Solutions
Solutions
CRYPTOHUNT 2.0
Solutions
1. Can you convert the number 129 (base 10) to binary (base 2)?
# Python 3
>>> bin(129)
'0b10000001'
TCF{10000001}
2. If we give you a hex (596f75476f74546869734f6e65546f6f), can you find the string from it?
# Python 3
>>> bytes().fromhex('596f75476f74546869734f6e65546f6f').decode('utf-
8')
'YouGotThisOneToo'
TCF{YouGotThisOneToo}
3. Flag is in front you, Now you have to find it with your MIND.
Image
The positions of letters in English alphabetical series is given. Simply replace the numbers with the
letters to get the flag.
TCF{STRINGVILLA}
4. The forest beholds all the secrets. Can you find the one we are looking for?
Forest
Download the image and open it in hex mode. The flag is appended at the end of the file.
TCF{APictureWorthAThousandWords}
5. Lex wants to secure his room access. So he creates a Java Program to protect his room with
password. Given below the Java Program, can you crack the code to his first room?
Source
The attached file is a java source code. Open it and the flag can be found towards the end of the
file.
TCF{DoYouReallyWantToEnterTheRoom?}
TCF{YouGuessedItRightCSS}
7. We give you a file. You can't run it. But the file has the flag. Uhm! How can you find it?
File
Run strings command on the attached file and search for the Flag (Use regex to look for
anything matching the flag format)
TCF{TheFlagIsHereRightHere}
8. Caesar Cipher. Well the file has the Flag, but does it?
File
The flag is encoded with Caesar Cipher with shift +11. You can try bruteforcing the shift and look for
the output that makes sense.
TCF{damnityouaresmart}
9. Lex Knows you cracked the first one. That wasy easy. Not so easy this time.
Source
The attached java file have a method that validates password character by character. You can use
this to build up the password to get the flag.
TCF{PasswordIsImpenetrableButYouHack}
$ file theFile.txt
theFile.txt: JPEG image data, JFIF standard 1.01, aspect ratio, density
1x1, segment length 16, progressive, precision 8, 648x1210, components
3
We can see the file is a JPEG image. Open it up with any image viewer(or rename the extension to
.jpg) to get the flag.
TCF{YOU_MADE_IT_WITH_EXTENSIONS}
TCF{tru3_farm3r5_0r_ju5t_lucky?9df7e69a}
12. Can You Unzip this File ? If yes then find the Flag. If No, Be like Sherlock.
File
Extract the attached file with password cryptohunt
TCF{unz1pp1ng_1s_3a5y}
13. Secure Webpages are hard to crack. Our friend Antonio Provided security. Can you crack it?
Webpage
The flag can be found in the file adfjhbakjdvaihdfv.js that is loaded with the webage
TCF{PasswordInPlainJSNotSoSecure}
14. Lex is pretty sure, someone is hacking into his door. He ordered Highlevel security. Go ahead
Agent, crack it!
Source
The checkPassword method in the attached file can be traced to get the flag.
TCF{jU5t_a_s1mpl3_an4gr4m_4_u_c79a21}
TCF{I_aM_nOt_A_rObOt?AS25LW}
TCF{i_Am_StRoNk!69ty420}
TCF{i_CaN_rEaD_jAvA!28fe7}
TCF{wE_hAvE_a_HaCkEr_AmOnG_uS!pr0}
TCF{nOw_ThIs_Is_GeTtInG_sErIoUs}
TCF{yOu_SiR_hAvE_mY_rEsPeCt!p0gch@mp}