Holiday Challenges🎅
- Cyber Catamounts
- Dec 14, 2020
- 2 min read
❄️Flag 1:
Decode the filename from base64 to get the flag
How? Use:
> echo ZmxhZyAjMTogaGV4YWRlY2ltYWxfdHJlZQ== | base64 -d
Flag: hexidecimal_tree (hmm… looks like a hint!)
❄️Flag 2:
Run the strings command to get the flag (and hints)
How?
> strings [filename]
Flag #2: 20 57 33 5f 77 49 73 68 5f 55 2e 2e 2e
Well done! Hint: flag #3 hides within the colors. https://imagecolorpicker.com/en/
Wow! Another hint?
Flag: W3_wIsh_U...
❄️Flag 3:
This flag is written in faint color. You can use the bucket fill tool
How?
Open Gimp on your VM

Click on the bucket tool shown above or use “ctrl-b” → Click on areas in the background to reveal the flag!
Flag: can_you_see_me?
❄️Flag 4:
❄️Flag 1:

We know it’s a photograph (the name of the file tells us!), so change .mp3 in the filename to .jpg to get the first flag.
Want to know how to tell what filetype it is without a filename?
> file [filename

Mp3 imposter!

❄️Flag 2:

Using this we could extract a QR code, decode the QR code and we get a binary string, decode the binary string and we get the flag

(Scan with your phone or use this command:)
> zbarimg QR.png
QR-Code:Flag: 01010001 01010010 01011111 01000011 00110000 01100100 01000101 01011111 01001101 01000000 01010011 01110100 00110011 01110010
scanned 1 barcode symbols from 1 images in 0.02 seconds
Flag: QR_C0dE_M@St3r
Comments