Skip to main content


Recent posts


This is the walkthrough for the challenges that were provided as a part of COCON's DomeCTF

Before we start reading can we just admire the Badge that was given as a part of DOME CTF.

In this challenge, we were given a message.txt file that contained a long base64 string when decoded gives out a string that is either reversed or encrypted with rot13 by recursively decoding this message and at the end, the flag is displayed.
In this challenge as the challenge, the description says to read the rules page that was given at the time of registration. On that page, there was a QR code when scanned spits out a link to a gist snippet. When visited gives out a strange text

'CB;_9>7<;43Wxwvutsrqponmlkjihgfedcba`_^]\[ZYXWVUTSRQPONMLKJIHGFEDCB^]\[ZYXW VUTMqQPON0Fj-IHG@d'&%$#"!~}|{zyxwvutsrqponm…

Sector443 CTF Walkthrough

This is where it all started I was watching an episode of The Boys when a friend of mine gave me a link to this CTF and asked me to play if I had the time, and I has plenty XD
Most of the challenges where based on reverse engineering binaries.


The challenge had an HTML file when opened with a browser it gives a prompt to enter a password the end goal is to find the password which is the flag

Here is the code, By the looks of it I can see a load of variable declaration and looping by the hex thing looks promising by printing it on console it spits out some char codes

Now we have a set of char codes which can then be converted using the String.fromCharCode function
print(String.fromCharCode(102, 108, 97,103,123,55,…