San Diego CTF 2022 Writeups
This week I particpated in the San Diego CTF 2022 and it was a blast. I wasn’t able to solve many challenges but I did manage to solve some of the challenges. This is the first CTF that I played on a discord server. I had a lot of fun while playing this CTF. Hope you have as much fun while reading writeups as I had when I played this CTF.
Also, I have completed the writeup of this CTF after almost a year since I was busy so there will be some challenges which I won’t be able to explain properly since those challenges URLs have been taken down by the organizers such as the Web based challenges.
OSINT
The Flag Has Been Stolen
For this challenge, we have to find the flag on the SD CTF website by visiting the wayback machine since the flag was in the past but it has not been deleted. I got this clue by viewing the video tutorial mentioned in the challenge description.
The wayback machine doen’t have a long history so it should be fiarly easy to find the flag.
Found the flag as easy as it is:
sdctf{Th3_L0$t_trE@$ur3_0f_th3_INt3rnEt}
Google Ransom
In the ransom letter, we see a cryptic note about someone threatening to sign their email up for an annoying newsletter. As threatening as this is, it doesn’t give us any information about who made this google doc. However, since it’s google there is likely a way to view the email of this account owner.
I went to the Shared With Me section on google drive to get more information about the random letter.
Looking at Details, we can see that the owner of the document is Amy SDCTF.
After sending amy.sdctf@gmail.com
an email demanding the flag, we get a response giving it to us.
sdctf{0p3n_S0uRCE_1S_aMaz1NG}
Mann Hunt
This was a very interesting challenge since we are given only the username of the hacker (mann5549) which we have to track down. Our objective is to find the email address of this hacker and send them an email demanding the flag. So, lets’ start by searching this username and finding on which websites this username is being used using the Sherlock Tool.
We got a total of 8 results from the sherlock. I’ve checked all of the links but only one of them seems useful to me and that is the twitter account.
In the bio of the mann twitter account, I found the link to this hacker website. Let’s visit this site and see if we can find anything juicy stuff that can put this hacker behind bars. The website is a static site so there’s not much interactivity on the webpages.
Let’s check the source code of the website and see if we can find any comments or better, the email address of the mann. To my surprise, I couldn’t find the email address of the mann or any useful comments but I did found the link to the github profile of the mann where he is hosting this website from.
Now, let’s see if we can figure out the email address of mann from the one repository in github account. We can see that a couple of things have been deleted, again, due to our target knowing that they are being tracked down.
There are only 2 commits in the repository and in the latest commit, there are a total of 6 files here that have been changed. I reviewed the changes that the hacker has committed recently but I couldn’t find any information related to the email address. I then started to read each of the changed file completely not just the changes. There is one file which is named by gatsby-config.js. In this config file, there is a site siteMetadata section and this section has a description key which says Blogger and Coder for ACM at UC San Diego
.
I decided to just search the found description on the google search and see if any results related to it comes up and I found a linkedin profile.
In the “About” section of the hacker LinkedIn page, there is a link to download mann resume. I visit the link to look at the resume and notice that the email I need to retrieve has been replaced with asteriks.
Luckily for me, in the right-hand panel under the sharing section I can hover over mann profile and it displays the email address of the hacker we are looking for. Finally! We found the email address.
All that’s left now is to send an email to this hacker demanding that he give our flag back to us.
So, here’s our flag that the hacker stole from us:
sdctf{MaNN_tH@t_w@s_Ann0YinG}
Crypto
Vinegar
In this challenge, we are given a cipher text which we have to decode.
{wbeyrjgewcfroggpesremvxgvefyrcmnnymxhdacgnnrwprhxpuyyaupbmskjrxfopr}
The name of the challenge Vinegar is also an hint which says that this text could be encoded with the vignere cipher. So, I went to the Dcode Vigenere Cipher website to decode this code.
I got a partial key (UNKNO) when we tried to decrypt this cipher with the Automatic Decryption. So, now I used this key as decryption method to see if I can get the full decoded text.
I finally found the key and decrypted text.
So, the challenge flag would be:
sdctf{couldntuseleetstringsinthisonesadlybutwemadeitextralongtocompensate}
Forensics
Flag Trafficker
The given pcap network packet capture file is what we have to analyze in this challenge in order to capture the flag. I downloaded the file and fired up my wireshark to start analyzing the file.
Whenever I start analyzing a pcap capture file, I make sure to check if there are any files or objects which I can export. You can find this options by visiting File > Export Objects
.
I saw an HTML file while analyzing the HTTP objects list. It could mean that this file may contain our flag but we still have to wait and analyze this file.
I opened up the HTML file in the Firefox browser. There was a one button in the HTML file which says that Click to display the flag!
. I clicked on this button and luckily this was not a fake flag but this is the actual flag.
So, this is the flag that was being trafficked:
sdctf{G3T_F*cK3d_W1r3SHaRK}
I really had a lot of file playing this CTF and I thanks the organizers for hosting this CTF on the discord platform since this was a new experience for me. Let’s hope that they will host CTF again next year again untill then see you soon!