Winja CTF: Write-up

InfoSec Write-ups – Medium–

Winja CTF 2020: Write-up

Today I participated in Winja CTF, It was a really Awesome Experience.

I was able to solve 7 challenges so here I am sharing my approach to solve them.

1. Liar Liar

The first thing I did was check “file” command itself.


So it’s ASCII text file.

so I tried cat this_is_a_binary

cat file

So in img src, we can see we have one base64 string. So next thing I did was decode it using base64


So we got HEX value.

so next thing i did was “HEX to ASCII”

hex to ascii

Flag : flag{8su3nsh_HONESTY_is_the_Best_Policy}


So I download attachment,

So it was a zip file so I extracted it one by one while extracting the 2nd zip file we need to give a password so I guessed the password “pass123” and my guessing was right. else I will do zip password cracking online using “”

The next step is to open flag.txt file

Flag : flag{n0t_as_g0od_as_middl3_0u1_righ1}


we have been given one txt file. it looks like this

At first look, I know this is javascript obfuscator code ( As you play more CTF you can surly predict things by just looking them)

So I used “” to deobfuscate.

In challenge they told us to put string in “flag{}”


flag {cr@zy-e50t3r1c-l@ngu@g3_ejsSoOM7bh_MyNameIsDrLeamas}

4. Attack.log

we have been given one pcap file.

The first thing I did was exported all the files. (Export HTTP object list)

So as we can see we have 3 files. one “Linux-virus” file and two HTML files

So I tried strings on linux-virus file.

In the above image, you can see I have highlighted some Hash values,

At first look, it was strange to see HASH values in strings. So I tried to crack this HASH value via CRACKSTATION. and i was right it’s HASH value and got value “999999”

So now I opened HTML files and try to find “999999”

I found “999999” on the HTML file and I submitted a flag value.


5. Risk Aversion

We have been given one exe file.

So first thing i did was “File” command on exe

So we can see it’s not an exe file it’s ASCII text file.

So next thing I did was “cat format-c.exe”

Flag: flag{QKHek1Oblm_MrGrinnyWouldLikeToCongratulateYou}

6. Trader’s Gambit 1

trader’s Gambit 1

So firstly I visited this website

So looked at different things “source code”,”javascript file”,”css” etc.

After then I thought let me try different URLs like “/admin,/login,/robots.txt”.

After a while, I tried “/flags” and I got 2 flags.


So the First flag was for this challenge.

Flag : flag{YouFoundKorla_SqlInjectionSuccessful}

7. Trader’s Gambit 2

So when I saw the URL, it’s was the same URL so in previous challenge we found 2 flags so the 2nd flag was for this challenge.

flag : flag{LimitBypassed_IVFfxMQQwb_ThisAccountBelongsToKorla}

Thank you for reading.

You can find all resources at the link below.

Winja CTF: Write-up was originally published in InfoSec Write-ups on Medium, where people are continuing the conversation by highlighting and responding to this story.

View original article on InfoSec Write-ups – Medium

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s