CSAW CTF Qualification Round 2015 - Recon

Alexander Taylor - 100

http://fuzyll.com/csaw2015/start

CSAW 2015 FUZYLL RECON PART 1 OF ?: Oh, good, you can use HTTP! The next part is at /csaw2015/<the acronym for my university's hacking club>.

If we go to Alexander Taylor's Linkedin profile, https://www.linkedin.com/in/fuzyll you will see that he is the president of Whitehatters Computer Security Club, who's acronym is appended to the URI is:

http://fuzyll.com/csaw2015/wcsc

CSAW 2015 FUZYLL RECON PART 2 OF ?: TmljZSB3b3JrISBUaGUgbmV4dCBwYXJ0IGlzIGF0IC9jc2F3MjAxNS88bXkgc3VwZXIgc21hc2ggYnJvdGhlcnMgbWFpbj4uCg==

Base64 decoding the above string gives us: Nice work! The next part is at /csaw2015/<my super smash brothers main>.

If we do a quick search with Alexander Taylor's nickname, Fuzyll and Super Mario then we find that his nickname is linked with yoshi: http://fuzyll.com/csaw2015/yoshi

We see a picture of yoshi and if we view it in notepad++, we will see the following string.

SAW 2015 FUZYLL RECON PART 3 OF ?: Isn't Yoshi the best?! The next egg in your hunt can be found at /csaw2015/<the cryptosystem I had to break in my first defcon qualifier>

http://fuzyll.com/csaw2015/enigma

CSAW 2015 FUZYLL RECON PART 4 OF 5: Okay, okay. This isn't Engima, but the next location was "encrypted" with the JavaScript below: Pla$ja|p$wpkt$kj$}kqv$uqawp$mw>$+gwes6451+pla}[waa[ia[vkhhmj

var s = "Pla$ja|p$wpkt$kj$}kqv$uqawp$mw>$+gwes6451+pla}[waa[ia[vkhhmj"
var c = ""
for (i = 0; i < s.length; i++) {
    c += String.fromCharCode((s[i]).charCodeAt(0) ^ 0x4);
}

console.log(c);

You will get back: The next stop on your quest is: /csaw2015/they_see_me_rollin: http://fuzyll.com/csaw2015/theyseeme_rollin

CSAW 2015 FUZYLL RECON PART 5 OF 5: Congratulations! Here's your flag{I_S3ARCH3D_HI6H_4ND_L0W_4ND_4LL_I_F0UND_W4S_TH1S_L0USY_FL4G}!

Julian Cohen - 100

https://twitter.com/HockeyInJune/status/641716034068684800

flag{f7da7636727524d8681ab0d2a072d663}

Eric Liang

Unfortunately our team did not finish this challenge, it appears that that they were looking to lead us with hints to: https://ctf.isis.poly.edu/static/archives/2013/competitors/index.html

On this page there is a flag: flag{next_year_was_Team_Wartortle_right_guys?}

Written on September 20, 2015