MasterWard Profile
  • Introduction
  • Media Links
  • Resume
  • HackThebox Notes
    • RedPanda
    • Metatwo
  • CTF Contest Writeups
    • 2017
      • Takoma Park CTF
      • TUCTF 2017
      • HITCON CTF 2017 Quals
      • CSAW CTF Qualification Round 2017
      • SEC-T CTF
      • Backdoor CTF 2017
      • Hack Dat Kiwi 2017
      • Kaspersky 2017
      • Hack.lu 2017
      • HackCon 2017
      • Defcamp 2017
      • Square CTF 2017
      • Mitre 2017
      • EKOPARTY CTF 2017
    • 2018
      • SEC-T CTF
      • Hackcon 2018
      • EasyCTF IV 2018
      • DefCamp CTF Qualifiers
      • PACTF 2018
      • CSAW CTF Qualifiers 2018
      • PicoCTF 2018
    • 2019
      • Newark Academy CTF 2019
      • Crypto CTF 2019
      • PicoCTF 2019
        • General Skills
        • Binary Exploitations
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • TAMUctf 19
    • 2021
      • picoCTF 2021
        • General Skills
        • Binary Exploitation
        • Forensics
        • Reverse Engineering
        • Cryptography
        • Web Exploitation
      • HackiHoli
      • S.H.E.L.L CTF
      • DawgCTF 2021
      • TCTF 2021
      • RedPwnCTF 2021
      • IJCTF 2021
      • UIUCTF 2021
      • Really Awesome CTF 2021
      • TMUCTF 2021
      • CSAW Qualifiers 2021
      • Pbjar CTF 2021
      • Deadface CTF 2021
    • 2022
      • NahamCon CTF 2022
      • BYUCTF 2022
      • DEF CON Qualifiers 2022
    • Useful Code
  • Software
    • Video Standardization and Compression
    • TOBIAS
    • Tracking Phone
    • Image Compression
    • Do Not Call Database
    • Color Blind Simulator
    • Gmail Unsubscriber
    • MP4 to GIF Converter
    • Optical Character Reading
    • Soft Jobs
    • OBD Project
    • Online Movie Finder
    • Work In Progress
      • Incremental Backup
      • Web Scraper - Wallpaper Edition
      • Web Blocker
      • File Manipulator
      • AppFiller
      • Cyber Security Projects
      • Bsaber AI
    • Ideas
      • CAN Programming
      • Malicious Programs
      • Remove Yourself from the Internet
      • DNA Classic
      • Auto Clicker
      • Adding Depth to a Video
      • Collage Mosaic Generator
      • Game Destroyer
      • Hearing aid Technology
      • Sign Language Recognition
      • Text Summarizer
      • Video to audio to text
      • Video Object Detection
      • VR demonstration
      • More Ideas to Elaborate on
    • Failure
      • Police Camera Radar
      • Already Created
      • Google Maps Game
      • Car price prediction
      • Bullshit Detector
      • Automated Code writter
      • Career Prediction
      • Samsung Remote Control Hack
      • Invalid Finder
      • PiHole Regex Filter
      • Group Archiver
  • Additional Articles
    • Cleaning Up a Computer Tricks
    • Getting started in Cyber Security
    • Speeding Up Your Internet
    • College Experience
    • Currently Writting
      • Reverse Engineering Notes
      • Bug Bounty Guide and Examples
      • OSCP help
      • Job Experience
      • Professional Job-Hunting Experience
Powered by GitBook
On this page
  • Dead-PNG-2 - ?? [300 pts] [Not Solved]
  • Complex RSA - Crypto [200 pts] [Not Solved]
  • ECB - Steg [150 pts] [Not Solved]
  • ImageRev - Crypto [200 pts] [Not Solved]
  • NoCalm - Rev [350 pts] [Not Solved]
  • Stereotype - Crypto [300 pts] [Not Solved]

Was this helpful?

  1. CTF Contest Writeups
  2. 2017

Backdoor CTF 2017

PreviousSEC-T CTFNextHack Dat Kiwi 2017

Last updated 3 years ago

Was this helpful?

Dead-PNG-2 - ?? [300 pts] [Not Solved]

n00b accidentally found a corrupted zlib/png file, help him to recover the secret code from the file.

Solution:

Flag:

Complex RSA - Crypto [200 pts] [Not Solved]

n00b heard that single RSA encryption can be cracked sometimes due to bad implementation, so he encrypted the message twice. See if you can break it.

Solution

Flag:

ECB - Steg [150 pts] [Not Solved]

n00b learnt about ECB and has encrypted some images with it. Can you find the flag?

Solution

Flag:

ImageRev - Crypto [200 pts] [Not Solved]

Reverse the encrypted file and recover the flag

Solution

Flag:

NoCalm - Rev [350 pts] [Not Solved]

h3rcul35 and starlord were having a heated conversation and to c00l down the furious starlord, h3rcul35 gave him a binary and said "The binary takes each 'character' byte of the flag as argument. Given this info, grab the flag. I hope you dont get angry :P". Show h3rcul35 that you stayed c00l by finding the flag.

Solution

Flag:

Stereotype - Crypto [300 pts] [Not Solved]

n00b is so sure that no one can crack his message and in this foolishness he even provided a part of plaintext. You know what you have to show him

Solution

Flag:

55KB
corrupt.zip
archive
Corrupt
1KB
Complex RSA 200.zip
archive
Complex RSA
1MB
img1.png
image
img1
1MB
img2.png
image
img2
8KB
Imagerev 200.zip
archive
Encrypted
4KB
challenge.zip
archive
Challenge
1KB
Stereotypes 300.zip
archive
Text Files