Post

Incognito 5.0 CTF 2024 - Writeups

This is a writeup for all OSINT and cryptography challenges from Incognito 5.0 CTF 2024. A quick CTF to practice my OSINT and cryptography skills. Overall, I was very impressed with their OSINT challenges, they allowed me learn new set of OSINT tools.

Don’t panic [OSINT]

Question: One of our agent was able to get the username “GlitchyBagel42”, you know what’s next 🤷‍

Flag: ictf{p1x3L_hUnT3R_My5t3ry}

We are given a username to investigate. Using an online username lookup tool to search up a username on different platforms.

name1

Checking the results on Google, there seems to be 0 results. However, checking the results of Bing, a Twitter account can be found associated with the specific username.

name2

name3

Analyzing the Twitter account, the first clue that can be obtained was the encoded text on the account’s bio. Decoding it provides a pastebin URL.

name4

name5

However, the pastebin data seems to be password-protected. Finding more information on getting the password, several other clues can be obtaind from the account’s tweets. It mentioned something about names unlocking secrets. This highly suggests that Pixel Quokka was the password for the pastebin data.

name6

name7

Unsurprisingly, the password was indeed correct and the pastebin data can be obtained for further analysis. Inside the pastebin data was several variations of the flag. Checking the tweets again, one of them mentioned something about the word Mystery being able solve miseries. This suggests that the flag had the word Mystery but obfuscated in some way.

name8

Filtering the lines with ‘My’, the only flag that has the worrd My5t3ry can be obtained.

name9

Email Tracker [OSINT]

Question: Our team discovered the user behind “bbburn216@gmail.com”, enjoys badminton with a friend who shared a secret in their coding activities. We’re eager to uncover what it is.

Flag: ictf{L0v3_F0r_C0d3_Vi4_M41L}

We are given a Gmail account to investigate. Using GHunt, details about a specific Google account can be extracted if a Gmail account was provided to the tool.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
└─$ ghunt email bbburn216@gmail.com 

     .d8888b.  888    888                   888    
    d88P  Y88b 888    888                   888    
    888    888 888    888                   888    
    888        8888888888 888  888 88888b.  888888 
    888  88888 888    888 888  888 888 "88b 888    
    888    888 888    888 888  888 888  888 888    
    Y88b  d88P 888    888 Y88b 888 888  888 Y88b.  
     "Y8888P88 888    888  "Y88888 888  888  "Y888 v2

             By: mxrch (🐦 @mxrchreborn)
       Support my work on GitHub Sponsors ! 💖
    

          > GHunt 2.1.6 (BlackHat Edition) <         

🎉 You are up to date !

[+] Stored session loaded !
[+] Authenticated !

[!] You have this person in these containers :
- Profile
- Contact
🙋 Google Account data

[-] Default profile picture
[-] Default cover picture

Last profile edit : 2024/03/30 11:31:42 (UTC)

Email : bbburn216@gmail.com
Gaia ID : 104752872827702401548

User types :
- GOOGLE_USER (The user is a Google user.)

📞 Google Chat Extended Data

Entity Type : PERSON
Customer ID : Not found.

🌐 Google Plus Extended Data

Entreprise User : False

🎮 Play Games data

[+] New token for playgames has been generated

[-] No player profile found.

🗺 Maps data

Profile page : https://www.google.com/maps/contrib/104752872827702401548/reviews

[Statistics]
Reviews : 1

[Reviews]
[+] Average rating : 5/5

[-] No costs data.

Target's locations preferences :

🏨 Generic [1]
- Badminton court (1)
                                                   
[+] Probable location (confidence => Very low) :
- ?, India

🗓 Calendar data

[-] No public Google Calendar.

The output shows that the user has left a review on Google maps. Analyzing the review, it seems that Barabara Blackburn (the user) was playing badminton with his friend Mark.

name10

Spending countless hours on finding Barabara Blackburn on different social platforms, nothing of interest can be found. However, when checking the reviews of the location, a review from Mark can be found.

name11

Now we have another username markjohn777 to investigate, we can use the similar online username lookup tool to search up his username on different platforms. Google and Bing seems to show his social media accounts that were either deactivated or deleted already. However, checking out Yandex, his CodeForce account can be found.

name12

Remembering about the description, it mentioned something about Mark leaving a secret during his coding sessions. Hence, the flag was bound to be inside his CodeForce account. Analyzing his code submissions, the last submission with ID 251004159 has the flag.

name13

Easy [Cryptography]

Question: Delve into binary operations, where math meets magic

Flag: ictf{X0R_Br0ught_Y0u_H3r3?}

We are given an encoded text to investigate. The description mentioned something about binary operations, this highly suggests XOR. Since a XOR key was not provided, brute forcing the ciphertext easily provides the flag.

key

Di Dah [Cryptography]

Question: Beneath flickering lights, echoes play their games, In voltage’s fluctuations, telegraph’s silent claims.

Flag: ictf{M0rs3_4nd_D1D@h_Wh1z3r3r}

We are given an encoded text to investigate. Just by looking at the text, it seems like it was related to morse code.

1
dah-di-di-di-dit dah-dah-dah-dah-dit dah-di-di-di-dit di-di-di-dah-dah dah-dah-di-di-dit di-di-di-di-dah dah-di-di-di-dit dah-di-di-di-dit dah-dah-di-di-dit dah-di-di-dit di-di-di-di-dah dah-di-dit di-di-di-dah-dah dah-dah-dah-dah-dah dah-dah-di-di-dit di-di-dah-dah-dah dah-dah-di-di-dit di-di-di-dah-dah di-di-di-dah-dah di-di-di-dah-dah di-di-di-di-dit di-di-dah-dit di-di-di-dah-dah di-di-di-di-dah dah-di-di-di-dit dit dah-di-di-di-dit di-di-di-di-dah di-di-di-di-dit di-di-dah-dit di-di-di-di-dah di-di-di-di-dah di-di-di-dah-dah di-dah-dah-dah-dah di-di-di-di-dah di-di-di-di-dah di-di-di-di-dah dah-dah-dah-dah-dah dah-di-di-di-dit dah-dah-dah-di-dit di-di-di-di-dit di-di-dah-dit di-di-di-di-dit dah-dah-di-di-dit dah-di-di-di-dit dah-dah-dah-di-dit di-di-di-dah-dah di-dah-dah-dah-dah dah-dah-di-di-dit di-dah di-di-di-dah-dah di-di-di-dah-dah dah-dah-di-di-dit di-di-dah-dah-dah di-di-di-dah-dah di-di-di-dah-dah dah-dah-di-di-dit di-di-dah-dah-dah dah-dah-di-di-dit dah-di-dit dah-dah-dah-dah-dah di-dah

Searching online about dah-di-dit, a morse code manual can be found to help translate the morse code manually. Mapping the morse code with the ASCII characters, a hex encoded string can be obtained which was the flag.

code1

Marathon [Cryptography]

Question: How long you can go?

Flag: ictf{D3c0d3_4ll_7h3_W@y}

We are given an encoded text to investigate. No joke, the flag can be directly obtained after decoding with various methods.

1
3430203633203639203538203664203763203334203731203366203362203562203731203262203332203366203231203366203564203662203362203365203538203635203330203435203634203739203239203236203530203634203566203363203333203331203532203564203530203265203634203239203533203632203539203535203763203634203632203462203362203533203731203261203733203333203563203430203436203435203461203238203262203466203733203434203539203533203634203663203536203331203334203233203539203565203233203365203537203535203634203438203261203362203635203336203363203634203464203664203666203436203332203236203431203238203436203338203737203533203363203263203461203335203737203239203535203663203463203665203233203333203732203361203236203363203364203436203764203331203731203233203331203530203562203538203439203532203438203366203539203330203632203331203738203261203530203361203231203631203734203536203537203535203637203362203264203531203365203533203633203334203430203733203762203565203639203263203365203439203737203430203236203736203331203639203733203330203665203334203436203536203363203239203337203631203633203339203566203439203265203265203764203432

The whole decoding process can be found within this CyberChef link.

This post is licensed under CC BY 4.0 by the author.