Skip to content

Commit 47ffa30

Browse files
committed
more vishwa writeups
1 parent 575dc46 commit 47ffa30

File tree

20 files changed

+83
-0
lines changed

20 files changed

+83
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: Flames
3+
date: 2025-05-29
4+
categories: [Capture The Flags, VishwaCTF 2025]
5+
tags: [ctf, vishwactf, web, writeups]
6+
description: VishwaCTF 2025 Flames Challenge
7+
---
8+
9+
> Challenge description:
10+
>
11+
> Find Your True Love <3
12+
{: .prompt-info }
13+
14+
Alrighty, so we have a web application to poke at, let's see what we have.
15+
16+
![home page](/assets/img/vishwactf-2025/flames/image0.png)
17+
18+
Looks like a love calculator that takes in two names and "determines" how compatible the two are. Let's see how it holds up against SQL injection.
19+
20+
![the payload](/assets/img/vishwactf-2025/flames/image1.png)
21+
22+
With this payload, all I am attempting to do is establish the version of SQL that is being used. Not trying to exfiltrate any user data at this point.
23+
24+
![the response](/assets/img/vishwactf-2025/flames/image2.png)
25+
26+
Hm, it looks like it might not have worked. Either that or the names of our two lovebirds just got thrown into the database, so let's check out the `Famous Love Stories` to see if anything happened there.
27+
28+
![the flag??](/assets/img/vishwactf-2025/flames/image3.png)
29+
30+
Huh, they probably just used a regex for SQL-like statements? This is a confusing challenge, albiet an easy one.
31+
32+
FLAG: `VishwaCTF{SQL_1nj3ct10n_C4n_Qu3ry_Your_He4rt}`
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: Echoes of the Unknown
3+
date: 2025-05-31
4+
categories: [Capture The Flags, VishwaCTF 2025]
5+
tags: [ctf, vishwactf 2025, steganography, writeups]
6+
description: VishwaCTF 2025 Echoes of the Unknown Challenge
7+
---
8+
9+
10+
> Challenge description:
11+
>
12+
> Not everything is heard—some things must be seen.
13+
{: .prompt-info }
14+
15+
FLAG: `VishwaCTF{CR4CK3D_7H3_C0D3}`
16+
17+
Okay, so for this challenge we we're given a `wav` file, full of just some beeps. Whenever I'm doing a challenge and I get a audio file full off just beeps, I like to assume that it's probably morse code. Thankfully, there are online tools that can take in audio files with morse code and play them back to you. I like to use [this tool](https://morsecode.world/international/decoder/audio-decoder-adaptive.html) for decoding audio files with morse code. However, the file that we are given is much to slow, so you can use your software of choice to speed the audio up. Once we get that done, all that's left is to plug it into the site again and let it to its thing.
18+
19+
![the morse decoded](/assets/img/vishwactf-2025/echoes/image0.png)
20+
21+
FLAG: `VishwaCTF{CR4CK3D_7H3_C0D3}`
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
title: QuadRant
3+
date: 2025-06-03
4+
categories: [Capture The Flags, VishwaCTF 2025]
5+
tags: [ctf, vishwactf 2025, steganography, writeups]
6+
description: VishwaCTF 2025 QuadRant Challenge
7+
---
8+
9+
> Challenge description:
10+
>
11+
> Four pieces of a forgotten code lie before you. Each fragment holds a part of a greater whole, but the puzzle is incomplete. Your task: find the pattern, align the pieces, and unlock the final code. Once the pieces fall into place, scan what you’ve created to uncover the secret within.
12+
>
13+
> Let the search begin. {: .prompt-info }
14+
15+
For this challenge we were given 4 different images, each one is part of a QR code. I'm assuming that the QR code is either the flag or a clue to look at the next step of the flag. The flags are as follows:
16+
17+
![quadrant 1](/assets/img/vishwactf-2025/quadrant/flag1.png)
18+
![quadrant 2](/assets/img/vishwactf-2025/quadrant/flag2.png)
19+
![quadrant 3](/assets/img/vishwactf-2025/quadrant/flag3.png)
20+
![quadrant 4](/assets/img/vishwactf-2025/quadrant/flag4.png)
21+
22+
Let's use GIMP to piece the images together into a single QR code.
23+
24+
![The reconstructed QR code](/assets/img/vishwactf-2025/quadrant/image0.png)
25+
26+
So an interesting thing about QR codes is that you do not need the entire code to be able to get the data that is on it. They do have some redundancy built into them, and while the math behind that is too high level for this writeup, [the Wikipedia article on QR code's](https://en.wikipedia.org/wiki/QR_code#Error_correction) has an interesting section on the error correction capabilities of them.
27+
28+
Anyway, if we scan with a QR code reader, it gives us the flag!
29+
30+
FLAG: `VishwaCTF{aG9lMTIzNDU2c3Bhc3NhZ2U=}`
3 Bytes
Loading
-309 Bytes
Loading
-108 Bytes
Loading
11 Bytes
Loading
1 Byte
Loading
62.6 KB
Loading
53.1 KB
Loading

0 commit comments

Comments
 (0)