SpyEye - CTF'25
SpyEye - CTF'25
TEAM SpyEye
Flag:h4cktf1{N33DH41RY4NN1CH4MP3BH4Y4M4VUTH41TLUD3V4R4}
3.Smuggling
First keep the given string in Enigma Machine, we got a baseX64 string,
we did the baseX64 on the string again and again unit we can't anymore, at last we got the
string
"NovemberThreeThreeDeltaHotelFourOneRomeoYankeeFourNovemberNovemberOneCharlie
HotelFourMikePapaThreeBravoHotelFourYankeeFourMikeFourVictorUniformTangoHotelFour
OneTangoLimaUniformDeltaThreeVictorFourRomeoFour"
and using NATO Alphabet Decoder, we decode above string and got the flag
Flag:h4cktf1{N33DH41RY4NN1CH4MP3BH4Y4M4VUTH41TLUD3V4R4}
4.INVENTOR OF HTML
Just did chatgpt to find the name,got it ,and placed it in flag format
Flag:h4cktf1{solid}
flag:h4cktf1{1k4_m0dh4l3d4dh4m4}
9.Music
Used Cipher-identifier and found the string is in periodic table cipher,`
using periodic table decoder, we got the flag string, which we placed inside given flag format.
flag:h4cktf1{DAMMUNTEPATTUKORASHIKAWATU}
10.STAMP
Gave the Base.txt file to ChatGPT, it gave us the flag
flag:h4cktf1{2022-11-10_17-10}
11.Mod37
Used a simple python script to decode and find the flag
flag:h4cktf1{4TLUNT4DH1_MANTH0N1}
20.VNR PLACEMENTS
Used wayback machine to see the past snapshots of the vnrvjiet.ac.in website in 2010, and
there in the highlights found the "410" number of placements, gave it and try and it's the flag
flag:h4cktf1{410}
27.0R1G1N
The given number plate in the image belongs to Guido van Rossum,
In his personal webpage - Guido's Personal Home Page, we find a link to his blogs page -
Artima Weblogs. In this page going to the Origin of BDFL Blog we can get the year and
nickname needed to complete the flag
flag : h4cktf1{1995_Pythonesque}
28.NEMO
We found that the designer is ‘Renzo Piano’ and since we are asked his latest unveiled center,
we searched for his latest completed project
The coordinates of the Stravos Niarchos Foundation Center were found using GoogleMaps
flag: h4cktf1{37.940,23.692}
29.Mr. Majnu
The given audio file has a dialogue from the movie ‘mirchi’
we used this as the password for the for the file protected.zip
which gives us the base64 encoded string and later decrypting it gives us the flag,
h4cktf1{r3b3l_ant3_st4r_3_r4_st4r_ant3_r44j3_r4_r3b3lst4r}
30.Sanivaaram
as we can see that the zip file is password protected
so to crack the password we thought to use john the reaper command in kali linux(
john | Kali Linux Tools )
but after reading the question carefully they specified the word with double quotations
“saripodhaa”.
yes it was the last time and we got the flag : h4cktf1{1r0nh1ll}
31.RANGASTHALAM
Given location ibaraki-Japan, so searched for top ibaraki universities
flag: h4cktf1{tsukuba}