# SEC-T CTF

## Bad AES - Crypto \[100 pts] \[Not Solved]

> Acid Burn found this AES-CBC encrypted text in the garbage file that Joey stole from the Gibson. Sadly, Joey didn't get the full S-BOX used by The Plague. Can you help them recover the text?

{% file src="/files/-MdYA2lzNaJ1V2yuNS7v" %}
BadAES
{% endfile %}

## Qproximity- Crypto \[200 pts] \[Not Solved]

> n = 2462649746477364143454082050368305440553491900304388646893610847386194301369924385009730987303651345060031438478297733694036327257723431468649220444397635127530301992505638291521092898714917678389314956983918603221732358628680256253537449204312287724750669208856634711056863315465220853759428826555838536733 \
> e = 201527

Solution Here

## Joeys Screenshot - Misc \[50 pts]

> Joey gave me this screenshot to prove he got into The Gibson. Can you help us hack The Gibson too?

{% file src="/files/-MdYCrRsY1BtyWAyBfhL" %}
screenshot
{% endfile %}

Starting out we use `binwalk -e chall.png` and find that there are a lot of files. They are named with just some letters and looking through them there was a pattern. Noticed there is a letter followed by a number. I wrote some code to rearrange it and put it into an empty array.

```python
import os 

files = os.listdir(".")
print(files)
cx = [] # Character Array
for i in range(0, 50):
	cx.append("-")
for filename in files:
	if "." not in filename:
		print(filename)
		f = open(filename)
		fs = f.readline()
		print(len(fs))
		let = fs[0] # Letter
		place = int(fs[1:]) # Place
		cx[place] = let
ans = ""
for xx in cx:
	ans += xx
print(ans)
```

Flag: SECT{D4\_K3Y\_2\_D4\_G1B50N\_5UP3RU53R\_15\_G0D\_H3H3!}

## Acid Burn - Misc \[200 pts] \[Not Solved]

> I suspect Acid Burn is hiding something in her background image, but I can't quite figure out what is it. Can you help me?\
> Author: SecureLink / klondike

{% file src="/files/-MdYCRrJJcv0d9Cl2zCB" %}
Acid\_burn
{% endfile %}

77 teams solved

## Report - Misc \[200 pts] \[Not Solved]

> Mr. Belford sucks, is he hiding something....\
> Author: d3vnu11

{% file src="/files/-MdYCjF4YVM7fACYC-On" %}
Report
{% endfile %}

48 teams solved


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://codingmace.gitbook.io/masterward/ctf/2017/sect-2017.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
