Vulncon CTF — maze

Trevor saudi
3 min readDec 20, 2020

--

Took part in Vulncon CTF this weekend where our team settled for 34th place out of 442 teams. Diving into the first web challenge -maze(easy category).

From the hint we are told we can use gobuster. So I did some directory bruteforcing with the tool of my choice -dirsearch :)

Our tool picks up an interesting directory /projects/

27 is my lucky number… a hint maybe? Viewing the source of the page, we get more interesting information

Accessing the image that has been commented out gives us this QR code.

Scanning this gives the word. “hello”. Since the image was named “image-0.png” I tried viewing “image-1.png” and got another image. So this means we have multiple images which gives a string after being scanned. From the /projects/ directory the hint given tells us that we have 27 images in total.

I used wget to recursively download all images

So now, we can write a small python script to decode all the QR codes.

This gives us the following sentence

Performed more analysis on image 13

We get an interesting string at the Creator tag. Decoding with basecrack we get a rotated string

Decoded with ROT13 to get the flag.

--

--

Trevor saudi
Trevor saudi

No responses yet