For this challenge we get a .jpg file that doesn’t open and the following description: Tocmai ce am primit poza asta dar nu o pot deschide I just got this picture but I can’t open it Suspecting that the magic […]


This challenge gives us a text file and the following description: Ai auzit vreodata de limbaje ezoterice? Have you ever heard of esoteric languages? Inside the file we can see a lot of seemingly random characters This is JSFuck code. […]


This challenge gives us a file with a base64 string inside. eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6IjE5NDc1MSIsIm51bWUiOiJNaWhhaSBWaXRlYXp1bCIsInBhc3N3ZCI6IkFCU08tQ1RGe2ZuaTMkTUZrSyRtMXZWNTJmbHY1OFYhTm12TjF9In0.frWBx3TnYJKYzj0BlGtcl1EJdj9uDPuRo5UNFQjerBE Coverting it from base64 to ASCII using CyberChef gives us this: {“alg”:”HS256″,”typ”:”JWT”}{“id”:”194751″,”nume”:”Mihai Viteazul”,”passwd”:”ABSO-CTF{fni3$MFkK$m1vV52flv58V!NmvN1}”}..`qÝ9Ø$¦3.@e.×%ÔB].Û.>ähåCEB7«. Which is a cookie that contains the flag: ABSO-CTF{fni3$MFkK$m1vV52flv58V!NmvN1}


This is the most solved challenge from this competition. The challenge gives us a binary string, which converted from binary to ASCII using CyberChef gives us the flag: ABSO-CTF{F39zLV5Ncb5zM!nVB5Mlq1dcb5tzz52m1c5V}


This challenge gives us a python script with the flag split up and randomized and the hash of the correct flag: After making this absolutely HORRIBLE code I got the correct flag: abso-tech{c197a03b7f75ca7bd7bfd7db1dd7534adbd1f9c800171e26fc5753644f0b26ea87f8}.


This challenge gives a remote server, a binary file, and the following description. Am incercat sa ghicesc raspunsul, insa nu am reusit:( Care sunt sansele…depinde de tine I tried to guess the answer, but I couldn’t 🙁 What are the […]


For this challenge, we get a small description and a .pyc file. There is a way to find it! Opening the .pyc file using a text editor we can see the flag in base64 in plain text: a Æ_™aªã@s`dZedƒZeekrTedƒZedkrJeddƒZe d¡e ¡edƒq\edƒned ƒdS) Z very_secretzEnter […]