Skip to main content

Spring 2025 Kickoff CTF

Challenges

Difficulty: Easy - Medium

Open Source Intelligence

We need to find more information about this image, can you answer the following questions?

Download Photo

What video game company's HQ is this building? (2 words)

What city is this picture taken in? (1 word)

What is the name of the Italian restaurant connected to that same building? (1 word)

Cryptography

We've intercepted 2 messages from hacker communications but they are encrypted, decode the messages.

Cipher 1: 01000100 01100101 01110000 01101100 01101111 01111001 01101001 01101110 01100111 00100000 01010011 01101011 01111001 01101110 01100101 01110100

Cipher 2: ᒬᒧᒪ⨃ᒧᒣ☐ ⟔☐ᒪ☐ᒥᐱ☐⊐

Web App Exploitation

We've identified a website hiding suspicious information.

Access the challenge website here.

Flag 1:

Flag 2:

Log Analysis

We have received a set of system logs containing various user activities. Your task is to identify the suspicious login attempt and retrieve the username associated with that entry.

Download Log

Username:

Forensics

We have received pictures of suspects involved in a cyberincident. We have come to the knowledge that the criminal submitted a picture of a fake person. Figure out which suspect is the criminal.

NOTE: PLEASE DO NOT CONTACT THESE PEOPLE, THEY ARE REAL PEOPLE!

Download Images

Fake image's filename:

Solution

Solution Guide

OSINT

  1. Reverse Image Search or search the keywords visible in the picture
  2. Search up the company's headquarters
  3. Google Maps

Cryptography

  1. Binary to Ascii
  2. Pigpen cipher

Web App Exploitation

  1. Image alt text on the website
  2. Logged in Console Tab

Forensics

  1. Reverse Image search all the people in the folder until you find one that doesn't give you any results. That one is fake & AI generated.

Credits

  • Author(s): Divesh Gupta (legendile7)