Post

Cat The Quest 2024

Cat The Quest 24 Write-Up

Cat The Quest 2024

Cat the Quest was a unique CTF with a lot of challenges involving series of challenges, ie a series of challenges that are related to each other. I played Cat The Quest CTF with Team MONST3RDECK and we secured 3rd place in the competition. Here are the write-ups for the some of the challenges we solved.

Portail Captif (Fpopo)

Description

Identify the true identity of Fpopo, an individual mentioned in connection with the Flipper Cater Fpopo. Find the author and find the former name of the Flipper in USGS records.

Flag Format: CAT{Rufdfdf833_ffueyf}

Solution

This was a OSINT Challenge where we had to find 2 parts of flag, First was finding the author of the book and second was finding the former name of the Flipper in USGS records.

The Part 1 was pretty straightforward, by using some keywords and Google Search, I stumbled upon a reddit post which said the name of their flipper zero was Fpopo. Now even tho this was a little vague, the username of commentor fit the flag format perfectly.

Reddit Post

fpopo

The Part 2 was a little tricky and vague(r), So the Solve was similar you had to use Google Dorking or search using keywords. After some experimenting this is what gave the result.

Google Dork: "flipper", "fpopo" site:usgs.gov This lead to a USGS pdf in which you had to search flipper.

USGS PDF

flipper

In the image you can see flipper appearing and reading as fupper which was the 2nd part of the flag.

The Challenge was a little tricky and a little vague. But it was fun to solve. prolly also learnt dorking more properly

Flag: CAT{Banshee888_fupper}

Will Be Updating Soon with more challs :D

Atlantide Series

It was a 3 part series of challenges which were related to each other in some way or other.

Atlantide - Strange Account

Description

Challenge: Twilight falls upon the forest when your attention is drawn to an unusual glint. Nestled between the gnarled roots of a centuries-old oak tree, a fragment of yellowed paper catches your eye. Intrigued, you pick it up and discover a headline that makes your heart leap: Atlantis Found with a link leading to the dark web. Perplexed, you scan your surroundings. How could such a document end up in this remote forest? Driven by curiosity, you hasten to follow the link. The article that appears on the screen takes your breath away. The evidence presented seems irrefutable, the explanations for the concealment of this discovery from the public, terribly plausible. Yet, you feel deep down that something is off. Is it an elaborate hoax or the greatest discovery in history? Determined to unravel this mystery, you take on the role of debunker. Armed with your critical thinking and thirst for truth, you embark on a perilous quest. You decide to first look at the account of the person who posted the article. It seems that the location of Atlantis can be found from the profile.WARNING: THE FLAG MUST BE SENT IN FRENCH, WITHOUT ANY ACCENT MARKS OR UPPER CASE. e. g If the answer is Black Sea the flag will be CAT{mer-noire}

Hint: You must understand the meaning of the profile description

Solution

In this challenge we were given a md file with some information like Public Email, Number of likes, Number of posts by user, Description and Last connection. Judgeing by the description I thought it was related to finding a user which leading nowhere.

I then read the hint and it said to understand the meaning of the profile description. So I carefully observed the given file. and I noticed there were some numbers hidden in between the whole file.

I extracted the numbers which were 87 254 98 7 3 and then I thought of merging the last 2 single digits and the final number was 87 254 98 73. These numbers looked like IP address to me and I reverse searched the IP leading knowhere. Then I thought they might be coordinates as the challenge was related to finding the location of Atlantis.

After using the coordinates 87.254, 98.73 in google maps, It lead to arctic ocean, and as said in description I converted it into french and matched the flag format and it was the correct flag.

arctic ocean

Flag: CAT{ocean-arctique}

Atlantide - A Strange Discovery

Description

Challenge: As you delve into this intriguing enigma, one question lingers: How could scientists have missed this discovery for so long? However, a disturbing detail catches your attention: how could the member have his e-mail address validated if the domain was never rented? Could you be on the trail of a much bigger mystery than you had imagined? Driven by adrenalin, you decide to continue your investigations, but you must nevertheless advance into the forest. After entering the ruins, you come across another piece of paper, and before moving on, I should start by understanding this one. Suddenly, a thought crosses your mind: maybe some of the elements found in the previous step, coupled with the TXT, can help me move forward. Maybe I should coNSult the different elements I have at my disposal. A ray of hope then appears in your mind, prompting you to explore these unexpected clues in greater depth. With determination and curiosity, you embark on this new phase of your investigation, ready to unravel the mystery unfolding before you. The question remains, what have you discovered?

Solution

The first thing I noticed was random capitalized letters in the description and I stored then down for later TXT NS

Now moving on to the attachment of a image file which had some interesting instructions on it, and it was related to arrangement of some Numbers we found. And YES! it was related to the numbers we found in the previous challenge.

The Instructions (and the attached photo):

instructions

After thinking about those for a while it didnโ€™t make much sense, So I uploaded to image to an online tool called as aperisolve which is a image steganography tool which runs some basic analysis on the image using some popular tools and image filters. And this I found some hidden text in the image.

hidden text

So, what the hidden text says is:

  • Perform OR operation on each individual digit of a number and the result of the OR operation will be the score of the number.

  • Sort the numbers according to the score in descending order.

  • Perform AND operation if there are numbers with the same score.

  • Sort the numbers with same score in ascending order of the AND operation score.

I used python to do these operation, didnโ€™t write a script and just did them manually as there werent a lot of them.

These were the results:

OR results:

8 | 7 -> 15
2 | 5 | 4 -> 7
9 | 8 -> 9
7 | 3 -> 7

The operators | and & are bitwise OR and AND operators respectively.

sequence after OR operation: 87 98 73 254

AND results:

2 & 5 & 7 -> 0
3 & 7 -> 3

Final Sequence: 87 98 254 73

Now I re-analyzed the description and tried to figure what it was hinting at.

The description said how could the member have his e-mail address validated if the domain was never rented? and the capitalized letters were TXT NS which was hinting at TXT Records and Name Servers or nslookup tool, and the answer is using a Custom DNS Server.

Also, The number sequence looks suspiciously similar to an IP address. Maybe this is the DNS server? 87.98.254.73

Also the previous email was verite@the87Atlantide.com which gives us the domain name the87Atlantide.com

ns lookup

After using nslookup on the domain the87Atlantide.com with the custom DNS server we get a new IP address, which lead to a website.

new IP - 164.92.184.7

website

And we get the flag from the website.

Flag: CAT{Les-Preuves-Origielles}

Atlantide - The Strange Website

Description

As you stand before this faulty WordPress site, a question persists: how can a site so poorly maintained present no security flaws? You decide to investigate a bit more deeply.

Solution

The website the question was referring to was the website we found in the last challenge http://164.92.184.7 and it was a wordpress site.

So I started by running wpscan on the website to find any vulnerabilities.

wpscan

Which gave us the author information mathys and Platon

So we tried some basic passwords on the wp-login page but to no success. We then confirmed if bruteforcing the login was allowed and we were not given the permission so we had to find another way.

As this was listed under stegano and web category, I thought of downloading the images in the website and running some tools on them. Which was another wild goose chase. and lead to nothing

Then I reset my thinking and tried to find new way, then I thought of checking the source code which I should have done in the first place and I found a pastebin link commented in the source code.

pastebin

PasteBin Link

There was a / at the start of paragraph which was suspicious and maybe hinted at a directory.

The pastebin also hinted at checking the UPPERCASE TEXT so I ran a simple regex [A-Z]+ on the whole paragraph and came up with this string HYWIHYIAYANCIY

And then I just tried the endpoint on the website and there we go!! We find the hidden directory which contained the flag and some funny text.

hidden directory

Flag: CAT{Y0u-@v3-SolV3-tHe-mYst3ry}

Oxym0r

Description

A post relaying the attack against CatTheFlag would have been posted on a social network by someone called OxymOrH4z4RD, itโ€™s up to you to find this person and what they are hiding

Solution

This was a OSINT challenge where we had to find the social media account of the user OxymOrH4z4RD

I searched the username of twitter and found the user, and the user had a post and the post contained a bunch of binary numbers.

OxymOrH4z4RD Twitter/X Account

twitter

I then converted the binary to ascii using cyberchef it turned out to be base64 so I decoded it and got a link to a website.

base64

The website source contained the flag.

flag

Flag: CAT{Welc0me_t0_CatTheQuest_h4z4rd}

Old Friend

Description

Our dear H4z4rd is back, do you remember him? He remembers you. He has used the same communication place as last time for your next mission. Complete it.

Solution

We Actually first blooded this challenge and we had perfect team sync for this challenge.

This was a OSINT challenge leading back to our old friend OxymOrH4z4RD and the communication place was the twitter account. So we visit the account once again and we see a new post.

twitter

The first part was actually really simple after analyzing the string for a while it was a simple fill_in_the_blanks string.

_y @ i_ _he __y _o __c_y_t -> my @ is the key to decrypt

So the key was 0xym0rH4z4RD

The second part was a post with only emojiโ€™s. Now there are actually ways in which you can encrypt text into emojis so I searched for online tools for emoji decryption and on my 2nd try we found a tool that worked perfectly for the emoji string ๐Ÿ˜ฏ๐Ÿ™๐Ÿ‘š๐Ÿ‘ฎ๐Ÿ‘ญ๐Ÿ‘ข๐Ÿ‘ฉ๐Ÿ™„๐Ÿ˜ฒ๐Ÿ‘ต๐Ÿ‘ธ๐Ÿ˜ฏ๐Ÿ˜ถ๐Ÿ˜ณ๐Ÿ˜ฒ๐Ÿ‘š๐Ÿ™„๐Ÿ™Ž๐Ÿ‘ด๐Ÿ‘–๐Ÿ™ˆ๐Ÿ‘๐Ÿ™ˆ๐Ÿ‘ฃ๐Ÿ˜ท๐Ÿ‘ก๐Ÿ™Š๐Ÿ‘•๐Ÿ‘๐Ÿ™‡๐Ÿ™ƒ๐Ÿ˜ฐ๐Ÿ‘ฎ๐Ÿ˜ถ๐Ÿ™‡๐Ÿ‘น๐Ÿ‘ฆ๐Ÿ‘ซ๐Ÿ˜ด๐Ÿ‘ฑ๐Ÿ‘ฌ๐Ÿ™…๐Ÿ˜ถ๐Ÿ‘—๐Ÿ˜ฒ๐Ÿ‘ซ๐Ÿ˜ด๐Ÿ‘ฅ๐Ÿ˜ต๐Ÿ‘ฌ๐Ÿ™Š๐Ÿ™†๐Ÿ‘•๐Ÿ‘ฆ

Emoji Decryptor

emoji

The decrypted text was a link to a website https://riddle.catthequest.com which had a simple form to submit answer to a riddle.

riddle

the riddle was hidden in the source code and it was a text file.

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

I immediately recognized the base64 string and tried to decode itโ€ฆ.. but it was not 1.. not 2โ€ฆ but 13 times base64 encoded.

base64x13

We get a code to submit in the riddle form, and after submitting we are presented with the flag.

oldfriend

Flag: CAT{77ce9338-MjAyNC0wNy0yMiAyMzoxNjowNg--b2d5fa50f5dc56e536ce13c7e471f6b2e05f73216f4024fd96a100c44eb4cc17}

This post is licensed under CC BY 4.0 by the author.