Imaginary CTF 2021 Writeups
Hi everyone, welcome to the Xan0er’s Blog. This weekend, I participated in the Imaginary CTF 2021 and learned a lot of things along with a lot of fun so I want to share that learning experience with you guys. Here are some writeups of the challenges which I was able to solve during this CTF:
Roo’s World
In this challenge, I was given a website. After visiting the website, it saw that it was just a normal website. When I inspected the source code the website, I found the below text:
After doing some research, I found that this is cipher type text called JSFuck. I found an online JSFuck Obsicutator and after decoding this I got the following string:
console.log(atob("aWN0ZnsxbnNwM2N0MHJfcjAwX2cwZXNfdGgwbmt9"));
After some googling about this atob function, I founded that this function is used to decode a base-64 encoded string. So I copy pasted this command in the console command of the google chrome browser and I got the flag:
ictf{1nsp3ct0r_r00_g0es_th0nk}
Hidden PSD
In this challenge, a photoshop file was given in format of PSD. When I opened up this file using the PhotoPea Editor, it looked liked this:
When I removed the the layer of the red square box from the front of the flag, I got the full flag:
So the flag for this challenge is:
ictf{wut_how_do_you_see_this}
Chicken Caesar Salad
In this challenge, we are provided with a text file and it contains the following text:
qkbn{ePmv_lQL_kIMamZ_kQxpMZa_oMb_aW_pIZl}
On the basis of the challenge title and some google research, I found that this is a caesar cipher so I went to the https://www.dcode.fr/caesar-cipher and decoded this cipher. So the flag for this challenge is:
ictf{wHen_dID_cAEseR_cIphERs_gEt_sO_hARd}
I was only able to solve these challenges since I didn’t got enough time to solve the other challenges. Next time, I will try harder. Thank you guys for reading my writeups. Stay tuned for more upcoming writeups!