n00bz Level 5

Hacking for n00bz – Level 5

For level 5, we get a page with an infinite pop-up that says “hacker!!”.

n00bz Level 5

Upon checking the JavaScript on the page using Firebug or the inbuilt developer tools on any browsers, you will see that is is an infinite loop,

for(;;){ alert(‘Hacker!!!’); }

In the line right after the above JavaScript, there is an image of “aliens.jpg” which is definitely not meant to be seen by us since they have setup an infinitely loop right above this line.

n00bz Level 5

With an image, we could now run it through a Steganography decoder. Reading through various forums, many people recommended the Steghide software, but I did it using an online tool called the Steganographic Decoder, and the following is the output,

01101001011011100110011001101111011100110110010101100011010111110110011001101100011000010110011101101001011100110101111101110011011101000110010101100111011000010110110001101001011001010110111001110011

This long string of 1’s and 0’s is obviously a binary code. Upon decoding it using a Binary decode tool, we are the flag for level 5, “infosec_flagis_stegaliens”.

Back to write-up list for InfoSec Institute CTF #1: Hacking for n00bz

n00bz Level 4

Hacking for n00bz – Level 4

For a bounty of $40, level 4 shows a very cute cookie monster image with the text “HTTP means Hypertext Transfer Protocol”.

When hovering your mouse over the image, it gives a pop-up text saying “stop poking me”. Now, that is quite a hint. The pop-up message is trying to tell us that there is nothing with the image, to obtain the flag, we should focus on HTTP’s element itself.

n00bz Level 4

So, who is in the image? Cookie monster? Let’s look at the list of cookies on the page… bingo! There is a suspicious looking cookie, called fusrodah.

People who have played the game “Elder Scrolls V: Skyrim” would know what it is. “Fus Ro Dah” is one of the shouts (it’s like the spells/magic in other games) that can be performed in the game, it basically sends out a shockwave to its target to push them back or make them fall. It have since become an internet meme.

n00bz Level 4

At this point, logically speaking, we have to do some trial and error to see what does “vasbfrp_syntvf_jrybirpbbxvrf” means. However, since the string of text only contains alphabets, it is probably not encoded using an advanced method.

After performing a very simple ROT13 decryption using the ROT13 tool, there we go “infosec_flagis_welovecookies”.

Back to write-up list for InfoSec Institute CTF #1: Hacking for n00bz

n00bz Level 3

Hacking for n00bz – Level 3

In level 3, we see a QR code with a progress bar for a bounty of $30.

n00bz Level 3

At first thought, the hint to where the flag could be hidden would be inside the QR code. However, there is a progress bar being placed right below the QR code. However, after checking the code behind the progress bar, it seems to be nothing but a distraction to mislead people.

To check whether anything is being hidden behind the QR code, you can use your phone (there is many apps in Google Play and Apple App Store that allows you to scan for QR code), or if your prefer using your web browser, you can try using this QR code decoder instead. Personally, I prefer to do it using my browser since I don’t like to switch between my computer and my phone to pass messages.

Viola! The QR code decoder has returned the following raw text, which is essentially a string written in Morse code.

.. -. ..-. --- ... . -.-. ..-. .-.. .- --. .. ... -- --- .-. ... .. -. --.

Using a Morse code translator, we are able to translate the string of text into the flag for level 3 – “INFOSECFLAGISMORSING”.

Back to write-up list for InfoSec Institute CTF #1: Hacking for n00bz

n00bz Level 2

Hacking for n00bz – Level 2

In level 2, we see a broken image with an accompany text,

It seems like the image is broken..Can you check the file?

n00bz Level 2

By opening the image in a new tab, it displays the image in this link.

n00bz Level 2

Since it don’t seem like a valid image, let’s look around to see if there is other information hidden in the page source (again) or in the scripts. Apparently, there is a hidden script, “aW5mb3NlY19mbGFnaXNfd2VhcmVqdXN0c3RhcnRpbmc=”, you can easily identify it using Firebug, a very popular developer plugin in the Firefox web browser.

n00bz Level 2

Well, since there is a “=” symbol appended to the end of the string, based on experience, it is most likely a base64 encoded string. You can use any decoder tool to perform base64 decoding to identify the content, personally, I like to use Hackbar, also a plugin in the Firefox web browser.

After performing base64 decoding, you will get the flag, “infosec_flagis_wearejuststarting”.

Back to write-up list for InfoSec Institute CTF #1: Hacking for n00bz

n00bz Level 1

Hacking for n00bz – Level 1

I mentioned about the Infosec Institute CTF challenges in one of my previous post, let’s get started with a bit of write up.

When first entered level 1, it shows a picture of Yoda with the following text,

May the source be with you!

n00bz Level 1

Fair enough, the hint was pretty obvious, asking us to view the page source.

n00bz Level 1

There, we have it in the very first line, the flag is “infosec_flagis_welcome”.

Back to write-up list for InfoSec Institute CTF #1: Hacking for n00bz