# TAMUctf 19

## Crypto

### -.- \[100 pts]

> **Description**
>
> To 1337-H4X0R:
>
> Our coworker Bob loves a good classical cipher. Unfortunately, he also loves to send everything encrypted with these ciphers. Can you go ahead and decrypt this for me?
>
> Difficulty: easy

{% file src="<https://980792987-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Md9Bzo_DCKomMglV10a%2F-MevxjauTIN4bcoPyTN-%2F-MevyzwgcBoZGgwkQOKx%2Fmorse.txt?alt=media&token=b7f49b54-0881-480c-810a-3d0ae4fbb18c>" %}
MorseCode
{% endfile %}

**Solution**

We did this sequence of replacement\
\- > #\
dah > -\
dit > .\
di > .\
\# > \
Then input to CyberChef which combined from hex gets the text

Wp*lXtGQ8e8qnmMYU*svFHkjIt*RQ\&JpZvjm!%%KDkfp#^N9fk4dU4lB3rToT0PZQmCQEKYB4ZMv*!Fk8l%bjqlPMfIGma%%FzG gigem{C1icK\_cl1CK-y0u\_h4v3\_m4I1} uv4vzKZt4yomiDShLm8QEFnUtwJ\@NuOYfX&8u\@Gn!1%Tqv0VcRzV!j!vuup8BjdNIqE5w#$%V4UZOYZ2z7T25t7\&xL\@WO7410QI

**Flag: gigem{C1icK\_cl1CK-y0u\_h4v3\_m4I1}**

## Misc

### Who am I? \[100 pts]

> **Description**
>
> What is the A record for tamuctf.com? (Not in standard gigem{flag} format)
>
> Difficulty: easy

**Solution**

`ping tamuctf.com`

**Flag: 52.33.57.247**

### Who do I trust? \[100 pts]

> **Description**
>
> Who issued the certificate to tamuctf.com? (Not in standard gigem{flag} format)
>
> Difficulty: easy

**Solution**

See the certificate in the browser

**Flag: Let's Encrypt Authority X3**

## Web

### Not another SQLi Challenge \[100 pts]

> **Description**
>
> <http://web1.tamuctf.com>

**Solution**

As for most I captured the flag through BurpSuite and used the code username=admin%27%23\&password= as the payload.

**Flag: gigem{f4rm3r5\_f4rm3r5\_w3'r3\_4ll\_r16h7}**
