https://blitz.ctf365.com/
I finally complete my first CTF :D
I think it’s a really easy one but I overthink it a loooot (specially for the last stage who is the easiest in my opinion)
Here’s the link give it a try ! : https://blitz.ctf365.com/
Message me anytime!
Nice suggestion, I’ve tried it now too. Not too hard, but I have to say the second one took some time.
Had to create an account on ctf365 to do this though. I am wondering, when you go to the website of ctf365 you see that it is a 30 day trial and after that you would have to subscribe, for $46 a month. If that is what you have to pay to do future ctf’s there I won’t be doing any more.
I break stuff….. a lot
Message me anytime!
I break stuff….. a lot
Does plans mention anything about CTF’s ? Nop
My account is like 3 months old now and I’m still able to do CTF’s with Free plan ;)
Message me anytime!
It doesn’t look like it’s defined but I’m already enjoying myself on this website pretty funny but I didn’t past that much long time on it ^^'
Try it by yourself let this thread know your opinion.
Message me anytime!
I tried the Blitz CTF and got to the second challenge. I tried a couple of input combinations but didn’t manage to really do anything. Does anyone have any clues or hints that I could use?
There are sites like this that pay you for challenge completion, but only the first person to solve gets paid.
@Elhitch keep trying what you are doing, you will succesd eventually, it just has to be exactly right as they expect it
I break stuff….. a lot
Add me on hackthis
Or speak with me on IRC channel : https://www.hackthis.co.uk/irc/
Try to Ddos me, My ip : 127.0.0.1
Same for me @feuerstein the second challenge definitely took me 60% of the entire time.
@testing935 Means you missing something
Message me anytime!
They closed the challenge before I even managed to properly work on the last one (Never gonna give you a flag one) - can anyone explain what was the trick there anyway?
Here is my folder for this CTF : https://drive.google.com/open?id=1Obob9zIpVFm1EQKq7BKSjIKGF-fH2E6H
You have the image for the last level in if you want it :)
Message me anytime!
Message me anytime!
Since the CTF has finished, here is my little writeup.
https://blitz.ctf365.com/console/
When we start this ctf we are greeted with a shell simulation on a website.
root@BlitzCTF:~$
Lets see what is in the home dir
root@BlitzCTF:~$ ls
README challenge1.txt
First let us see the README file, could some important info in there
root@BlitzCTF:~$ cat README
Check challenge1.txt file.
Maybe you should check it twice.
Hmm not really usefull, although there might be a hint in the last line. Lets check out the challenge text
root@BlitzCTF:~$ cat challenge1.txt
33 64 20 36 37 20 36 61 20 35 39 20 36 61 20 35 61 20 36 64 20 35 39 20 36 64 20 34 65 20 34 34 20 35 61 20 33 35 20 34 39 20 35 37 20 34 65 20 33 34 20 33 30 20 34 33 20 34 65 20 36 63 20 34 32 20 35 34 20 35 39 20 37 34 20 36 33 20 35 34 20 35 61 20 37 38 20 34 35 20 35 34 20 34 63 20 33 31 20 34 39 20 33 32 20 35 39 20 36 62 20 33 31 20 34 33 20 34 64 20 36 61 20 36 38 20 37 61 20 35 39 20 33 34 20 35 31 20 33 32 20 35 39 20 36 61 20 33 39 20 34 33 20 36 34 20 36 63 20 34 61 20 33 33 20 35 39 20 36 63 20 34 65 20 33 33 20 34 63 20 37 34 20 33 39 20 33 32 20 35 39 20 37 35 20 35 35 20 36 61 20 34 65 20 37 61 20 35 39 20 34 37 20 36 34 20 36 61 20 33 35 20 36 39 20 36 35 20 33 30 20 36 63 20 34 37 20 36 32 20 36 39 20 33 39 20 37 39 20 34 63 20 33 36 20 34 31 20 34 38 20 36 34 20 33 30 20 36 38 20 34 37 20 34 39 20 37 36 20 35 32 20 34 38 20 34 39 20 37 36 20 36 34 20 34 35 20 34 39 20 36 38 20 34 64 20 34 38 20 36 34 20 36 38 20 34 61 20 33 33 20 35 61 20 37 35 20 33 39 20 33 32 20 35 31
Looks like hex ascii values, let’s decode this
[root@zifnab]$ echo “33 64 20 36 37 20 36 61 20 35 39 20 36 61 20 35 6 63 20 34 32 20 35 34 20 35 39 20 37 34 20 36 33 20 35 34 20 35 61 20 37 38 20 34 35 20 35 34 20 34 63 20 33 31 20 34 39 20 33 32 20 35 39 20 36 62 20 33 31 20 34 33 20 34 64 20 36 61 20 36 38 20 37 61 20 35 39 20 33 34 20 35 31 20 33 32 20 35 39 20 36 61 20 33 39 20 34 33 20 36 34 20 36 63 20 34 61 20 33 33 20 35 39 20 36 63 20 34 65 20 33 33 20 34 63 20 37 34 20 33 39 20 33 32 20 35 39 20 37 35 20 35 35 20 36 61 20 34 65 20 37 61 20 35 39 20 34 37 20 36 34 20 36 61 20 33 35 20 36 39 20 36 35 20 33 30 20 36 63 20 34 37 20 36 32 20 36 39 20 33 39 20 37 39 20 34 63 20 33 36 20 34 31 20 34 38 20 36 34 20 33 30 20 36 38 20 34 37 20 34 39 20 37 36 20 35 32 20 34 38 20 34 39 20 37 36 20 36 34 20 34 35 20 34 39 20 36 38 20 34 64 20 34 38 20 36 34 20 36 38 20 34 61 20 33 33 20 35 61 20 37 35 20 33 39 20 33 32 20 35 31” | xxd -r -p
3d 67 6a 59 6a 5a 6d 59 6d 4e 44 5a 35 49 57 4e 34 30 43 4e 6c 42 54 59 74 63 54 5a 78 45 54 4c 31 49 32 59 6b 31 43 4d 6a 68 7a 59 34 51 32 59 6a 39 43 64 6c 4a 33 59 6c 4e 33 4c 74 39 32 59 75 55 6a 4e 7a 59 47 64 6a 35 69 65 30 6c 47 62 69 39 79 4c 36 41 48 64 30 68 47 49 76 52 48 49 76 64 45 49 68 4d 48 64 68 4a 33 5a 75 39 32 51
More hex ascii values. The second line from the readme now makes sense
Let’s decode this again
[root@zifnab]$ echo “3d 67 6a 59 6a 5a 6d 59 6d 4e 44 5a 35 49 57 4e 4 39 32 59 75 55 6a 4e 7a 59 47 64 6a 35 69 65 30 6c 47 62 69 39 79 4c 36 41 48 64 30 68 47 49 76 52 48 49 76 64 45 49 68 4d 48 64 68 4a 33 5a 75 39 32 51” | xxd -r -p
=gjYjZmYmNDZ5IWN40CNlBTYtcTZxETL1I2Yk1CMjhzY4Q2Yj9CdlJ3YlN3Lt92YuUjNzYGdj5ie0lGbi9yL6AHd0hGIvRHIvdEIhMHdhJ3Zu92Q
This looks like a base64 encoded string backwards. Lets first reverse it and then try to decode it
[root@zifnab]$ echo “=gjYjZmYmNDZ5IWN40CNlBTYtcTZxETL1I2Yk1CMjhzY4Q2Yj9CdlJ3YlN3Lt92YuUjNzYGdj5ie0lGbi9yL6AHd0hGIvRHIvdEIhMHdhJ3Zu92Q” | rev
Q29uZ3JhdHMhIEdvIHRvIGh0dHA6Ly9ibGl0ei5jdGYzNjUuY29tL3NlY3JldC9jY2Q4YzhjMC1kY2I1LTExZTctYTBlNC04NWI5ZDNmYmZjYjg=
[root@zifnab]$ echo “Q29uZ3JhdHMhIEdvIHRvIGh0dHA6Ly9ibGl0ei5jdGYzNjUuY29tL3NlY3JldC9jY2Q4YzhjMC1kY2I1LTExZTctYTBlNC04NWI5ZDNmYmZjYjg=” | base64 –decode
Congrats! Go to http://blitz.ctf365.com/secret/ccd8c8c0-dcb5-11e7-a0e4-85b9d3fbfcb8
And we have our first flag
https://blitz.ctf365.com/secret_app/1
Moving on, we get a website with login promt
Nothing to see in the source, also no strange cookies that allow manipulation and dirb also didn’t find any hidden directories. Trying sqli also failed at first. This got me bummed for quite some time, but continuing trying with sqli at one point I hit the jackpot
“ or 1=1#
It has to be this exact payload or the challenge won’t work and it will not give anysql errors when trying injection.
Next challenge is
https://blitz.ctf365.com/secret_app/challenge_two
We see the text: You are not authorized to access this page, are you an admin?
Lets inspect the cookies
we see a cookie with the name userRole and the value user, let’s change to admin and refresh the page
Next challenge
https://blitz.ctf365.com/secret_app/challenge_l_ast
Looking at the source we see a comment:
Nothing to see here, check in the back
Let’s take a look at the background image. Nothing to see when just viewing the image, let’s take a look at it a bit deeper.
[root@zifnab]$ strings -16 image.png
The flag is: tCNulsf2F8sZrt0AwPyEvf9JQ2RNlwJgJ6owmnXh
So the flag was hidden in the image.
Let’s enter the flag
And CTF done
I break stuff….. a lot