sign, then use the above mentioned link.

10. World War II

In this challenge, If we analyse the description then we get the UKW C, If we google UKW C then we got to know that this challenge is regarding the enigma machine.

We need to use this link to solve the above challenge https://cryptii.com/pipes/P2CeCw.

11. Dev Lan What?

In this challenge, we have used this site https://www.devglan.com/online-tools/aes-encryption-decryption to decrypt the AES cipher

Forensic Challenges

1. Elastic String

In this challenge we have given one attached image, We only need to use the strings tool for getting the flag.

2. El As Bee

In this challenge we have been given a png image, So We have used the zsteg tool to find hidden data.

It is that simple, folks!

Look forward to new CTF articles, so follow me on LinkedIn.

Sign up to discover human stories that deepen your understanding of the world.

--

--

No responses yet

Write a response