Contents

RITSEC CTF 2021 - Forensics

RITSEC CTF 2021 - Forensics

1597

/ritsec2021-forensics/1597.png

Clone the git repo that’s given and look at the revision history. One of the previous files contains the flag.

/ritsec2021-forensics/15972.png

Inception CTF Dream 1

/ritsec2021-forensics/inception1.png

Open the zip file that you’re given. Open the text document and the first flag is just written backwards.


/ritsec2021-forensics/dream1.png

Inception CTF Dream 2

/ritsec2021-forensics/dream2.png

Open the next zip file using the password Dreamland from the previous step.
Inside is a text document with a string of numbers which can be converted to ASCII characters to reveal the next flag.

/ritsec2021-forensics/dream22.png
/ritsec2021-forensics/dream222.png

Inception CTF Dream 3

/ritsec2021-forensics/drea3.png

Open the next zip file using WaterUnderTheBridge and inside is another text file. This string is base64 endcoded. Once you decode it it give you a string of hex values that can be converted to ASCII characters and give you the flag.

/ritsec2021-forensics/dream3.png

Inception CTF Dream 4

/ritsec2021-forensics/dream4.png

Open the next zip with F@!!ingElev@tor. Inside is an .hta file that when you inspect near the bottom you’ll find morse cord in white font that you’ll have to highlight to see. Decode that to get the flag.

/ritsec2021-forensics/dream41.png /ritsec2021-forensics/dream44.png /ritsec2021-forensics/dream42.png

PleaseClickAllTheThings 1

/ritsec2021-forensics/click.png

You’re given an Outlook .msg file with three different attachments. The first is an html with embedded javascript. Open the file with a code viewer and you can see a URL encoded string that will decode into html text. Near the bottom is a base64 string that can be decoded to get the flag.

/ritsec2021-forensics/click2.png /ritsec2021-forensics/click3.png /ritsec2021-forensics/click4.png

PleaseClickAllTheThings 2

/ritsec2021-forensics/please.png
Take the given file and run oledump against it to view the macros. The flag is in A4.

1
python3 oledump.py -s A4 ../GandCrab_Ursnif_RITSEC.docm

/ritsec2021-forensics/please1.png
/ritsec2021-forensics/please2.png

Parcel

/ritsec2021-forensics/parcel.png
The file you download doesn’t have an extension but if you run a file command you can see it’s a gunzip archive. Add .gz to the end and unzip the file and you’ll find a text file of emails going back and forth between people. All files are base64 encoded with the longer files able to be converted into PNG images. Convert all the image files and rearrange them to see the flag. RS{Im_doing_a_v1rtual_puzzl3}

/ritsec2021-forensics/parcel2.png

Blob

/ritsec2021-forensics/blob.png

Clone the git repo and view the revision list. Cat the git blob and get the flag.

/ritsec2021-forensics/blob1.png