The flag for this challenge is packaged in a WORD document. You need to extract files and decrypt these files
Simple Crypto
Find the flag from the file.
Unfortunately I dont have the flag. But here's the solution anyway.
Small RSA
Find the flag from the file. Decrypt the text.
Unfortunately I dont have the flag. But here's the solution anyway.
▸ Network
PPAP
Find the flag from the file.
Data Breach
Analyze the pcap file and find the flag.
icmp
Analyze the pcap file and find the flag.
Can you spot the CVE#?
Unfortunately the challange is not available. But here's the solution anyway.
To the “future” direction - 1
Unfortunately the challange is not available. But here's the solution anyway.
To the “future” direction - 2
Unfortunately the challange is not available. But here's the solution anyway.
▸ Reverse Engineering
Rock Paper Scissors
You are provided with an executable file named “RockPaperScissors.exe”. Once executed, it starts
rock, paper, scissors game and asks your choice to compete against the computer. The flag for this
challenge is displayed if you beat the computer. However, one win is not enough! You are required to
win it more than 300 times to get the flag, which is so time consuming!! Can you think of a way to
shorten this process?
Bad Tool
You are provided with an executable file named “BadTool.exe”. This file is used by notorious hacking
group for their malicious activities. This file is believed to contain crucial evidence that could lead to
the group’s downfall.
However, the file is protected by a password, and without it, the investigations cannot go further.
Find out the password hidden within this file. The flag for this challenge is displayed if you enter the
correct password.
Reverse Me
Reverse the file and get flag.
Note: password for ReverseMe.zip "novirus"
Combat bogus EC sites - 1
Unfortunately the challange is not available. But here's the solution anyway.
Combat bogus EC sites - 2
Unfortunately the challange is not available. But here's the solution anyway.
▸ Steganography
Marker
You are provided with a PDF file, but something's hidden beneath the surface! Can you find the hidden flag?
Steg 1
You are provided with an image named “steg1.png”. The flag for this challenge is embedded in this
image in the form of “flag.txt”. However, a passphrase is required to extract “flag.txt”!
Steg 2
You are provided with an image named “steg2.png”. The flag for this challenge is written in this image.
However, the image dimensions were altered by mistake! Your mission is to capture the flag by diving
into the binary depths and restoring “steg2.png”!
Steg 3
Unfortunately the challange is not available. But here's the solution anyway.
LINE to PLAIN
You are provided with an image named “steg2.png”. The flag for this challenge is written in this image.
However, the image dimensions were altered by mistake! Your mission is to capture the flag by diving
into the binary depths and restoring “steg2.png”!
Unfortunately I dont have the flag. But here's the solution anyway.
▸ OSINT
Multiply Compressed file
The first password is the name of the place where the person on Japanese latest 10,000-yen bill was
born and raised. The format is “Name-City / Town / Village”
Unfortunately I dont have the flag. But here's the solution anyway.
Ramen
1. Go to https://jsac.jpcert.or.jp/en/index.html to find the list of speakers for 2023.
2. Look for speakers whose profile pictures are made of famous Japanese foods.
3. Find a restaurant on “tabelog.com” that offers the same menu item as in the photo.
4. Answer the restaurant code on “tabelog.com”.
Note: “tabelog” URL structure looks like this:
https://tabelog.com/en/{area_name}/{area_code}/{city_code}/{restaurant_code}
If the URL your found is https://tabelog.com/en/tokyo/A1304/A130401/12345678/, then the FLAG is
CSG_FLAG{12345678}.
Telegram Cofounder
On August 24, 2024, something unexpected happened! Pavel Durov, the cofounder of the messaging
app Telegram, was arrested right after his plane landed in France. Now, your mission is to dig into the
flight details to discover the flag!
Here’s what you need to find:
1. Aircraft Registration – Include the complete registration code with numbers, letters, and the
“-” symbol as needed.
2. Country Name – Figure out which country this aircraft was flying over exactly 2 hours before
it landed at the airport in Paris.
Flag Format : CSG_FLAG{XXX(Aircraft Registration including “-“):XXX(Country Name) } e.g. CSG_FLAG{9V-SGF:Japan}
SNS investigation
Welcome to SNS investigation, an OSINT challenge that will test your detective skills on social media.
One X account, @Mark54666780228, has recently come under suspicion for its involvement in
cryptocurrency fraud on SNS (https://x.com/Mark54666780228).
Your task is to dive deep into this account’s activities to discover subtle hints leading to
the personal information that could link to the actual account holder.
Find the following information to form the flag:
1) Identify the mail address associated with this account.
2) Determine the Skype username associated with the mal address.
3) Find out the domain of the website which this person promotes online.
Flag Format : CSG_FLAG{mail_address:Skype_username:domain}
Note that the letters in curly brackets are all in small case;
e.g. CSG_FLAG{foo@example.com:john123: xxx-yyy.com}
▸ Miscellaneous
Hash
Recover flag.txt
Author
Find the author of this anagram.
neco nopu a meti teher ewer fuor ltitle btribas nda rehti smena ewer fylspo ypmso otcotn-ital nda teper yhet lediv thiw rehti tohrem ni a nsad bnak rednehtaun eht root fo a vrey igb fir rete
Chatbot Deception
Unfortunately the challange is not available. But here's the solution anyway.
▸ Web Exploitation
Web Hacking Challenge 1
Unfortunately the challange is not available. But here's the solution anyway.
Find origin server
Unfortunately the challange is not available. But here's the solution anyway.
Yara
Unfortunately the challange is not available. But here's the solution anyway.
Web Hacking Challenge 4
Unfortunately the challange is not available. But here's the solution anyway.
Get the ticket!
Unfortunately the challange is not available. But here's the solution anyway.
Exfiltrate database of the behind
Unfortunately the challange is not available. But here's the solution anyway.
Exploit the old windows vulnerability
Unfortunately the challange is not available. But here's the solution anyway.
Time Traveler
Unfortunately the challange is not available. But here's the solution anyway.
▸ Forensic
Recovery
Unfortunately the challange is not available. But here's the solution anyway.
Can you give us the secret
Unfortunately the challange is not available. But here's the solution anyway.