Home Gravithon CTF 2021
Post
Cancel

Gravithon CTF 2021

I secured 7th position in the 24 hour Gravithon CTF 2021 at the Indian Tech Fest.

Challenges-Writeups

Welcome

Warm Welcome

Flag is given there.

1
gravithon{W3lc0me&Welcome_t0_Gr4v1th0n_2021}

You Got it

You can find Hashtag on their Linkedin page.

1
gravithon{#feelthegravity}

How About Some Exploring the Things

You can find flag on general chat in that discord server.

1
gravithon{Xpl0re_Th3Uns33n@_Cyb3rXpl0re}

ReadMe.md

You can find flag on challenge description.

1
gravithon{LifeSaverGravithon}

Easy

Letters

Challenge:

1
xirmzkyfe{jyzwk_zj_fwtflitv_vrjp}

It’s ROT9 cipher, We already know the flag format, when rotating the letters each letters rotates 9 times to get our flag format. that is g will assigned as x, Decode it and get the flag.

1
gravithon{shift_is_ofcource_easy}

Robbery

Challenge:

1
miaqqmoca{P4n3_j0I_pw3j_Srpb3Y0yq3??}

It’s Vigenère cipher, but key is missing, i guessed gravithon as key, it give right flag format, So need to find rest of the key. With the help of ReadMe.md challenge, you will get the key that is gravithonislove.

1
gravithon{H4v3_y0U_us3d_Brut3F0rc3??}

TIK TOK

Challenge:

1
-- ----- .-. ... ...-- .. ... ....- .-.. .-- .- -.-- ... -... ...-- . ... -

It’s a Morse Code. Decode to get your flag.

1
gravithon{M0RS3IS4LWAYSB3EST}

Binary always Awsome

Challenge:

1
000000000000000000000000000000110010000010000000000010000000000000000000000010000000000000000000000000000000011011011011001111010010010000000000000000000000000000000000000000000100010000000000000100011011000000000000000000000000000000000000000000000000000000000000000100010010000000000000000000000000000000000100011011100010000000000000000000000000000000000100001001001001001001001001001001001001001001001100010001100011011001001001100010010001001001001001001001001001001001100000000000000000000000000000000000100011011000000000000100010010001001001001001100100011011001001001100010010000100001001001001001001001100001001001001001001001001100011000000000100010000000000000000000000000000000000000000000000000000000000000000000100011000000000000000000000000000000000000000000000000100000000000000000000000000100010001001100

It’s a Binary Fuck Language. Decode to get your flag.

1
gravithon{Th3s3_Pr0gr4mm1ng_Sucks}

Everything is Not Visible

Here the given link was https://bit.ly/3mr9p5C , With help of Browser’s Network Monitor Tab, you can see the all contents that loading, and it is double shorted URL, that is bit.ly and tinyurl from the name of that url we get our flag.

1
gravithon{Y0u4r3S4f3}

So Loudd

Challenge: morse.wav

It’s a Morse Code audio, We can use Morse Decoder to get the flag, Upload and play the audio. The decrypted message will be our flag.

1
gravithon{1S TH1S A M0RS3 C0D3?}

Fly High to Tianjin

Challenge:

1
395f4dfc82f56b796b23c3fa1b5150cbe568d71e

It’s a SHA1 hashing algorithm. I used CrackStation to crack the hash.

1
gravithon{Unimaginatively}

Medium

Clone And Clone

Challenge:

1
3P7T:R4@?Yj_U5p8_S%5#_R`tA

It looks like a ROT47 string, When we do ROT13 and ROT47 we, get our flag like this ` brfvitcon{H0wd4g0uTdR0t18} `.

The flag has 3 words, first and last is set for us. what i done here guessed the middle word. that is H0w_4b0uT_R0t18

1
gravithon{H0w_4b0uT_R0t18}

Not that Tough

Challenge:

1
MFEFEMDDJBGTMTDZHEYGCVZVGVSFQSTTJRWU45TCKM4WWYRSGVWGIMTMGBQUOZDZLFMFU4DEI5UHMYTNGV3GKVZZGFMVQSTMMJWTSMA

It’s multiple encoded string, that is first Base32 then Base64, gives a shorted url https://tinyurl.com/donewithgravithonnoyouarenot

the link going for another encoded cipher that is Pikalang,

1
pi pi pi pi pi pi pi pi pi pi pika pipi pi pipi pi pi pi pipi pi pi pi pi pi pi pi pipi pi pi pi pi pi pi pi pi pi pi pichu pichu pichu pichu ka chu pipi pipi pipi ka ka ka ka ka pikachu pipi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu pichu ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu pipi ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu pichu ka ka ka pikachu pipi ka ka ka ka pikachu ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu pi pi pi pi pi pi pi pikachu pichu pi pi pi pi pikachu pipi pi pi pi pi pi pi pi pi pikachu ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu pichu ka ka ka ka pikachu pipi pi pi pi pi pi pi pi pikachu ka ka ka ka ka ka ka pikachu pichu pi pi pi pi pikachu pipi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu pichu ka ka ka pikachu pipi ka pikachu pichu pi pi pikachu pipi ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu pichu ka ka ka pikachu pipi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu ka ka ka ka ka ka ka ka ka ka ka ka ka ka ka pikachu pichu pi pikachu pipi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu pichu pi pi pi pikachu pipi ka ka ka ka ka ka ka ka pikachu pi pi pi pi pi pikachu pi pi pi pi pi pi pi pi pi pi pi pi pi pikachu 

Decode to get our flag.

1
gravithon{Ar3_y0u_f4n_0f_4n1m3_0r_P1k4chu}

Map

Challenge:

1
22434223_4223_42212322_55_234234313551_34553131423344

I just searched given string on google and found 3 results.

There is Japanese CTF writeups, from that we get our flag.

1
gravithon{THIS_IS_JUST_A_SIMPLE_MAPPING}

64 and 64

Challenge: 64Base64.txt

it’s a 38 times base64 encoded string, Decode to get your flag.

1
gravithon{l00ks_l1ke_4_l0t_0f_64s}

Rainbow Of Colors

Challenge: Rainbow_of_Colors.JPG

The challenge is about Hexahue Cipher. Decode and get your flag.

1
gravithon{should,fl5g4,b3,st1cky,or,n0t}

Hard

I lost my Way

Challenge: Who_am_I_.txt

It’s multiple encoded text file that is base32 and base64.

After that we will get PNG image file download it and open to get your flag. Wrap it in all Capital letters as per the instruction.

1
gravithon{F1N4LLY_Y0U_CR34T3D_B34UT1FUL_IM4G3}

Forensic

Look into it

Challenge: secret.jpeg

Use exiftool to get your flag.

1
exiftool secret.jpeg

1
gravithon{Y0u_4r3_G00d_4t_M3t4D4t4}

I can See You

Challenge: snow.zip

From the given file name snow.zip we know it’s a snow tool challenge. Here i used stegsnow to get the flag.

stegsnow is a program for concealing messages in text files by appending tabs and spaces on the end of lines, and for extracting messages from files containing hidden messages. Tabs and spaces are invisible to most text viewers, hence the steganographic nature of this encoding scheme.

After extarcting the file we get 3 more files, There is a fake flag, and our challange, and passwd that is in .secret.txt

Use stegsnow to get the flag and give passwd as welc0me_to_gravithon2021_ctf from .secret.txt

1
2
stegsnow -C -Q -p welc0me_to_gravithon2021_ctf snow/challenge.txt

1
gravithon{i5_it_c0ld_ov3r_th3re}

Thank you for reading my writeup!!

This post is licensed under CC BY 4.0 by the author.