https://blitz.ctf365.com/

Darwin [DIDIx13]
6 years ago

0

I finally complete my first CTF :D

I think it’s a really easy one but I overthink it a loooot (specially for the last stage who is the easiest in my opinion)

Here’s the link give it a try ! : https://blitz.ctf365.com/

Image

23replies
7voices
346views
3images

0

Nice suggestion, I’ve tried it now too. Not too hard, but I have to say the second one took some time.
Had to create an account on ctf365 to do this though. I am wondering, when you go to the website of ctf365 you see that it is a 30 day trial and after that you would have to subscribe, for $46 a month. If that is what you have to pay to do future ctf’s there I won’t be doing any more.

Darwin [DIDIx13]
6 years ago | edited 6 years ago

0

No need to buy
Image

Smyler [WHGhost]
6 years ago

0

What do you mean? According to your screenshor there is no free plan.

Darwin [DIDIx13]
6 years ago

0

You can create an account but no need to buy a plan


0

yeah but can you do ctf’s like blitz in the future when your 30 days free trial runs out?

Darwin [DIDIx13]
6 years ago

0

Does plans mention anything about CTF’s ? Nop

My account is like 3 months old now and I’m still able to do CTF’s with Free plan ;)

Smyler [WHGhost]
6 years ago

0

What are the plans for then?

Darwin [DIDIx13]
6 years ago

0

It doesn’t look like it’s defined but I’m already enjoying myself on this website pretty funny but I didn’t past that much long time on it ^^'

Try it by yourself let this thread know your opinion.

Smyler [WHGhost]
6 years ago

0

I better not start something like that now, I need to fucus on school, but I will surely have a look at it latter :)

Elhitch
6 years ago

0

I tried the Blitz CTF and got to the second challenge. I tried a couple of input combinations but didn’t manage to really do anything. Does anyone have any clues or hints that I could use?

fred [feuerstein]
6 years ago

0

hmm wondering if I should rush it ;)

x2600
6 years ago

0

There are sites like this that pay you for challenge completion, but only the first person to solve gets paid.

fred [feuerstein]
6 years ago

0

nah I’m definately not that good, was just kidding like running gag ;)


1

@Elhitch keep trying what you are doing, you will succesd eventually, it just has to be exactly right as they expect it

fred [feuerstein]
6 years ago

0

had a try, #2 took some time, rest have been easy

testing935
6 years ago

0

I finished the chall but the flag is not valid

Darwin [DIDIx13]
6 years ago

0

Same for me @feuerstein the second challenge definitely took me 60% of the entire time.

@testing935 Means you missing something

Elhitch
6 years ago

0

They closed the challenge before I even managed to properly work on the last one (Never gonna give you a flag one) - can anyone explain what was the trick there anyway?

fred [feuerstein]
6 years ago

0

the flag has been in the background-image, extending the data at the enf of the file

Darwin [DIDIx13]
6 years ago

0

Here is my folder for this CTF : https://drive.google.com/open?id=1Obob9zIpVFm1EQKq7BKSjIKGF-fH2E6H

You have the image for the last level in if you want it :)

Darwin [DIDIx13]
6 years ago

0

And here’s the answer of the first level because some of us asked me.

Here it is : >> Image

Ice Booda [0x1ceb00da]
6 years ago | edited 6 years ago

0

Since the CTF has finished, here is my little writeup.
https://blitz.ctf365.com/console/
When we start this ctf we are greeted with a shell simulation on a website.

root@BlitzCTF:~$

Lets see what is in the home dir

root@BlitzCTF:~$ ls
README challenge1.txt

First let us see the README file, could some important info in there
root@BlitzCTF:~$ cat README
Check challenge1.txt file.
Maybe you should check it twice.

Hmm not really usefull, although there might be a hint in the last line. Lets check out the challenge text
root@BlitzCTF:~$ cat challenge1.txt
33 64 20 36 37 20 36 61 20 35 39 20 36 61 20 35 61 20 36 64 20 35 39 20 36 64 20 34 65 20 34 34 20 35 61 20 33 35 20 34 39 20 35 37 20 34 65 20 33 34 20 33 30 20 34 33 20 34 65 20 36 63 20 34 32 20 35 34 20 35 39 20 37 34 20 36 33 20 35 34 20 35 61 20 37 38 20 34 35 20 35 34 20 34 63 20 33 31 20 34 39 20 33 32 20 35 39 20 36 62 20 33 31 20 34 33 20 34 64 20 36 61 20 36 38 20 37 61 20 35 39 20 33 34 20 35 31 20 33 32 20 35 39 20 36 61 20 33 39 20 34 33 20 36 34 20 36 63 20 34 61 20 33 33 20 35 39 20 36 63 20 34 65 20 33 33 20 34 63 20 37 34 20 33 39 20 33 32 20 35 39 20 37 35 20 35 35 20 36 61 20 34 65 20 37 61 20 35 39 20 34 37 20 36 34 20 36 61 20 33 35 20 36 39 20 36 35 20 33 30 20 36 63 20 34 37 20 36 32 20 36 39 20 33 39 20 37 39 20 34 63 20 33 36 20 34 31 20 34 38 20 36 34 20 33 30 20 36 38 20 34 37 20 34 39 20 37 36 20 35 32 20 34 38 20 34 39 20 37 36 20 36 34 20 34 35 20 34 39 20 36 38 20 34 64 20 34 38 20 36 34 20 36 38 20 34 61 20 33 33 20 35 61 20 37 35 20 33 39 20 33 32 20 35 31

Looks like hex ascii values, let’s decode this
[root@zifnab]$ echo “33 64 20 36 37 20 36 61 20 35 39 20 36 61 20 35 6 63 20 34 32 20 35 34 20 35 39 20 37 34 20 36 33 20 35 34 20 35 61 20 37 38 20 34 35 20 35 34 20 34 63 20 33 31 20 34 39 20 33 32 20 35 39 20 36 62 20 33 31 20 34 33 20 34 64 20 36 61 20 36 38 20 37 61 20 35 39 20 33 34 20 35 31 20 33 32 20 35 39 20 36 61 20 33 39 20 34 33 20 36 34 20 36 63 20 34 61 20 33 33 20 35 39 20 36 63 20 34 65 20 33 33 20 34 63 20 37 34 20 33 39 20 33 32 20 35 39 20 37 35 20 35 35 20 36 61 20 34 65 20 37 61 20 35 39 20 34 37 20 36 34 20 36 61 20 33 35 20 36 39 20 36 35 20 33 30 20 36 63 20 34 37 20 36 32 20 36 39 20 33 39 20 37 39 20 34 63 20 33 36 20 34 31 20 34 38 20 36 34 20 33 30 20 36 38 20 34 37 20 34 39 20 37 36 20 35 32 20 34 38 20 34 39 20 37 36 20 36 34 20 34 35 20 34 39 20 36 38 20 34 64 20 34 38 20 36 34 20 36 38 20 34 61 20 33 33 20 35 61 20 37 35 20 33 39 20 33 32 20 35 31” | xxd -r -p

3d 67 6a 59 6a 5a 6d 59 6d 4e 44 5a 35 49 57 4e 34 30 43 4e 6c 42 54 59 74 63 54 5a 78 45 54 4c 31 49 32 59 6b 31 43 4d 6a 68 7a 59 34 51 32 59 6a 39 43 64 6c 4a 33 59 6c 4e 33 4c 74 39 32 59 75 55 6a 4e 7a 59 47 64 6a 35 69 65 30 6c 47 62 69 39 79 4c 36 41 48 64 30 68 47 49 76 52 48 49 76 64 45 49 68 4d 48 64 68 4a 33 5a 75 39 32 51

More hex ascii values. The second line from the readme now makes sense

Let’s decode this again
[root@zifnab]$ echo “3d 67 6a 59 6a 5a 6d 59 6d 4e 44 5a 35 49 57 4e 4 39 32 59 75 55 6a 4e 7a 59 47 64 6a 35 69 65 30 6c 47 62 69 39 79 4c 36 41 48 64 30 68 47 49 76 52 48 49 76 64 45 49 68 4d 48 64 68 4a 33 5a 75 39 32 51” | xxd -r -p

=gjYjZmYmNDZ5IWN40CNlBTYtcTZxETL1I2Yk1CMjhzY4Q2Yj9CdlJ3YlN3Lt92YuUjNzYGdj5ie0lGbi9yL6AHd0hGIvRHIvdEIhMHdhJ3Zu92Q

This looks like a base64 encoded string backwards. Lets first reverse it and then try to decode it

[root@zifnab]$ echo “=gjYjZmYmNDZ5IWN40CNlBTYtcTZxETL1I2Yk1CMjhzY4Q2Yj9CdlJ3YlN3Lt92YuUjNzYGdj5ie0lGbi9yL6AHd0hGIvRHIvdEIhMHdhJ3Zu92Q” | rev
Q29uZ3JhdHMhIEdvIHRvIGh0dHA6Ly9ibGl0ei5jdGYzNjUuY29tL3NlY3JldC9jY2Q4YzhjMC1kY2I1LTExZTctYTBlNC04NWI5ZDNmYmZjYjg=

[root@zifnab]$ echo “Q29uZ3JhdHMhIEdvIHRvIGh0dHA6Ly9ibGl0ei5jdGYzNjUuY29tL3NlY3JldC9jY2Q4YzhjMC1kY2I1LTExZTctYTBlNC04NWI5ZDNmYmZjYjg=” | base64 –decode
Congrats! Go to http://blitz.ctf365.com/secret/ccd8c8c0-dcb5-11e7-a0e4-85b9d3fbfcb8

And we have our first flag

https://blitz.ctf365.com/secret_app/1
Moving on, we get a website with login promt
Nothing to see in the source, also no strange cookies that allow manipulation and dirb also didn’t find any hidden directories. Trying sqli also failed at first. This got me bummed for quite some time, but continuing trying with sqli at one point I hit the jackpot

“ or 1=1#
It has to be this exact payload or the challenge won’t work and it will not give anysql errors when trying injection.

Next challenge is
https://blitz.ctf365.com/secret_app/challenge_two
We see the text: You are not authorized to access this page, are you an admin?
Lets inspect the cookies
we see a cookie with the name userRole and the value user, let’s change to admin and refresh the page

Next challenge
https://blitz.ctf365.com/secret_app/challenge_l_ast
Looking at the source we see a comment:
Nothing to see here, check in the back
Let’s take a look at the background image. Nothing to see when just viewing the image, let’s take a look at it a bit deeper.

[root@zifnab]$ strings -16 image.png
The flag is: tCNulsf2F8sZrt0AwPyEvf9JQ2RNlwJgJ6owmnXh

So the flag was hidden in the image.
Let’s enter the flag

And CTF done

fred [feuerstein]
6 years ago

0

well done and thanks for this explanations

You must be logged in to reply to this discussion. Login
1 of 24

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.

Dismiss