This is an old revision of the document!


Lab 01 - Introduction

Objectives

  • Simple CTF tasks
  • Introduction to Python scripting
  • Introduction to basic security-related tools

Preparation

Download the task archive for this section. Each exercise will have a corresponding folder.

Python Warmup

01. Decode 'til You Drop

  • One of your friends gave you this string which looks encoded… Figure out what encoding was used and decode it. Be patient, it may take a couple of decoding rounds :)

02. Zip it good

  • The archive contains the flag. What is the password?
    • Hint: the password is in the wordlist

CTF tasks

03. Find the impostor

  • The flag for this exercise is found in a file under the inhere directory. The file has the following properties:
    • human-readable
    • 987 bytes in size
    • not executable

04. Unknown File Type

  • We've found this file on a confiscated machine, but we can't figure what it is. Can you help us?

05. Corrupted File

  • During a transmission, one of our files got corrupted. Take a look and see if you can do something about it.

Maybe there is something wrong with the header.

  • Hint: use a hex editor to check the file's header

06. Hidden File

  • There is something wrong with the size of this image. Is there anything else there?
    • Hint: use Binwalk. ”-e” option is buggy sometimes.

07. Waiting for eternity

  • We stared at this gif for the last hour but nothing is happening. Would you like to join us and stare at it for the next hour?

08. The great file squeeze

  • You are being given a file which is a hexdump of the flag that has been repeatedly compressed. Reverse the process and get the flag :)
    • Hint: hexdump, man

Feedback

Please take a minute to fill in the feedback form for this lab.

isc/labs/01.1728229447.txt.gz · Last modified: 2024/10/06 18:44 by alexandru.mircea98
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0