Contents

HeroCTF 2021 - Challenges

OSINT

Find Me

/heroctfchall/findme1.png

Reverse image search the given file. One of the websites states that it is the Portes Mordelaises.

/heroctfchall/findme.png

Social ID #1

/heroctfchall/socialid1.png

Head over to https://tweeterid.com and just put in the HeroCTF handle.

/heroctfchall/twitter.png

Social ID #2

/heroctfchall/socialid21.png

Head over to https://tweeterid.com again and just put in the ID instead.


/heroctfchall/sid22.png

Transfer

/heroctfchall/transfer.png

Look up the bitcoin transaction ID and find the wallet the transaction went to.

/heroctfchall/transfer1.png

ProtonDate

/heroctfchall/protondate1.png

Look up the email from within Proton Mail and it will show you when the RSA key was created.
/heroctfchall/protondate2.png

Pushhhh

/heroctfchall/pushhh.png

View the HeroCTF_v2 repository and grab the flag.

/heroctfchall/pushhh1.png

Forensics

We Need You 1

/heroctfchall/weneedyou1.png

Use the volatility framework to parse through the downloadable memory dump. Use imageinfo to grab the system profile, then hivelist to view the place of the SYSTEM key, then printkey to grab the contents.

/heroctfchall/weneedyou12.png
/heroctfchall/weneedyou13.png

We Need You 2

/heroctfchall/weneedyou2.png

Grab the NTLM hash from the \Config\DEFAULT key and throw it to an NTLM hash site for the flag.

/heroctfchall/weneedyou22.png
/heroctfchall/weneedyou23.png

We Need You 3

/heroctfchall/weneedyou31.png

Use the netscan option to view any connections made to the machine.

/heroctfchall/weneedyou32.png /heroctfchall/weneedyou33.png

Other

Russian

/heroctfchall/russian.png

Open all the zip files to get the flag.

/heroctfchall/russian2.png

Holy Abbot

/heroctfchall/holyabbot.png

Decode the file from Ave Maria cipher.

/heroctfchall/holyabbot2.png

Phono

/heroctfchall/phono.png

Download the PhonoPaper app and use it to listen to the downloadable file to hear the flag.