Post

RITSEC CTF 2025 Writeups

RITSEC CTF 2025 Writeups

This is a wrietups for the forensics challs from ritsec ctf 2025

Forensics

ROPE

Challenge: I overheard some aliens speaking in their native tongue and was roughly able to translate what they were saying. Something about using ropes to get into their scary alien fortress? I dunno…

Points: 100

We are given this image:

foren

Running strings on the image reveals the flag:

1
2
3
 (sirmoncefza㉿localhost)-[~/tools/sirmoncef.github.io]
 └─$ strings assets/posts/rsctf/fortress.png | grep 'RS{'
 RS{s0rry_1_cu7_d0wn_4_tr33_t0_m4k3_th15_im4g3}

flag: RS{s0rry_1_cu7_d0wn_4_tr33_t0_m4k3_th15_im4g3}

INTERCEPTED TRANSMISSION

Challenge:We have intercepted a transmission from the aliens. We believe they were pinging government installations in order to find the locations

Points: 282

we start by analysing the pcap

foren

Analyzing the PCAP file, we notice ICMP ping requests. Using tshark to extract the data (u can use py but i prefer tshark in this exfiltration):

1
2
3
4
$ tshark -r transmission.pcapng -T fields -Y "icmp" -e data | awk '{print $1}' | uniq -d | grep -v "6162636465666768696a6b6c6d6e6f7071727374757677616263646566676869" |  xxd -r -p 


RS{Its_A_Coverup}   

flag: RS{Its_A_Coverup}

Forensics

BANKSMAN

Challenge: Our professor received a report from an unfamiliar student. With his experience, the professor realized that this report was abnormal. He immediately used this file for our research assignment. Let’s analyze whether there is anything mysterious embedded in it!

Points: 471

after Downloading the pdf file ,i tried some analysing and stegno and found nothing so in my previous ctf i discovered the pdfextract tool that help in Extracts various data out of a document (streams, scripts, images, fonts, metadata, attachments)

after running it on the file we got a suspicuios js scriptcontaining a variable with base64-encoded data

in js we can use the Buffer class and the .toString() method to get the decode bytes

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
try {
	setversion();
	var stm = base64ToStream(serialized_obj);
	var fmt = new ActiveXObject('System.Runtime.Serialization.Formatters.Binary.BinaryFormatter');
	var al = new ActiveXObject('System.Collections.ArrayList');
	var d = fmt.Deserialize_2(stm);
	al.Add(undefined);
	var o = d.DynamicInvoke(al.ToArray()).CreateInstance(entry_class);
	
} catch (e) {
    debug(e.message);
}

const decodedString = Buffer.from(serialized_obj, 'base64').toString();
console.log(decodedString) 

then just run the script and we will get the flag

foren

flag: MetaCTF{I_4m_n0t_@m1n3r_1@m_a_b4nk5m4n}

Forensics

PENTEST FORENSICS

Challenge: As a part of an authorized pentest, you captured a memory image of one of the machines in the target network. Use the memory image to extract the Administrator password used to connect to an SMB share. The correct password will be in rockyou.txt. The flag is RS{admin_password}

Points: 493

We are given a memory dump to investigate. We started by scanning the processes with pslist and pstree but found nothing suspicious. Since the challenge mentioned rockyou.txt, we tried hashdump and lsadump to extract hashes for cracking but found nothing .

Next, we performed a file scan and checked the history, where we discovered suspicious PowerShell activity:

After dumping and examining the PowerShell history contents, we observed references to a PCAP file. We extracted this network capture from memory and analyzed it, finding NTLMSSP authentication packets.

Using NTLMRawUnHide to extract hashes from the PCAP, we obtained the Administrator’s NTLM hash. We then cracked this hash using rockyou.txt:

1
hashcat -m 5600 "Administrator::WIN-ETD6TKIFK5E:9290183bc04b5ce1:a99a524637dd6ff10f53f835a6d8a997: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" /usr/share/wordlists/rockyou.txt 
1
2
ADMINISTRATOR::WIN-ETD6TKIFK5E:9290183bc04b5ce1:a99a524637dd6ff10f53f835a6d8a997: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:pickles

flag: RS{pickles}

This post is licensed under CC BY 4.0 by the author.

Trending Tags