Nowruz 1404

Achieved Rank 🥈

Name
Category
Solved?

VLESS

Forensics

✅

KaB

Forensics

✅

Robin’s Mystery

Cryptography

✅

Forensics

VLESS

What do you know about VLESS?

Flag format: FMCTF{DestinationIP_UUID}

We're given a couple TCP packets where there's only one stream of TCP packets

..Z....C.......%m...k..
%.Hi

..Hello

Please give me flag format

oh ok
this is flag format
FMCTF{DestinationIP_UUID4}
for example: FMCTF{1.1.1.1_34cdbd88-7466-45c2-9287-364a9f02ecd6}

Thanks <3

bye

Okay so it's just a flag format that doesn't give us much information.

We can try to find out what VLESS is in this websitearrow-up-right

Based on the website, VLESS has the following request and response

Request and Response Format

To extract the data, we'll use the hex stream from the previous TCP stream.

Based on the VLESS format for requests and responses, we can simply take the first hex stream

Flag: FMCTF{127.13.37.1_875aa716-c9aa-43ee-bea0-9dbcbe87256d}

KaB

i would've given you the challenge, but that would've been too easy

Hint: the image is your carrier

Hint2: Pixel order is left to right, Up to down, In red channel

Given a Pcapng file containing a couple HTTP and TCP Requests.

The main highlight of this challenge is that we have a couple interesting endpoints.

The endpoints are:

  1. /key -> Im_THE_kyE

  2. /KaB_Doc.pdf -> PDF File

  3. /steg.png -> Normal Image

Based on the hint given from the author, we have to make a script to extract the pixels data from the image using the given key and pdf files as a guidance.

Flag: FMCTF{haha_ypu_unlocked_bitmap}

Cryptography

Robin's Mystery

Robin’s friend used an unusual RSA setup, and now he can’t decrypt his own message! Can you step in and use a special technique to recover the plaintext?

The challenge is quite straight forward. we can get the n and the e from the public key and solve it using fermat theorem

Flag: FMCTF{S0lv3d_w1th_R4b1n_fx777}

Last updated