Arav02

CHALLENGE DESCRIPTION

I disabled right click so this is secure.

Flag Format: flag{}

challenge website

Since, it is mentioned in the challg.description that Right-click is disabled, it shows something is hidden inside the page-source code. Normally, for viewing source what we do is, Right click on page +view page source.

No worries, that can’t stop us from finding flag. We have another shortcut..

shortcut: ctrl+u - to view page- source code

--

--

CHALLENGE DESCRIPTION

Jimmy found out about an embarrassing picture of his dad Steve. He believes that there is a text inside that file somewhere. But he is too scared to open and tamper with it as his father is a very short tempered man. Help Jimmy out!

Flag format — inctfj{flag_here}

We are given a jpeg file. To extract hidden data, we can make use of strings command.

strings -print the sequences of printable characters in files

--

--

CHALLENGE DESCRIPTION

Looks like before Alice gave the key in wrong hands and someone misused it ;). This time the ciphertext is given to you and seems like the magic of XOR has been done on it again! Can you decrypt the given ciphertext and get the original message back?

The ciphertext has been encoded in one of the common encoding format.

Flag Format: inctfj{...}

ciphertext

Decrypt the given ciphertext using Hex-decoder.

--

--

CHALLENGE DESCRIPTION

Given a hex encoded string: 1314190e1c1001024a0825194e145d0e251849251f4e091316032518084a11491407

The above string has been Xored against a single character ‘z’. Decode it to a meaningful sentence and get the flag.

Flag Format: inctfj{...}

We are given a hex-encoded string, we can easily decoded it using an hex-decoder. On decoding, we will get ➡

hex- decoder

On xor -ing output string with key z. we will get another hexadecimal string.

--

--