Mock – CTF WriteUp





64/2

10

Hmm... Let the fun begin. D3v1LaL is here with his Cipher Bag. Here you go with your first challenge. Cipher: NVXWG233NRSXIX3UNBSV64DBOJ2HSX3CMVTWS3T5

This is a base32 cipher. The challenge name too tell us that it is a base32. 64/2 = 32 . Use https://cryptii.com/ to decode it.

Flag: mock{let_the_party_begin}

64/1

10

This one is totally BASED on previous. Cipher: bW9ja3tiYXNlZF9vbl93aGF0P182NH0=

Similarly this is base 64. Use https://cryptii.com/ to decode it.

Flag: mock{based_on_what?_64}

BASED

20

Haha.. This one is going to be tricky. But its worthy for later Cipher: 'D/Wp"HV%RGBl%Tm9jqgK?W2)fARASYF^ILVH!`jZ?W:]M?U\jC?TKWa'

This is what base 85 looks like. Use https://cryptii.com/ to decode it.

Flag: mock{I_Will_Make_Sure_You_Cry_At_The_End_:)}

Mixture

20

Okay...This is last of its type. Cipher: MJLTS2TBGN2GYYTNHEYVUMTIMZRDEWTGLJLUM6TFKY4WUYKHIZZWER2WOVNDEVT2MZIT2PI=

As the name suggests it’s a mixture. So at first decode it with base32 followed by base64. Use https://cryptii.com/ to decode it.

Flag: mock{enough_of_easy_challenges}

Merry Go Round

25

Damn..!! Those 13 rounds were hillarious. Cipher: zbpx{ebhaq_ebhaq_vf_EBG_Lbh_xarj_vg_VZCERFFRQ}

As description gives a hint about 13, we got that it is ROT13. Use https://cryptii.com/ to decode it.

 

0-9 A-F

25

Well...Lets go to the basics. Cipher- 6D 6F 63 6B 7B 61 6C 48 45 58 61 7D

The description and the cipher gave us a hint that it is Hexadecimal. Use https://v2.cryptii.com/hexadecimal/text and get the flag.

Flag: mock{alHEXa}

dustBIN

25

Cipher- 01101101 01101111 01100011 01101011 01111011 01001001 01110100 01110011 01011111 01100001 01101100 01101100 01011111 01100001 01100010 01101111 01110101 01110100 01011111 00110000 01011111 01100001 01101110 01100100 01011111 00110001 01111101

The cipher tells us that it is encoded in base 2 i.e. binary. Use https://v2.cryptii.com/binary/text to decode it.

Flag: mock{Its_all_about_0_and_1}

bitTEN

25

Cipher: 109 111 99 107 123 83 48 109 51 116 104 49 110 103 95 116 48 95 116 104 51 95 98 52 115 51 95 49 48 125

The chall name says something about ten. This is decimal. Use https://v2.cryptii.com/decimal/text to get flag.

Flag: mock{S0m3th1ng_t0_th3_b4s3_10}

Jumbo Merry Go Round

30

I forgot my count ;( Cipher: qsgo{Tvieglivw_Hsrx_Tviegl_Alex_Xlic_Xiegl}

This is caeser cipher. Use https://cryptii.com/ to decode it. + or – to get the flag.

Flag: mock{Preachers_Dont_Preach_What_They_Teach}

BrainPain

40

Cipher: ++++++++++[>+>+++>+++++++>++++++++++<<<<-]>>>>+++++++++.++.------------.++++++++.++++++++++++++++.-------------------------.++++++++++++++++.-----------------.++++++++.+++++.---------------....++++++++++.++++++++++.-----.+.+++++.-.----.+++++.-----.++++++.--------------.+.+++++++++++++++++++++.

I search about brain cipher and got brainfuck cipher. Use https://www.dcode.fr/brainfuck-language to decode and get the flag.

Flag: mock{brain____isnotsotough}

Symbols?

50

Ever heard of symbols, which can be used in encryption? Your answer will be in format: mock{decodedtext}


I searched about symbol cipher with lines and dot and got a result that it is pigpen cipher. Use https://www.boxentriq.com/code-breaking/pigpen-cipher to get the flag.

Flag: mock{symboliccphrbgn}

DitDah

60

Cipher: -- --- -.-. -.- / -.. .. - ..--.- -.. .- .... ..--.- -.. .. - ..--.- -.. .. - /

Final answer will be in format: mock{---}

Dit dah gave an hint that it is related to Morse code. Use https://cryptii.com/ to decode it.

Flag: mock{dit_dah_dit_dit}

Blaise de Vigenère

70

Cipher- ofaz{Lij_Off_Btgi_Jrg}

I searched about Vigenère and got that it is Vigenère cipher. Use https://cryptii.com/ to decode it.

Flag: mock{Sab_Moh_Maya_Hai}

Marine Team

70

Symbolic ciphers continued in flags :) Final answer in mock{decodedtext} format.


I searched about the flag cipher and got this image on goggle.


Flag: mock{alphacharliebravoengagetheenemy}

Khanjar

90

Flag format: mock{decodedtext}


As the name and the picture says a lot about daggers and swords. So I searched about dagger cipher and got the results.  Use https://www.dcode.fr/daggers-alphabet to get the flag.

Flag: mock{bewareofstvbbersmyfriend}

Linux Trivia 1

5

What command is used to see current working directory? Answer format: mock{command}

Flag: mock{pwd}

Linux Trivia 2

5

What command is used to do normal listing of content inside directory? Answer format: mock{command}

Flag: mock{ls}

 

 

Linux Trivia 3

5

What commad is used to list ALL files including hidden? (Only listing all files) Answer format: mock{command}

Flag: mock{ls –a}

Linux Trivia 4

5

Which file consist users hashed password? Answer format: mock{filepath}

Flag: mock{/etc/shadow}

Linux Trivia 6

5

Which command is used to make new directory?

Flag: mock{mkdir}

Linux Trivia 7

5

How will you see manual page(documentation) of a tool named nmap ? Answer format: mock{command}

Flag: mock{man nmap}

Lets Connect

20

Ever heard of discord?

We are there too. Download and join using this code: https://discord.gg/KPn4qgZ You can look for video related to usage of discord. You will find your flag in announcements channel of Cyberhack group in discord.

Flag: mock{y0u_found_u5}

 


Previous Post Next Post
–>