01

Welcome To CyberMaterial

Welcome ? points

Challenge Description

OLD CTF

Solution

Flag can be found in “#ctf-support” channel description in the discord server.

Flag

CM{Subscribe_TO_CyberMaterial}
02

FeedBack Challenge

Welcome ? points

Challenge Description

OLD CTF

Solution

Flag can be found in final feedback Google Form.

Flag

CM{HApPy_EnDiNg}
03

Rev is easy!

Reverse ? points

Challenge Description

OLD CTF

Solution

Provided a file with no extension. Adding “.txt” , we can see its contents. Flag can be found in it.

Flag

CM{ReV_i5_Easy}
04

Who’s Really Dunked?

Reverse ? points

Challenge Description

OLD CTF

Solution

Provided Cipher text, convert it with Base92. Then again with ROT47. We get a JS code and tracing it flag is found.

Flag

CM{News_Alerts_Incident}
05

The Key to Nowhere

Reverse ? points

Challenge Description

OLD CTF

Solution

Given with a file with no extension, when we convert it to “.txt” we can see its content. Inside it we can see “PyInstaller” letting us know it is a file complied by PyInstaller.

1
1

We can decompile the file with https://github.com/extremecoders-re/pyinstxtractor .

We get a “.pyc” file, we can convert that file to get the original Python code.

2
2

Flag

CM{R3V_D4T4_H3rO}
06

Go Crazy!!

Reverse ? points

Challenge Description

OLD CTF

Solution

Provided a file with no extension. Adding “.txt”, we can see its contents. The flag is found when we remove the null values.

3
3

Flag

CM{5O_MuCh_7un}
07

Green Flags

Crypto ? points

Challenge Description

OLD CTF

Solution

The given flags in the picture represent the flag, the flags are from International maritime signal flags.

Flag

CM{NATO_SIGNALS}
08

Digital Black Hole

Crypto ? points

Challenge Description

OLD CTF

Solution

Provided a file with “.PNG”, converting it to “.txt” , we can see its contents. It consists of binary numbers, converting it to ASCII and to numbers we again get binary. Repeating the process we get a ciphered text. We convert it with Base62 to retrieve the flag

Flag

CM{N0t_64_Alway5}
09

Dear Trithemius,

Crypto ? points

Challenge Description

OLD CTF

Solution

Provided a LoveLetter and a Go code, there is a encrypted message in the love letter. By writing a python code to reverse the Go code we can retrieve the flag.

Flag

CM{LOVE_U_TRITHEMIUS}
10

I can't see it

Crypto ? points

Challenge Description

OLD CTF

Solution

We convert the given Braille text to retrieve the flag

Flag

CM{TH15_BR41LL3_1S_43AL}
11

My Secret X 'V' My Secret Y

Crypto ? points

Challenge Description

OLD CTF

Solution

Provided Cipher Text, we can convert it with XOR Cipher to retrieve the flag

Flag

CM{Th353_x0R_4r3_cR4zY}
12

We're rolling

Web ? points

Challenge Description

OLD CTF

https://ctf.cybermaterial.com/robots.txt

Solution

Flag can be found in robots.txt https://ctf.cybermaterial.com/robots.txt

Flag

CM{RoOL_&_ROoL}
13

A Shakespearian Tragedy

Web ? points

Challenge Description

OLD CTF

Solution

Provided a URL and told there were hidden doors. Used DIRB to find active links and found.

4
4

There was a hidden cipher text, we can convert it with Base58 to retrieve flag.

Flag

CM{i_c4me_i_s4w_i_c0nqu3r3d}
14

The Shell Shocker

Web ? points

Challenge Description

OLD CTF

Solution

Provided a URL and found the script.js in it. In it, it had a API url with POST requests for commands.

5
5

Flag

CM{c0mMAnd_INjEc7iON_f7w}
15

Drunken website

Web ? points

Challenge Description

OLD CTF

Solution

Provided with a URL, it had a button redirecting to the homepage. When we inspect the page we can find a hidden URL. When we Inspect the that page we can locate the flag

6
6

Flag

CM{W3bs1t3_15_5hi7}
16

Bidden Funhouse

Web ? points

Challenge Description

OLD CTF

Solution

Provided a URL, using the SSTImap tool I did Server-Side Template Injection. I was able to find the flag in app.py

Flag

CM{Y0u_4r3_a_r3A1Ly_go0D_nINj4}
17

CyberMaterial’s Cyber-Sleuth Newsletter

Osint ? points

Challenge Description

OLD CTF

Solution

It mentions about a newsletter and it mentions about “A Hacker leaked unreleased Netflix content”. The flag can be found in a CyberMaterial Linkedin post.

7
7

Flag

CM{4rCan3_4nD_h34rTst0pP3r}
18

APT Intel Hunt

Osint ? points

Challenge Description

OLD CTF

Solution

It mentions about “Andariel” and “Lazarus”. There is an article about this topic.

https://cybermaterial.com/andariel-lazarus-group-threat-actor/ In between of all the hyperlinks there is a link to a pastebin https://pastebin.com/QUwg950y

In between of all the text there are random letters & numbers, grouping all of them we get a ciphertext. We can convert it from HEX to ASCII to normal.

Flag

CM{4pT_Gr0uP5_L4z4Ru5}
19

Meet me here !

Osint ? points

Challenge Description

OLD CTF

Solution

8
8

In the background we can see a subway and it looks like a petrol station. His TShirt says “Cover6 Solutions” so it must be near it. Cover6 Solutions is located in “Arlington, Virginia” as per their Linkedin so we if overlap them and cross verify with the subway we can find the road it is located in.

9
9

Flag

CM{Laurel_Hill_Rd}
20

Catch me !!!

Osint ? points

Challenge Description

OLD CTF

Solution

10
10

By looking at this we can an Icon. By checking Google Maps Icons we can determine that it is a Museum. On the left we can slightly read the road name “Stewart ave”. By checking the museums on Stewart ave we can find the museums in the picture

11
11

Flag

CM{The_Mob_Museum}
21

Oops! Where Did I Hide the Flag?

Osint ? points

Challenge Description

OLD CTF

Solution

The flag is in the description of video - https://youtu.be/iM4vtqkhmIo

Flag

CM{SuB5cR1b3_t0_0ur_Y0u7ub3_Ch4nN3L}