diff --git a/CYBER.ORG CTF 2021/Animal Farm/1.jpg b/CYBER.ORG CTF 2021/Animal Farm/1.jpg new file mode 100644 index 00000000..8fab633e Binary files /dev/null and b/CYBER.ORG CTF 2021/Animal Farm/1.jpg differ diff --git a/CYBER.ORG CTF 2021/Animal Farm/2.jpg b/CYBER.ORG CTF 2021/Animal Farm/2.jpg new file mode 100644 index 00000000..ed2e9b97 Binary files /dev/null and b/CYBER.ORG CTF 2021/Animal Farm/2.jpg differ diff --git a/CYBER.ORG CTF 2021/Animal Farm/3.jpg b/CYBER.ORG CTF 2021/Animal Farm/3.jpg new file mode 100644 index 00000000..fbdc3546 Binary files /dev/null and b/CYBER.ORG CTF 2021/Animal Farm/3.jpg differ diff --git a/CYBER.ORG CTF 2021/Animal Farm/4.jpg b/CYBER.ORG CTF 2021/Animal Farm/4.jpg new file mode 100644 index 00000000..66382ce5 Binary files /dev/null and b/CYBER.ORG CTF 2021/Animal Farm/4.jpg differ diff --git a/CYBER.ORG CTF 2021/Animal Farm/README.md b/CYBER.ORG CTF 2021/Animal Farm/README.md new file mode 100644 index 00000000..9a31aa8e --- /dev/null +++ b/CYBER.ORG CTF 2021/Animal Farm/README.md @@ -0,0 +1,28 @@ +The prompt of the challenge is as follows: +``` +Animal Farm +30 + +George was looking at pictures online and remembers finding a picture of Dee Dee (from Dexter’s Lab) posing with two kids, a unique picture of the Sydney skyline, and a picture with four of a certain kind of animal. However, he can’t remember which animal it was. Please name the animal type that was in the picture of four. +``` +And there was a file attached: animal.cap + +Upon some googling about .cap files, We come to know that they are capture files produced by a file capture program + +``` +A file with the CAP file extension is most likely a Packet Capture file created by packet sniffing programs. This kind of file holds raw data collected by the sniffing program so that it can be analyzed at a later time or with a different program. + +Source: lifewire +``` + +The file can be opened in wireshark or any other reader. If we google an online .cap file opener, we find this website: +![File](https://pratyakshahacker.files.wordpress.com/2021/06/image-6.png?w=1024) + +Upon uploading the .cap file and switching to the Pictures tab we can see the following images: + +![File](1.jpg) +![File](2.jpg) +![File](3.jpg) +![File](4.jpg) + +Looking back at the question prompt, The flag is dolphin diff --git a/CYBER.ORG CTF 2021/Animal Farm/animal.cap b/CYBER.ORG CTF 2021/Animal Farm/animal.cap new file mode 100644 index 00000000..ec818c66 Binary files /dev/null and b/CYBER.ORG CTF 2021/Animal Farm/animal.cap differ diff --git a/CYBER.ORG CTF 2021/Familiar Noises/README.md b/CYBER.ORG CTF 2021/Familiar Noises/README.md new file mode 100644 index 00000000..8b137891 --- /dev/null +++ b/CYBER.ORG CTF 2021/Familiar Noises/README.md @@ -0,0 +1 @@ + diff --git a/CYBER.ORG CTF 2021/Familiar Noises/simpler_times.wav b/CYBER.ORG CTF 2021/Familiar Noises/simpler_times.wav new file mode 100644 index 00000000..ef89dae7 Binary files /dev/null and b/CYBER.ORG CTF 2021/Familiar Noises/simpler_times.wav differ diff --git a/CYBER.ORG CTF 2021/Kali Wallpaper/Kali.png b/CYBER.ORG CTF 2021/Kali Wallpaper/Kali.png new file mode 100644 index 00000000..dfd39f5e Binary files /dev/null and b/CYBER.ORG CTF 2021/Kali Wallpaper/Kali.png differ diff --git a/CYBER.ORG CTF 2021/Kali Wallpaper/README.md b/CYBER.ORG CTF 2021/Kali Wallpaper/README.md new file mode 100644 index 00000000..8b137891 --- /dev/null +++ b/CYBER.ORG CTF 2021/Kali Wallpaper/README.md @@ -0,0 +1 @@ + diff --git a/HSCTF-2020/Blurry Eyes.md b/HSCTF-2020/Blurry Eyes.md new file mode 100644 index 00000000..ae17620f --- /dev/null +++ b/HSCTF-2020/Blurry Eyes.md @@ -0,0 +1,27 @@ +##### Author: Pratyaksha Beri (Shad0wMazt3r) +Skills: + **HTML** + +Lets begin with the first challenge in the web category. +For many of you this might be their first ctf so let me show you the interface. +First Up is the challenge name. Then there are the points for the challenge. Then it shows the tags for the challenges. It is followed by a short description and a website or the attachments. Below that is the author's name. +![Challenge Interface](https://i.ibb.co/XW70735/Screenshot-2020-06-08-HSCTF-7.png) + +Now How do we start? Lets go to the website… +![Website](https://i.ibb.co/KXQNmXD/Screenshot-66.png) + +Hmmm...There is a short description of what a ctf is…. Probably We knew that before. There is a link on CTFTime. Lets click it! + +![CTFtime](https://i.ibb.co/hYG7bmk/Screenshot-81.png) + +Here we have a flag.... Lets submit it! On submitting it we know that it is a fake flag! +Let's go back to the website. We have a blurred flag here! And no I did not blur it. +![Website](https://i.ibb.co/KXQNmXD/Screenshot-66.png) + +Lets see the source code. How do we do that? For HTML websites, press Ctrl and U to get the source code. + +![Source Code](https://i.ibb.co/rZqm6Pb/Screenshot-67.png) + +Here Look at this code snippet! We can easily see another span class. But I don't see a flag here! The span class looks weird. Let's wrap flag around it and submit it. +Thus the flag is flag{poefKukjNPojzLDf} +Voila! We got It! You just solved your first challenge in a CTF! Have Fun! diff --git a/README.md b/README.md index ff34734d..1ecf7424 100644 --- a/README.md +++ b/README.md @@ -40,6 +40,9 @@ Some permanent CTF challenges I'd recommend are: - [OverTheWire](http://overthewire.org/wargames/) - [SmashTheStack](http://smashthestack.org/) - [WeChall](http://www.wechall.net/) (aggregates scores from various permanent CTF challenge sites) +- [TryHackMe](https://tryhackme.com) +- [HackTheBox](https://hackthebox.eu) +- [PicoCTF](https://picoctf.org/) - Comprehensive [list](http://www.wechall.net/active_sites/all/by/site_id/ASC/page-1) of CTF sites from WeChall website and another list of permanent CTFs is here: [http://captf.com/practice-ctf/](http://captf.com/practice-ctf/)