CTF Writeups

We wish to provide good and detailed writeups for all challenges which we solve.Feel free to suggest some changes . Star to show your love!

View on GitHub

MISC

VORTEX

net cat server was given nc jh2i.com 50017

: FLAG : flag{more_text_in_the_vortex}

I simply used grep -a command to search flag in the vortex . -a forces to print output in a binary file ..

FAKE FILES

After connecting to given url we get access to system where there are lots of fake files and flag is inside in one of the sub- directories.

I simply used grep recursively to get the flag

grep -r "flag{,*}"

ALKATRAZ

Once we connect to the url we find the flag is their only inside flag.txt but but most of commands are disabled for opening and reading the files so after some study from java-point I found that < this command can be used and this is not disabled.