🔬
CTFs
  • 🚩nitrozeus's CTF Writeups
  • Tutorial
    • Install Windows 10 VM on M1 Mac
  • My Notes
    • Capture-The-Flag
      • Windows Forensics
      • Memory Forensics
      • Base32, Base64
      • Steganography
      • Email Analysis
      • Malware Analysis
      • MD4, MD5 Cracking
      • Social Engineering
      • OSINT
      • Google Dorking
      • Reconnaissance
      • Port Scan (nmap)
  • 2023
    • 🧠BrainHack CDDC 2023
      • Gallery
      • Eazy Network Analysis
      • What the hell happened to the PC?!
      • Audio Steganography
  • 2022
    • 🐱Grey Cat The Flag 2022
      • Parcel
      • Memory Game (Part 1)
      • Too Fast
      • Entry
      • Ghost
      • Firmware
      • Image Upload
      • flappy-js
    • ⛵STANDCON 2022
      • I Sea You (Part 1)
      • Locate Me
      • I Sea You (Part 2)
      • Trolley Trolling
      • A New Gateway
      • Walks like a cat, barks like a dog
      • Shark in the Ocean
      • Atlan Safe P1
      • Gift from Russia
      • Asmuth Shares
      • Memedump
      • Warmup Forensics
    • 🦁STACK the Flags 2022
      • Finding Nyan
      • New Task!
      • Hit you with that
      • Cobalt Struck
      • PyRunner
Powered by GitBook
On this page
  1. 2022
  2. Grey Cat The Flag 2022

Ghost

spookyghostboy

PreviousEntryNextFirmware

Last updated 2 years ago

I tried to send you a bunch of messages :)

MD5 (ghost) = 3f61d4a3d19c3f3ac1f8223f7c7672af

Author: Tensor

Ghost challenge was an interesting one! The author of the challenge loves to mock us in a fun way. We were given a file with no extension, but the description of the challenge gives us a hint that it's probably a text file.

We then drag our file to the browser and we found a bunch of messages!

As you can see, the output clearly gives us a hint that the challenge is not as easy as we think! So, we figured that the other visible text in the file is probably not the flag.

But, we have not given up yet! From the file, we noticed a huge chunk of spaces AFTER the "Pika Pika" text, and we highlighted it.

Take Note: We removed all the other visible text and left ONLY the whitespace chunk in the file, and added a .txt extension to the end of the file.

To decode it, we wrote a script that converts;

  1. Whitespace to Binary

  2. Binary to Hex

  3. Hex to ASCII characters

s = open("ghost.txt").read()

txt = ''

for c in s:
  if c == ' ' or c == '\t':
    txt += str(0 if c == ' ' else 1)

binary_to_hex = ("%x" % eval("0b"+txt))
bytes_object = bytes.fromhex(binary_to_hex)
ascii_string = bytes_object.decode("ASCII")

print(ascii_string)

Flag: grey{gh0s7_byt3$_n0t_1nvisIbl3}

BOO! Are you afraid of ghosts?

The first thing we noticed was the encoded string, we then use to decode it.

Some of you may have noticed the Pika Pika text, and it is a language called the ! We then decoded it using an online .

At this point, we are sure that the author is messing with us!

We figured that this might be of interest, because as we were highlighting it, we realized there were tabs and spaces

After a bit of Googling, we found out that this is a language! We learnt something new today! As we further find out more about the language, we found an by John Hammond.

🐱
😢
😯
Base64
CyberChef
Pikalang
decoder
🎉
Whitespace
article
ghost file
"This is not it man, try harder!"
"lol no"