Files
2025-05-06 07:11:49 -04:00

1.8 KiB

Hash Forensics CTF

[Challenge (HashMash)]

To complete this CTF, you can use hashcat and hashid and their subsequent guides:

hashcat

hashid

DEPENDENCIES

This binary depends on ncurses, you should download it from the software repository of your choice.

For building the project after completion of the game, ncurses-dev is required

CONTROLS

use W/A/S/D to move

use q to quit the game

use shift + q to quit the terminal

STEPS FOR COMPLETION

1) Download this repository:

git clone https://git.qwik.space/left4code/L4C_Forensics_CTF

2) Run the linux executable ELF file inside of the "Filesystem Imaging & hashing" directory.

./hashcat_ctf

3) Go to the terminal in the house.

4) Copy the hash

5) Use hashID to determine what kind of hash is being used.

6) properly format and place it into hashcat as a hashfile

7) Successfully find the password corresponding to each of the three hashes to get the password

8) Use the password to decrypt the text file and get the flag.

NOTE Do you want the source code?

Upon completing the game, the same password used to get the flag can be used to decrypt the source_code_encrypted.zip.gpg file.

To build the project, cd into the source_code_encrypted/ directory and run the command:

make

  • will make the project

make run

  • will run the executable

make clean

  • will remove the executable

If you can't complete the CTF and still want the code, send me an email and I'll send you the zip file with the code in it. Pretty please send me your gpg key first though so I can encrypt before sending.