Cyber Battle 2025

github.com/cyberc0dex/CBCTF25

Cryptography

Journey home in Tokyo

3rd Time's the Charm
The first one is simple. Then its shifted further. But after that its uniform.

69 68 69 87 73 124 98 115 121 96 103 102 117 121 97 120 107 107 96 116 108 96 110 113 118 106 117 117 105 126
Time is Gold
We intercepted messages from the adversary, it was sent from their base in Portland Oregon. Help us decipher what they said. Time is of the essence.

Network

Command & Control
Our SOC detected suspicious activity from a suspected APT group. Analyze the network capture and uncover the C2 Server Address.

Encoded Message
“After an escalation at the digital border between two hostile states, cyber intel intercepted a suspicious stream of UDP packets between public IPs believe to be tied to a military-grade malware operator. The packets are small, seemingly harmless, and strangely timed... You’re tasked with analyzing this communication and recovering any hidden message that might signal an upcoming strike.”
MITRE ATT&CK
“During a routine threat hunt across a high-security defense network, your blue team detected anomalous traffic patterns captured via wireshark. Initial analysis flagged the use of Data Encoding Techniques (MITRE ATT&CK T1132) – a known obfuscation method often used to conceal malicious command-and-control communications.

The traffic appears to be sliver to a C2 payload, suggesting an advanced threat actor is attempting to establish a foothold within the environment.”

Forensics

A Peculiar TV Show
Dr. Sheldon Cooper, renowned theoretical physicist and part-time vexillologist, has generously shared his latest educational masterpiece: “Fun with Flags: A guide”. Within its pages, you’ll find a deep dive into the world of flags, complete with trivia, design principles, and classic Cooper wit.

The document appears to be exactly what it claims: a guide to vexillology. But is that all it is? The good doctor is known for his love of precision... and puzzles.
Photogrammetry
Get your measurements right.

nc exploit.cyberbattle.info 7331
OPERATION LC
“During a high-stakes cyberwarfare operation, our Special Cyber Operations Unit successfully raided an enemy intelligence base in Eastern Europe. Among the seized evidence was a USB drive labeled LAUNCH_CODE – a critical piece of intelligence that could prevent a devastating cyber attack.

The enemy operative was in the final stages of preparing a coordinated cyber attack on critical infrastructure. The LAUNCH_CODE USB contains the activation codes needed to prevent the attack. Time is critical – these codes are time-sensitive.

Your mission is to examine the seized USB drive and recover the launch codes.”

Miscellaneous

Share
/J93Btjtj

Operation Gatecrash
Source: Compromised adversary communication channel

Classification: Sensitive – Analyst Eyes Only

Summary: During routine monitoring, our team intercepted an image inadvertently leaked by the target. The adversary appears unaware of the operational risk introduced by this disclosure. While the photo may appear harmless, preliminary analysis suggest it contains valuable intelligence regarding their movements.

Assessment: Analysts believe the environment captured in the image provides sufficient context to determine the adversary’s point of departure, their likely destination, and the specific flight they boarded. This data, once correlated, will allow us to reconstruct their exfiltration path.

Analyst Tasking:
* Identify the departure airport (IATA CODE).
* Determine the destination airport (IATA CODE).
* Confirm the flight number

FLAG FORMAT: CBCTF{DEPARTURE-DESTINATION-FLIGHTNUMBER}

Web

Warming Up the Parameters
Solution by others:
Credits to Team 3MVIPI
Secure Archive
Solution by others:
Credits to Team 3MVIPI

Exploit

Operation Echo
In the heart of the cyber-conflict, "Mr. Robot's Printing Press" is churning out battlefield intelligence for commanders worldwide. But the press's output console — the Warzone Terminal — has a flaw. Anything you say is echoed back into the network without proper security checks.

nc exploit.cyberbattle.info 9797
The Last Spark
The city runs dark. A total blackout. Yet in the heart of the abandoned grid, one terminal still hums – barebones, minimal, lifeless... but not dead. The interface offers no clues – just a blinking cursor awaiting the right input. Weeks ago, engineers dumped a script. You might want to start there. Run it. Understand it. Something in there might help generate what the system expects. Input it correctly... and maybe, just maybe, you’ll see the last bulb flicker back to life.

https://lightbulb.cyberbattle.info/
The Bridge of Khazad-Dum
nc exploit.cyberbattle.info 9999