From 2e6a2f6e82cc268654eda46cca931742b9c9ba0c Mon Sep 17 00:00:00 2001 From: Maik de Kruif Date: Thu, 3 Dec 2020 11:36:30 +0100 Subject: [PATCH] Update challenge 0 --- content/posts/adventofctf/challenge_0.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/content/posts/adventofctf/challenge_0.md b/content/posts/adventofctf/challenge_0.md index 919d939..f7c6eb5 100644 --- a/content/posts/adventofctf/challenge_0.md +++ b/content/posts/adventofctf/challenge_0.md @@ -25,20 +25,23 @@ Do you remember the flag in the teaser website? ## Solution -Use the Wayback Machine to get the teaser page. - +Sadly, the teaser website isn't online anymore. If only someone kept an archive of the internet. This is where the Wayback Machine on [archive.org](https://archive.org/) comes in handy. -When taking a look at the source we find the following comment: +So, let's use the Wayback Machine to get the teaser page. + +When we take a look at the source html of the page we find the following comment: ```html ``` -If we then use `base64` to decode this string we get `NOVI{HEY_1S_Th1S_@_Fla9?}`. +It looks like some encoded string. If you've been doing CTFs for a while you'll probably recognize it's encoded in `base64`. We can use the program `base64` to decode this string. ```bash > echo "Tk9WSXtIRVlfMVNfVGgxU19AX0ZsYTk/fQ==" | base64 -d NOVI{HEY_1S_Th1S_@_Fla9?} ``` +We found the flag! It's `NOVI{HEY_1S_Th1S_@_Fla9?}`. + This flag can then be submitted for the [challenge](https://ctfd.adventofctf.com/challenges#0-1).