Skip to main content

H@cktivityCon 2021

Tsunami

For this one we get an audio file, I opened the file in audacity and viewed the audio in the Spectogram view:

Bass64

The file leads to this:

Only when you zoom out, you then see actual string:

I then entered this on the website (base64decode.org) and ended up finding out the following:

Pimple

For this challenge, we get a file format meant for GIMP. Running file Pimple gives us the following: pimple: GIMP XCF image data, version 011, 1024 x 1024, RGB Color. I then opened the file in gimp, and after just browsing around, I found this:

Six Four Over Two

For this problem, we are given a file with the following information:

My mentality was that 64/2 or "six four over two" is 32. I ran the command echo "EBTGYYLHPNQTINLEGRSTOMDCMZRTIMBXGY2DKMJYGVSGIOJRGE2GMOLDGBSWM7IK" | base32 -d and this led me to the flag: flag{a45d4e70bfc407645185dd9114f9c0ef}

Confidentiality

For this challenge, we are sent to a webpage:

It seems that you can view any file and see it it exists:

My assumption was that in the backend ls was running. So I had to find a way to use one command to get the flag. I first tried just a ; and this is what it showed me:

All I had to do now, was to print the contents of the file. I ran ; cat flag.txt and got the flag:

2EZ

For this question we get a file with a incorrect header:

I changed the header to be ff d8 ff e0. I also changed the file from 2ez to 2ez.jfif. I then got the flag: