BackdoorCTF 2024
InfosecIITR’s flagship CTF event
Most of the forensics challenges had to be bruteforced in some manner and were more
steganography heavy than is expected, especially for a 24hr ctf. I learnt about 2 common
forensics challenges that are the firefox credential logins (firepwd.py) and XORing 2 images, though
the challenges here were a level above the standard. Also binwalk works for extracting very small files
a .pcap. That’s how I got the key.txt in torrent chal
Looking at writeups I saw something called deepsound exists for .wav steg, and hashcat for password cracking.
Apparently hashcat uses “Rulesets” which were mentioned in the boss’s boss chal.
The torrent chal had a zip header that I didn’t recognise, that would have helped
reconstruct the files.
