Contents

ImaginaryCTF 2024

imaginaryCTF 2024

FORENSICS:

bom

Description: 楣瑦筴栴瑟楳渷彣桩渳獥

Attachments:chal.txt

Solution: Inside the file, only the text þÿ is not part of the flag; the rest of the content, ictf{th4t_isn7_chin3se}, is the flag.

Flag: ictf{th4t_isn7_chin3se}


packed

Description: Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows users to create network topologies and imitate modern computer networks. The software allows users to simulate the configuration of Cisco routers and switches using a simulated command line interface. (same attachment as routed)

Attachments:routed.pkg

Solution: extrat .pkg file by ezyzip.com and get secret.png

Secret.png extracted from Packet Tracer
Secret

flag: ictf{ab4697882634d4aeb6f21141ea2724d0}


cartesian-1

Description: THIS IS AN OSINT CHALLENGE.

Greetings. You have been tasked with investigating the whereabouts of a potential recruit. To perform this top-secret background check, we must gather as much information as possible.

Please investigate Terrence Descartes. We know that his social accounts are relatively new, so please do not attack anything out of scope. For the sake of this series of challenges, nothing pertaining to Terry has existed before July 17, 2024. Do not investigate anything posted online before then.

Attachments: None, search his profile on instagram

Instagram profile of Terrence Descartes
Terrence

Solution: inside his instagram story : travel 😎😎😎

flag: ictf{i_love_revealing_info_on_the_internet}


dog-mom

Description: This is an OSINT challenge.

i’m a dog mom i 🩷 dogs

Find where this picture was taken; submit your flag as ictf, both rounded to three decimal places. (example: ictf{-12.345_66.533})

Attachments:image.png

Dog mom image for location challenge
Image

Solution: The first step is using Google Image Search and I found a clue on Flickr. However, the view through the windows is not from the Cathedral of Learning’s 36th floor because the coordinates do not match. I think it might be a different building at the same location.

location is Cathedral of Learning Panther fountain 😂

Latitude: 40.44397 Longitude: -79.95358

Flag: ictf{40.444_-79.954}


REVERSING

unoriginal

Description: i like elf reversing

Attachments: unoriginal

Solution: Open the terminal by pressing Ctrl+Alt+T, then type the following command to check information about the ELF file.

$ file unoriginal
unoriginal: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), 
dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2,
BuildID[sha1]=e62dc74b0e909a63a0fc240a62ee75ab47936823,
for GNU/Linux 3.2.0, not stripped

next is check strings by typing following command

$ strings unoriginal
Enter your flag here: 
lfqc~opvqZdkjqm`wZcidbZfm`fn`wZd6130a0`0``761gdx
Correct!
Incorrect.

or use xxd hex editor

xor 5 to get flag

a = 'lfqc~opvqZdkjqm`wZcidbZfm`fn`wZd6130a0`0``761gdx'

for i in a:
    print(chr(ord(i) ^ 5), end='')

Flag: ictf{just_another_flag_checker_a3465d5e5ee234ba}


CRYPTO

base64

Description: yet another base64 decoding challenge

Attachments: Main.py out.txt sbg.png

Solution:

from Crypto.Util.number import long_to_bytes # type: ignore

secret_key = [10, 52, 23, 14, 52, 16, 3, 14, 37, 37, 3, 25, 50, 32, 19, 14, 48, 32, 35, 13, 54, 12, 35, 12, 31, 29, 7, 29, 38, 61, 37, 27, 47, 5, 51, 28, 50, 13, 35, 29, 46, 1, 51, 24, 31, 21, 54, 28, 52, 8, 54, 30, 38, 17, 55, 24, 41, 1]

out = 0

for num in secret_key[::-1]:
    out *= 64
    out += num

print(long_to_bytes(out).decode())

Flag: ictf{b4se_c0nv3rs1on_ftw_236680982d9e8449}


WEB

readme

Description: Try to read the flag.txt file.

Attachments: readme.tar.gz

Solution: extract the readme file by typing following command

$ tar -zxvf readme.tar.gz

then found flag inside dockerfile.

Flag : ictf{path_normalization_to_the_rescue}


MISC

sanity-check

Description: Welcome to ImaginaryCTF 2024!

Attachments: ictf{this_isnt_real}


discord

Description: Join our Discord community for updates and support! If you would like to do some more CTF after this competition, we do host daily CTF challenges on our Discord server as well. Join at https://discord.gg/ctf . You can find the flag for this challenge in the #imaginaryctf-2024 channel.

Attachments: None

Flag: ictf{fake_flag_for_testing}