Very nice and niche CTF challenge
Root @ Localhost
Conducted by our seniors!
Solves
Hexdump
Why is there not a simple CLI tool for converting hex to ascii? :pray:
Xss
Solution
HTML
| |

Flag: root@localhost{Byp4ss_Sanitiz3r_123}
Idoor
Cracking hashes like there’s no tomorrow.
Mini Compiler
“Remote code execution as a service.”. Reminded me of my freshman year’s moodle exploitation :lol:.
Ez Web
The statement
duh.
Solution
Inspect the html and find js file.

Find this encoded string in js file.
JS
| |
Decode it
$_ base64 -d «< cm9vdEBsb2NhbGhvc3R7VGhlX3dlYl9jaGFsbF9pc19lYXN5fQ==
root@localhost{The_web_chall_is_easy}
Flag: root@localhost{The_web_chall_is_easy}
Pixel Secrets
The statement
Decode the hidden message embedded in this image. Use steganographic techniques to uncover the flag that lies beneath the pixels!
Solution
Should be pretty self explanatory. Classic steganography bruteforce.
$_ docker run –rm -it -v ‘$(pwd):/steg’ rickdejager/stegseek steg1.jpg password.txt
Unable to find image ‘rickdejager/stegseek:latest’ locally
latest: Pulling from rickdejager/stegseek
a70d879fa598: Pull complete
c4394a92d1f8: Pull complete
10e6159c56c0: Pull complete
2a9284816e0c: Pull complete
da918f5114c3: Pull complete
172662ab993b: Pull complete
Digest: sha256:a3c6a82d5b7dd94dc49098c5080a70da8103b7ed3b3718423b3a70d4b43c9a8a
Status: Downloaded newer image for rickdejager/stegseek:latest
StegSeek 0.6 - https://github.com/RickdeJager/StegSeek
Hidden Truth
The statement
A hidden message lies concealed within a jumble of characters and numbers. Can you crack the code and reveal the secret? The mystery is waiting for you to uncover it.
Solution
Strings on the file gives a base64 string.
$_ strings -n 65 challenge.png
<x:xmpmeta xmlns:x=‘adobe:ns:meta/’ x:xmptk=‘Image::ExifTool 12.76’>
<rdf:RDF xmlns:rdf=‘http://www.w3.org/1999/02/22-rdf-syntax-ns#'>
Attrib:ExtId03825ccf-d796-4baa-8dda-96a2acd20326</Attrib:ExtId>
<rdf:li xml:lang=‘x-default’>cm9vdEBsb2NhbGhvc3R7QzBuZ3JAdCRfWTB1X0YwdW5kX1RoM19NeXN0M3J5X04wd30=</rdf:li>
cm9vdEBsb2NhbGhvc3R7QzBuZ3JAdCRfWTB1X0YwdW5kX1RoM19NeXN0M3J5X04wd30=
Decode it to get flag
Echo of Time
The statement
You found an audio file named ab Somewhere within this audio lies a crucial piece of information: a year that marks a significant event. Extract the year hidden in the audio using steganography techniques.
Solution
Open the given file in audacity, and view it as spectogram.

Flag: r00t@localhost{2025}
Play With Qr
You don’t need A GUI FOR SORTING FILES BY SIZE.