InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

TryHackMe CTF Collection Vol. 1

Abdul Issa
InfoSec Write-ups
Published in
21 min readJan 21, 2024
TryHack CTF Collection Vol 1

The main objective of this room is to test your CTF skills. Stay calm and Capture The Flag :)

DesKel

First things first…

Task 2: What does the base said?

Challenge

Solution

$ echo "VEhNe2p1NTdfZDNjMGQzXzdoM19iNDUzfQ==" | base64 -d
THM{ju57_d3c0d3_7h3_b453}

Task 3: Meta meta

Challenge

Solution

$ sudo apt update
$ sudo apt install exiftool
ExifTool extracting hidden data in image metadata

Task 4: Mon, are we going to be okay?

Challenge

Solution

$ sudo apt update
$ sudo apt install steghide
$ steghide info Extinction.jpg
"Extinction.jpg":
format: jpeg
capacity: 1.3 KB
Try to get information about embedded data ? (y/n) y
Enter passphrase:
embedded file "Final_message.txt":
size: 79.0 Byte
encrypted: rijndael-128, cbc
compressed: yes
$ steghide extract -sf Extinction.jpg
Enter passphrase:
wrote extracted data to "Final_message.txt".

$
cat Final_message.txt
It going to be over soon. Sleep my child.

THM{500n3r_0r_l473r_17_15_0ur_7urn}

Task 5: Erm……Magick

Challenge

Solution

Highlight to uncover the hidden text
Use the browser’s “Inspect” or Developer Tools to uncover the hidden text

Task 6: Qrrrr

Challenge

Solution

Getting the flag using a QR reader camera app

Task 7: Reverse it or read it?

Challenge

Solution

$ file hello.hello
hello.hello: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=02900338a56c3c8296f8ef7a8cf5df8699b18696, for GNU/Linux 3.2.0, not stripped
$ strings hello.hello  | grep -i thm{
THM{345y_f1nd_345y_60}

Task 8: Another decoding stuff

Challenge

Solution

$ echo "3agrSy1CewF9v8ukcSkPSYm3oKUoByUpKG4L" | base32 -d
base32: invalid input

$
echo "3agrSy1CewF9v8ukcSkPSYm3oKUoByUpKG4L" | base64 -d
ݨ+K-B{}�ˤq)I����(%)(n
$ echo "3agrSy1CewF9v8ukcSkPSYm3oKUoByUpKG4L" | base58 -d
THM{17_h45_l3553r_l3773r5}

If you are planning on doing more CTFs in the future, the more you automate and cut the number of manual attempts down the quicker and more efficient you will be.

#!/bin/bash

# Read input string from command prompt
read -p "Enter the encoded string: " encoded_string

# Display the original string
echo
echo "Original String: $encoded_string"
echo
# Decode using base32
decoded_base32=$(echo "$encoded_string" | base32 -d)
if [[ -n "$decoded_base32" ]]; then
echo "Decoded (Base32): $decoded_base32"
fi

echo

# Decode using base58
decoded_base58=$(echo "$encoded_string" | base58 -d)
if [[ -n "$decoded_base58" ]]; then
echo "Decoded (Base58): $decoded_base58"
fi

echo

# Decode using base64
decoded_base64=$(echo "$encoded_string" | base64 -d)
if [[ -n "$decoded_base64" ]]; then
echo "Decoded (Base64): $decoded_base64"
fi

echo
Base decoding bash script used to automate the “guessing”

Task 9: Left or right?

Challenge

Solution

If you want to be an efficient CTF player and a Cyber Maverick, you will need to get used to scripting in languages such as Python.

# This is a ROT1 to ROT25 brute-force rotation script.
# You enter the cipher text and the script will output all potential outputs in every ROT scheme

def rot_decode(cipher_text):
# Loop over all possible ROT values (1 to 25)
for rot in range(1, 26):
decoded_text = ""
# Loop over each character in the cipher text
for c in cipher_text:
# Check if the character is a letter
if c.isalpha():
# Determine the ASCII offset based on whether the letter is uppercase or lowercase
if c.isupper():
ascii_offset = 65
else:
ascii_offset = 97
# Convert the character to its ASCII code
c_code = ord(c)
# Determine the new ASCII code by applying the ROT value
new_c_code = (c_code - ascii_offset + rot) % 26 + ascii_offset
# Convert the new ASCII code back to a character
new_c = chr(new_c_code)
decoded_text += new_c
else:
# If the character is not a letter, add it to the decoded text as is
decoded_text += c
# Print the decoded text for the current ROT value
print(f"ROT{rot:02d} : {decoded_text}")


# Prompt the user for input
cipher_text = input("Enter the cipher text: ")
rot_decode(cipher_text)
Brute-forcing ROT using a python script

Task 10: Make a comment

Challenge

Solution

Task 11: Can you fix it?

Challenge

Solution

$ file spoil.png
spoil.png: data
Using bmore or binary more to view the image
Using bless to edit the hex values in sploil.png
$ file spoil.png
spoil.png: PNG image data, 800 x 800, 8-bit/color RGBA, non-interlaced
The flag now revealed in the repaired PNG image

Task 12: Read it

Challenge

Solution

Reddit discussion of the task
$ ./scripts/base-decoder.sh
Enter the encoded string: SlVTVCBPTkUgTU9SRSBTVEVQICEhISEhISEhIApzaXRlOiJyZWRkaXQuY29tIiBpbnRleHQ6IlRITSIgaW50aXRsZToidHJ5aGFja21l

Original String: SlVTVCBPTkUgTU9SRSBTVEVQICEhISEhISEhIApzaXRlOiJyZWRkaXQuY29tIiBpbnRleHQ6IlRITSIgaW50aXRsZToidHJ5aGFja21l

base32: invalid input

subsection not found

Decoded (Base64): JUST ONE MORE STEP !!!!!!!!
site:"reddit.com" intext:"THM" intitle:"tryhackme

Task 13: Spin my head

Challenge

Solution

Task 14: An exclusive

Challenge

Solution

$ echo "}r0_3v15ulcx3{MHT" | rev
THM{3xclu51v3_0r}
$ python -c "s1 = bytes.fromhex('44585d6b2368737c65252166234f20626d'); s2 = bytes.fromhex('1010101010101010101010101010101010'); print(''.join(chr(a ^ b) for a, b in zip(s1, s2)))"

THM{3xclu51v3_0r}
# Prompt the user to enter the first string
s1_input = input("Enter the first string: ")

# Prompt the user to enter the second string
s2_input = input("Enter the second string: ")

# Convert the input strings to bytes
s1 = bytes.fromhex(s1_input)
s2 = bytes.fromhex(s2_input)

# Perform the XOR operation on the corresponding bytes
xor_result = bytes(a ^ b for a, b in zip(s1, s2))

# Convert the XOR result to ASCII and print
ascii_result = xor_result.decode('ascii')
print("XOR result (ASCII):", ascii_result)
Running xor-strings.py script

Task 15: Binary walk

Challenge

Solution

Binwalk of hell.jpg
$ binwalk -e hell.jpg
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 JPEG image data, JFIF standard 1.02
30 0x1E TIFF image data, big-endian, offset of first image directory: 8
265845 0x40E75 Zip archive data, at least v2.0 to extract, uncompressed size: 69, name: hello_there.txt
266099 0x40F73 End of Zip archive, footer length: 22

$ cd _hell.jpg.extracted/

$
ls -la
total 16
drwxr-xr-x 2 cybersecmav cybersecmav 4096 Jun 17 11:41 .
drwxr-xr-x 4 cybersecmav cybersecmav 4096 Jun 19 22:35 ..
-rwxr-xr-x 1 cybersecmav cybersecmav 276 Jun 17 11:41 40E75.zip

$
unzip 40E75.zip
Archive: 40E75.zip
replace hello_there.txt? [y]es, [n]o, [A]ll, [N]one, [r]ename: y
inflating: hello_there.txt

$
ls
40E75.zip hello_there.txt

$
rm hello_there.txt

$
unzip 40E75.zip
Archive: 40E75.zip
inflating: hello_there.txt

$
cat hello_there.txt
Thank you for extracting me, you are the best!

THM{y0u_w4lk_m3_0u7}

Task 16: Darkness

Challenge

Solution

$ exiftool dark.png

$ steghide extract -sf dark.png

$ binwalk dark.png

$ strings dark.png | less
Using stegsolve to analyze the color planes

Task 17: A sounding QR

Challenge

Solution

Task 17: QRCTF.png

Task 18: Dig up the past

Challenge

Solution

Task 18: Wayback Machine

Task 19: Uncrackable!

Challenge

Solution

CyberChef
dCode.fr — Vigenere Cipher

Task 20: Small bases

Challenge

Solution

Decimal to Hex
Hex to ASCII Text

But wait, We are Mavericks aren’t we? We aspire to be as fast, efficient and as leet as possible while we learn and solve challenges.

echo "ibase=10;obase=16;581695969015253365094191591547859387620042736036246486373595515576333693" | bc | xxd -r -p

Task 21: Read the packet

Challenge

Solution

Wireshark HTTP filter
Follow HTTP Stream

Conclusion

What’s next?

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Abdul Issa

Penetration Tester, Linux Evangelist, Security Geek, Blogs about Ethical Hacking, CTF, Cybersecurity Career & Certifications. www.linkedin.com/in/abdul-issa

Responses (2)

Write a response