DownUnderCTF 2021
The Introduction
For this one, I ran the netcat command, and then waited for the output to finish, and then I got the flag:
Retro!
I downloaded the file, and ran strings
on the file, and found the flag:
Who goes there?
For this one, I was looking for the domain registration for the website to get as much information as I can. I found the following on a WHOIS Lookup Domain website:
The flag was the Phone number in DUCTF{Phone_Number} format.
Get Over it!
We get an image for this one:
I ran it in tineye and got no result. I then ran it on Yandex, and I saw a picture that looks like the one I had gotten from the CTF:
The bridge seems to match this image. I then used https://inflact.com/profiles/instagram-viewer/ to view the image from the poster. I needed to view the tags:
The tag that helped the most was the saintluciabrisbane. I Google-ed "saint lucia brisbane bridge" and got the following:
I went on the Wikipedia page for the first page and got the following:
The bridge does look the same as the image. I then tried the flag multiple times, but was not able to get it with the size of 390. I then googled "Eleanor Schonell Bridge size", and got the following:
The flag was DUCTF{Eleanor_Schonell_Bridge-185m}
Discord
For this problem, I went to the discord of the CTF and found the flag:
Sharing is Caring
For this one, my first step was to run the username in sherlock
:
I did not find anything important on Pinterest or Twitch, but I got the following on Steam:
I then ran the other username in sherlock as well:
The Github portfolio did not really have anything, other than a repository. The Reddit account had some posts on it. One of them stood out to me:
Looking closer at the picture, I noticed this:
I knew it wasn't an IP Address, so my assumption was that it was a MAC Address. When I entered it on Wigle.net
I got only one result:
The flag was the street name.