WolvCTF 2023

Hi friends!

It’s my first CTF. Feeling excited and a little bit worrying too !

I played WolvCTF 2023 which was organized by WolvSec along with my team Invaders0x1. And it was held from 17 March 2023, 20:00 UTC — Sun, 19 March 2023, 20:00

Let me explain the challenges I have solved in WolvCTF 2023.

Charlotte’s Web #

┌──[m4r10@parrot]─[/media/sf_CyberSec/CTF/WolvCTF]
└─$ curl https://charlotte-tlejfksioa-ul.a.run.app/                                           
<!DOCTYPE html>
<html>
<head>
<title>index</title>
<script>
  function start() {
    alert("where's the flag? i swear it was around here somewhere");
  }
</script>
</head>
<body>
<button onclick='start()'>click me for the flag</button>
<!-- /src -->
</body>

</html>

                                                                                                                                                                             
┌──[m4r10@parrot]─[/media/sf_CyberSec/CTF/WolvCTF]
└─$ curl https://charlotte-tlejfksioa-ul.a.run.app/src

import flask

app = flask.Flask(__name__)

@app.route('/', methods=['GET'])
def index():
  return flask.send_file('index.html')

@app.route('/src', methods=['GET'])
def source():
  return flask.send_file('app.py')

@app.route('/super-secret-route-nobody-will-guess', methods=['PUT'])
def flag():
  return open('flag').read()
                                                                                                                                                                                      
┌──[m4r10@parrot]─[/media/sf_CyberSec/CTF/WolvCTF]
└─$ curl https://charlotte-tlejfksioa-ul.a.run.app//super-secret-route-nobody-will-guess -X PUT
wctf{y0u_h4v3_b33n_my_fr13nd___th4t_1n_1t53lf_1s_4_tr3m3nd0u5_th1ng}  


Flag : wctf{y0u_h4v3_b33n_my_fr13nd___th4t_1n_1t53lf_1s_4_tr3m3nd0u5_th1ng}


Baby re #

strings baby-re | grep wctf
wctf{Oh10_Stat3_1s_Smelly!}
wctf{Must_be_fr0m_OSU}
wctf{A_t0tally_fake_flag}

By guessing I took wctf{Oh10_Stat3_1s_Smelly!} and It was the right flag

Flag : wctf{Oh10_Stat3_1s_Smelly!}


We will rock you #

The challenge gave us a protected zip file. Then, we crack it with john and the rockyou wordlist :

┌──[m4r10@parrot]─[/media/sf_CyberSec/CTF/WolvCTF]
└─$ zip2john we_will_rock_you.zip > zip.hashes                 
Created directory: /home/kali/.john
ver 1.0 we_will_rock_you.zip/we_will_rock_you/ is not encrypted, or stored with non-handled compression type
ver 1.0 efh 5455 efh 7875 we_will_rock_you.zip/we_will_rock_you/flag.txt PKZIP Encr: 2b chk, TS_chk, cmplen=33, decmplen=21, crc=7D20D45F ts=B816 cs=b816 type=0
                                                                                                                                                                                      
┌──[m4r10@parrot]─[/media/sf_CyberSec/CTF/WolvCTF]
└─$ john --wordlist=/usr/share/wordlists/rockyou.txt zip.hashes
Using default input encoding: UTF-8
Loaded 1 password hash (PKZIP [32/64])
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
michigan4ever    (we_will_rock_you.zip/we_will_rock_you/flag.txt)     
1g 0:00:00:00 DONE (2023-03-20 17:35) 1.176g/s 6548Kp/s 6548Kc/s 6548KC/s mickovgys..michellsmg
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 

┌──[m4r10@parrot]─[/media/sf_CyberSec/CTF/WolvCTF]
└─$ cat we_will_rock_you/flag.txt 
wctf{m1cH1g4n_4_3v3R} 

Flag : wctf{m1cH1g4n_4_3v3R}