Skip to main content
  1. ctf-writeups/

SheHacks KE CTF 2023

·2 mins

Introduction #

  • Took part in the SheHacks CTF 2023 hosted by eKRAAL Innovation Hub on 22nd September 2023 - 23rd September 2023, where our team emerged position 6/82. The CTF was a jeopardy style one, and this is the writeup for the challenges that I solved.

1. Graph1 #

Challenge Description #

graph 1

Accessing the Website #

website access

  • We are brought to the above web page that tells us that Graphql is running.
  • Graphql is a query language for APIs and a runtime for fulfilling those queries with your existing data.

Solution #

  • We can use a Graphql query to fetch information about available types and fields like below
  • We see a Type named FlagTable from the result.

Exploring the FlagTable Type. #

  • We get FlagTable with id and flag fields.
  • We can query for the flag like this:
    Flag
  • The flag has been encoded using base64 and we can decode in Kali like this: base64 -d U0hDVEZ7MW50cjBzcDNjdGlvbiF9 We get our flag! SHCTF{1ntr0sp3ction!}

2. Snifferdog1 #

Challenge Description #

Analysis Using Wireshark #

  • Opening the pcap file using Wireshark, we can apply the following filter .
  • Also, we can also see the total number of packets displayed, which is what we are looking for. That was easy!

3. Snifferdog2 #

Challenge Description #

Solution #

  • We can apply the following filter:
(ip.addr == 192.168.56.103 || ip.dst == 192.168.56.103) && tcp.port == 8081 && http && http.request.uri contains "robots.txt"
  • Following the TCP stream, we get our flag!

  • That’s all for today :)