# PACTF 2018

## A Picture is worth a thousand words - Category \[10 pts] <a href="#a-pic-worth-1000-words" id="a-pic-worth-1000-words"></a>

> Apparently there is something hidden in this image…\
> Hint: You’re looking for text—how might you look at the text of the image?

{% file src="/files/-MdsuPcwcwMRCJ7axpKW" %}
Image
{% endfile %}

In the Exif data of the file, the artist tag contains the text flag\_is\_DjKVIXXQRZZrrAd

**Flag: DjKVIXXQRZZrrAd**

## Let Me In - Category \[20 pts] <a href="#let-me-in" id="let-me-in"></a>

> You received this account.rar file, but it is ‘protected’ under a password. Can you break in?
>
> Hint:  Something tells me the user might not be using complex passwords…

{% file src="/files/-MdsunRz6obP0akx8m0e" %}
Account.rar
{% endfile %}

When you try and open the rar file it is locked so I went to use John the ripper to create a hash of the file\
`rar2john rarfile > output.hash`\
then cracked the password with the default wordlist of rockyou\
`john --format=rar output.hash` \
It cracked it very quick as the password was just 123456 and inside was a file "flag.txt"

**Flag: rgSueiMYehWJSZPZr**

## Bad Melody - Category \[30 pts] <a href="#bad-melody" id="bad-melody"></a>

> Our musician friend Martin recently bought a melody pack containing different melodies recorded in MIDI format. He hoped to use them in his electronic music tracks and then pretend that he was the person who actually wrote them. He spent a solid hundred dollars, but the website selling sample packs fooled him! Instead of 10 wonderful melodies, he only received one MIDI file. It sounded awful, and Martin quickly noticed why!
>
> Can you notice why?
>
> See for yourself: melody.mid

{% file src="/files/-MdrT69DgWDGaymFLuUc" %}
melody.mid
{% endfile %}

As it says in the description that it is an midi file, I found Audacity and just opened it up which showed the flag.

![](/files/-MdsyEwm6yKJPBxh2bBr)

**Flag: WRITE YOUR OWN MUSIC**


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://codingmace.gitbook.io/masterward/ctf/2018/pactf-2018.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
