0% found this document useful (0 votes)
5 views

SpyEye - CTF'25

The document details various challenges and their corresponding flags from a Capture The Flag event named Convergence2k25, organized by TEAM SpyEye. Each challenge involves different decoding techniques, including braille, base64, RSA decryption, and ciphers, to derive the final flags. The flags follow a consistent format, starting with 'h4cktf1{' and ending with '}'.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

SpyEye - CTF'25

The document details various challenges and their corresponding flags from a Capture The Flag event named Convergence2k25, organized by TEAM SpyEye. Each challenge involves different decoding techniques, including braille, base64, RSA decryption, and ciphers, to derive the final flags. The flags follow a consistent format, starting with 'h4cktf1{' and ending with '}'.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Capture The Flag - Convergence2k25

TEAM SpyEye

1.WELC0M3 M3SS4G3 Fl4G

2.UNITED TFI SYNDICATE


Given code is in braille ,we decoded, and it gave us Ram_Nandan_IAS,and we found a twitter
account with that name, in that we got a string, we decoded using baseX64, we got the flag

string found: e2lfYW1fdW5kZWNyeXB0YWJsZX0=

Flag:h4cktf1{N33DH41RY4NN1CH4MP3BH4Y4M4VUTH41TLUD3V4R4}
3.Smuggling
First keep the given string in Enigma Machine, we got a baseX64 string,

we did the baseX64 on the string again and again unit we can't anymore, at last we got the
string
"NovemberThreeThreeDeltaHotelFourOneRomeoYankeeFourNovemberNovemberOneCharlie
HotelFourMikePapaThreeBravoHotelFourYankeeFourMikeFourVictorUniformTangoHotelFour
OneTangoLimaUniformDeltaThreeVictorFourRomeoFour"

and using NATO Alphabet Decoder, we decode above string and got the flag

Flag:h4cktf1{N33DH41RY4NN1CH4MP3BH4Y4M4VUTH41TLUD3V4R4}

4.INVENTOR OF HTML
Just did chatgpt to find the name,got it ,and placed it in flag format

Flag:h4cktf1{solid}

6.The Rebel's Hidden Path


Adding ‘/wow/’ to the given web URL, we get the encrypted string.
Decoding the string using Base64 we get the flag:
h4cktf1{st3ph3n_r0b3r7_4n73_3v4ru_052011}
7.Goodachari
Using the giving the public and private keys and RSA Decryption we obtain the flag

flag:h4cktf1{1k4_m0dh4l3d4dh4m4}
9.Music
Used Cipher-identifier and found the string is in periodic table cipher,`

using periodic table decoder, we got the flag string, which we placed inside given flag format.

flag:h4cktf1{DAMMUNTEPATTUKORASHIKAWATU}

10.STAMP
Gave the Base.txt file to ChatGPT, it gave us the flag
flag:h4cktf1{2022-11-10_17-10}

11.Mod37
Used a simple python script to decode and find the flag

executed and got the string

flag:h4cktf1{4TLUNT4DH1_MANTH0N1}

20.VNR PLACEMENTS
Used wayback machine to see the past snapshots of the vnrvjiet.ac.in website in 2010, and
there in the highlights found the "410" number of placements, gave it and try and it's the flag
flag:h4cktf1{410}

22.Rajamouli's Enigmatic Discovery


In this following webpage: Protein BLAST: search protein databases using a protein query we entered the
Query Sequence given in the question. After searching through its database, it gave the result as Musca
Domestica with most similarity to the given sequence. Although the flag: h4cktf1{Musca_Domestica} was
our first submission due to some technical error we had to get it rectified by the coordinators and finally
got the flag accepted.

OR YOU COULD SIMPLY SEARCH FOR A HOUSEFLY’s SCIENTIFIC NAME TwT


25.R4j4_th3_gr8
From the given image for Braille characters and after meticulously mapping each and every
symbol we end up with the flag: h4cktf1{1_4m_Bl1nd_8ut_1_4m_Tr41n3d}

27.0R1G1N
The given number plate in the image belongs to Guido van Rossum,
In his personal webpage - Guido's Personal Home Page, we find a link to his blogs page -
Artima Weblogs. In this page going to the Origin of BDFL Blog we can get the year and
nickname needed to complete the flag

flag : h4cktf1{1995_Pythonesque}

28.NEMO
We found that the designer is ‘Renzo Piano’ and since we are asked his latest unveiled center,
we searched for his latest completed project
The coordinates of the Stravos Niarchos Foundation Center were found using GoogleMaps
flag: h4cktf1{37.940,23.692}

29.Mr. Majnu
The given audio file has a dialogue from the movie ‘mirchi’
we used this as the password for the for the file protected.zip
which gives us the base64 encoded string and later decrypting it gives us the flag,
h4cktf1{r3b3l_ant3_st4r_3_r4_st4r_ant3_r44j3_r4_r3b3lst4r}
30.Sanivaaram
as we can see that the zip file is password protected

so to crack the password we thought to use john the reaper command in kali linux(
john | Kali Linux Tools )

but after reading the question carefully they specified the word with double quotations
“saripodhaa”.

so we tried it for the password and the file got unzipped

leaving us with the ClubName.txt file

when i opened the file


this seemed like another cipher so we used the website - Cipher Identifier

this was what we found - the ‘Duckspeak’

so we started decrypting the txt

found another encrypted message

we did the same with this lang ad found this

‘Pikalang’ it is so we tried decrypting again


repeating the same

this must be the last time with ‘Deadfish Language’

yes it was the last time and we got the flag : h4cktf1{1r0nh1ll}

31.RANGASTHALAM
Given location ibaraki-Japan, so searched for top ibaraki universities
flag: h4cktf1{tsukuba}

You might also like