// A NahamCon CTF 2022 Challenge...
Hey Hackers! The following is a write up for The Balloon challenge from NahamCon CTF 2022. I will attach a video walk through below in case if you are more of a visual learner.
// Starting Off:
We are given the following prompt.
it's basically just a deflated balloon - spin it around, _inflate_ it, and the prize is inside! wiieh://ephitqxc.rdb/tAQtEOTn
The encrypted text within the prompt appears to be a link. The text starts with what looks like the HTTPS protocol.
W | I | I | E | H |
H | T | T | P | S |
Because I see the repeating characters within the same indexes, I assume that the cipher is using the Caesar Cipher. Because the cipher only has 26 possible keys, it s very easy to brute force. I decide to use the Codex Project to break the cipher.
// But_What_Is_It:
Using a shift key of 15, we decrypted the text and found a paste bin link.
We obtain the following RAW paste data.
D0Up0IZUnnnnnnnnnnnnnnnnnnnUU5nnnnnn3SUUnUUUwCiudIbEAtwwwEt33GpDDsGwG03sDDtwtsGpDDtt33333www03333GDfBDKWCkOUYYmCEisKYSeMucMSEUKYEcMSemiYuyeo4
// Inflating The Balloon:
The original prompt tells us to _inflate_, so out of curiosity I search "inflate" in Cyber Chef. I find a RAW Inflate selection and run it on our RAW Pate Data. Cyber Chef inflated the text and got our flag.
Thanks for reading, and as always,
Happy Hacking!
// Socials:
© 2022 by Cosmodium CyberSecurity LLC
Comentarios