🦹‍♂️
nbl
Linkedin
  • 🦹‍♂️About Me
  • 🧙Team
  • 🚩CTF Writeups
    • 2025
      • New Year CTF 2025
      • ARA CTF 6.0
    • 2024
  • 💻Contributions
    • 2025
    • 2024
  • 👨‍🎓College
    • Sistem Operasi (OS)
      • Modul 1
  • 📚Resources
    • Web Exploitation
    • OSINT
Powered by GitBook
On this page
  • WEB
  • Product manager
  • Login: User Identification
  • Admin
  • Bypass: Admin Incoming!
  • OSINT
  • APT
  • Virus.BY
  • Ransom
  • The Beginning of Cyberwars
  • Beer & Books
  • Whose IP ?
  • Church
  1. CTF Writeups
  2. 2025

New Year CTF 2025

Writeup for All Web and OSINT Challenges.

Previous2025NextARA CTF 6.0

Last updated 5 months ago

Team: HCS

Rank: 21 / 658

Challenge
Category
Points

Product manager

Web

100

Login: User Identification

Web

100

Admin

Web

467

Bypass: Admin Incoming!

Web

559

APT

OSINT

100

Virus.BY

OSINT

100

Ransom

OSINT

100

The Beginning of Cyberwars

OSINT

100

Beer & Books

OSINT

100

Whose IP ?

OSINT

100

Church

OSINT

467

WEB

Product manager

Description

I found an internal tool of the store that creates a barcode for the product. Maybe there is a flag there?

http://185.219.81.19:5678/create

TL;DR

Get flag using ID barcode image.

Solve

We're given black-box web challenge. First, let's try the features on the website. Enter any text in description, a barcode image will appear.

Let's try uploading it to the 'find a product' feature; a description of the image '83424.png' will appear. From this, we can assume that the flag is in the image description '1.png.' We can retrieve it using:

Next, upload it to the 'find a product' feature, and you will receive the flag.

Flag: grodno{7eb13bfd35b2f61de9edb6064e40bfa5}


Login: User Identification

Description

Welcome to the user identification task! In this simple challenge, you need to enter the name of a specific user to successfully log into the system. Find the correct name and gain access to the flag. Good luck! https://ctf-spcs.mf.grsu.by/task/endp

TL;DR

Analyzing javascript.

Solve

Given a website that only have username checking feature.

I'm trying to view-source and found /task/endp/script.js. Then, I’m analyzing it.

script.js
document.addEventListener("DOMContentLoaded", async () => {
...

if (username === "FlagUser") {
    output.innerText = "flag{api_of_a_healthy_person_?}";
  } else {
    output.innerText = "nothing";
  }
});

From here we can get the flag, even without input the correct username.

Flag: flag{api_of_a_healthy_person_?}


Admin

Description

Can you log in as admin?

http://185.219.81.19:9999/login

TL;DR

SQL Injection to Bypass Authentication.

Solve

Given a login page, the objective is login as admin. In CTF challenges, we can usually do SQL Injection to Bypass Authentication.

Input username and password field using '=' payload, because if we assume the query:

SELECT * FROM users WHERE username = 'input' AND password 'input'

That mean we can break the query logic by inputting '=', it's will returns true value.

SELECT * FROM users WHERE username = ''='' AND password ''=''

Flag: grodno{th3r3_1s_n0_w4f_f0r_hum4n_stup1d1ty}


Bypass: Admin Incoming!

Description

In this task, you have the chance to become an admin without going through all that boring verification and sneak into the system like a true hacker. Find a way to bypass the protection and gain access to the admin information. Good luck on your journey to the peaks of cybersecurity!

https://ctf-spcs.mf.grsu.by/task/web_wtf

cred: guest:password123

TL;DR

JWT Role Manipulation.

Solve

Given a login page and credentials guest:password123.

The login is successful, but the guest user doesn't have access to the flag. Then, I tried to analyze the HTTP request using Burpsuite.

We can see, when you GET /task/web_wtf/protected, there is an Authorization header using JSON Web Tokens (JWT). We can decode it using this web:

There is a user role. I try changing it to admin, then use JWT to request GET /task/web_wtf/protected.

Copy encoded field and replace the old JWT with it.

It's work, we got the flag.

Flag: grodno{check_jwt_before_start}


OSINT

APT

Description

This is a well-known cyber group (Advanced Persistent Threat, ATP), which many cybersecurity experts associate with the Democratic People's Republic of Korea.

Did you know about it? Try to answer a few questions. Each answer is one word in English.

Keep the spelling of the answers as on Wikipedia (https://en.wikipedia.org/)

  1. The name of this cyber group

  2. Since what year has the group been active

  3. The name of the group's most destructive attack in 2014

  4. The company attacked

  5. The name of the worm used by the group in 2017

  6. The exploit used to escalate privileges and launch the worm (two words separated by a space)

  7. Who this exploit was allegedly stolen from

nc ctf.mf.grsu.by 9035

TL;DR

About Lazarus Group history.

Solve

We can googling using keyword Advanced Persistent Threat korea hacker.

The topic of this question refers to the Lazarus group. I use a main reference from Radware and Wikipedia.

1

The name of this cyber group

From Radware:

The Lazarus Group, also known as APT38, is a notorious Advanced Persistent Threat (APT) entity believed to be linked to North Korean hackers.

Answer: lazarus

2

Since what year has the group been active

From Wikipedia Lazarus:

Formation c. 2009

Answer: 2009

3

The name of the group's most destructive attack in 2014

From Wikipedia 2014 Sony Hack:

The perpetrators then employed a variant of the Shamoon wiper malware to erase Sony's computer infrastructure.

Answer: wiper

4

The company attacked

From Wikipedia Lazarus:

Late 2014: Sony breach

Answer: sony

5

The name of the worm used by the group in 2017

From Wikipedia Lazarus:

May 2017 WannaCry ransomware attack

Answer: wannacry

6

The exploit used to escalate privileges and launch the worm (two words separated by a space)

From Wikipedia WannaCry ransomware attack:

It was propagated using EternalBlue

Answer: eternal blue

7

Who this exploit was allegedly stolen from

From Wikipedia WannaCry ransomware attack:

It was propagated using EternalBlue, an exploit developed by the United States National Security Agency (NSA) for Windows systems.

Answer: nsa

We got the flag.

Flag: grodno{bcec0092cbb0546cb07395536c4e61dc7df4c0d}


Virus.BY

Description

Avast Antivirus has detected an unknown computer virus with a rare name "Apanas" on Santa's computer, which has caused Windows to stop loading. And I have some urgent questions that need answers as soon as possible. Can you give the correct answers to help protect Santa Claus from this threat?

Keep the writing of the answers as on Wikipedia (https://en.wikipedia.org/). Try to be brief. If there are several words in the answer - separate them with a space.

  1. What is the name of this file virus in the NOD32 antivirus database and other antiviruses

  2. How is the name of the virus translated from Belorussian into English

  3. In what year was this virus written

  4. In what language was the virus written

  5. Hackers of which country wrote this virus

  6. What does the author of the virus call himself (two words)

  7. What kind of beer is the best, according to the author of the virus

  8. The name of the file on the infected computer that contains the body of the virus

  9. The last name of the person to whom the author of the virus sends greetings

  10. With what score did the famous match Sweden - Belarus end (Olympic Games, 2002, Salt Lake City), to whose goalkeeper the author of the virus sends "best wishes" (answer in the form - number:number). After this match, the Republic of Belarus became known all over the world :)

nc ctf.mf.grsu.by 9033

TL;DR

About Neshta virus history.

Solve

We can googling using keyword apanas avast.

The topic of this question refers to the neshta virus. I use a main reference from Virustotal and Wikipedia.

1

What is the name of this file virus in the NOD32 antivirus database and other antiviruses

From the virustotal scan, we can see another name of apanas mostly is neshta.

Avast Win32:Apanas [Trj]

ESET-NOD32 Win32/Neshta.A

AliCloud Virus:Win/Neshta.B

Answer: neshta

2

How is the name of the virus translated from Belorussian into English

From Wikipedia Neshta:

The name of the virus comes from the Belarusian word "нешта", meaning "something".

Answer: something

3

In what year was this virus written

From Wikipedia Neshta:

Neshta is a Belarusian computer virus from 2005.

Answer: 2005

4

In what language was the virus written

From Wikipedia Neshta:

The program is a Windows application (exe file). It is written in Delphi.

Answer: delphi

5

Hackers of which country wrote this virus

From Wikipedia Neshta:

Neshta is a Belarusian computer virus

Answer: belarus

6

What does the author of the virus call himself (two words)

From Wikipedia Neshta:

[Nov-2005] yours [Dziadulja Apanas]

Answer: dziadulja apanas

7

What kind of beer is the best, according to the author of the virus

From Wikipedia Neshta:

"Olivaria" is the best beer.

Answer: olivaria

8

The name of the file on the infected computer that contains the body of the virus

From Wikipedia Neshta:

The virus itself creates a file svchost.com in the system folder (Windows), which is the body of the virus.

Answer: svchost.com

9

The last name of the person to whom the author of the virus sends greetings

From Wikipedia Neshta:

Alexander Grigorievich , you too

We can open the wikipedia link, and got the last name.

Answer: lukashenko

10

With what score did the famous match Sweden - Belarus end (Olympic Games, 2002, Salt Lake City), to whose goalkeeper the author of the virus sends "best wishes" (answer in the form - number:number). After this match, the Republic of Belarus became known all over the world :)

We can googling with keyword Sweden Belarus hockey, and we will got information about score.

Answer: 3:4

Submit all the answer to the nc service, you will get the flag (service has been takedown right now).


Ransom

Description

This exploit used a vulnerability in the SMB (Server Message Block) protocol of Windows. It was used to organize the largest ransomware attacks.

And now - a few questions. Keep the writing of the answers as on Wikipedia

(https://en.wikipedia.org/). Try to be brief. If there are several words in the answer - separate them with a space.

  1. Exploit name

  2. Exploit ID in the CVE database

  3. Technique ID (according to MITRE ATT&CK classification)

  4. Tactic (according to MITRE ATT&CK classification)

  5. Used in 2017 for rapid spread in an attack

  6. What year did the exploit leak

  7. Cyber group involved in the leak

  8. Alleged developer of the exploit

  9. Microsoft patch ID for the exploit

nc ctf.mf.grsu.by 9037

TL;DR

About EternalBlue computer exploit.

Solve

We can googling using keyword exploit smb windows.

The topic of this question refers to the EternalBlue. I use a main reference from Wikipedia.

1

Exploit name

We know the name is Eternalblue.

Answer: eternalblue

2

Exploit ID in the CVE database

From wikipedia:

This vulnerability is denoted by entry CVE-2017-0144 in the Common Vulnerabilities and Exposures (CVE) catalog.

Answer: cve-2017-0144

3

Technique ID (according to MITRE ATT&CK classification)

We can googling using keyword eternalblue mitre.

Exploitation of Remote Services, Technique T1210

Answer: t1210

4

Tactic (according to MITRE ATT&CK classification)

From Wikipedia:

EternalBlue as either an initial compromise vector or as a method of lateral movement.

Answer: lateral movement

5

Used in 2017 for rapid spread in an attack

From Wikipedia:

On May 12, 2017, a computer worm in the form of ransomware, nicknamed WannaCry, used the EternalBlue exploit

Answer: wannacry

6

What year did the exploit leak

From Wikipedia:

EternalBlue was then publicly released on April 14, 2017.

Answer: 2017

7

Cyber group involved in the leak

From Wikipedia:

The Shadow Brokers publicly released the EternalBlue exploit code on April 14, 2017, along with several other hacking tools from the NSA.

Answer: shadow brokers

8

Alleged developer of the exploit

From Wikipedia

EternalBlue is a computer exploit software developed by the U.S. National Security Agency (NSA).

Answer: nsa

9

Microsoft patch ID for the exploit

From Wikipedia:

On Tuesday, March 14, 2017, Microsoft issued security bulletin MS17-010 which detailed the flaw and announced that patches had been released for all Windows versions that were currently supported at that time

Answer: ms17-010

Submit all the answer to the nc service, you will get the flag (service has been takedown right now).


The Beginning of Cyberwars

Description

The fact of using this "malware" is considered the beginning of the era of modern cyber wars. It all started in the Middle East in the field of nuclear technology.

Did you know about this? Try to answer a few questions.

Each answer is one word in English. Keep the answer spelling as on Wikipedia (https://en.wikipedia.org/)

  1. The type of this "malware"

  2. The name of this computer worm

  3. In what year was it first used

  4. Which country was attacked

  5. Which country is believed to have carried out the attack

  6. Which company's industrial installations were most affected

  7. The name and surname of the programmer who discovered the worm code (two words separated by a space)

  8. Which company did he work for

  9. Which country does this company work in

TL;DR

About Stuxnet malware.

Solve

We can googling using keyword malware middle east nuclear.

The topic of this question refers to the Stuxnet. I use a main reference from Wikipedia.

1

The type of this "malware"

From Wikipedia:

Stuxnet is a malicious computer worm

Answer: worm

2

The name of this computer worm

We know the name is Stuxnet.

Answer: stuxnet

3

In what year was it first used

From Wikipedia:

Stuxnet is a malicious computer worm first uncovered in 2010.

Answer: 2010

4

Which country was attacked

From Wikipedia:

Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran.

Answer: iran

5

Which country is believed to have carried out the attack

From Wikipedia:

multiple independent news organizations recognize Stuxnet to be a cyberweapon built jointly by the United States and Israel

Answer: israel

6

Which company's industrial installations were most affected

From Wikipedia:

Stuxnet, discovered by Sergey Ulasen from a Belarussian antivirus company VirusBlokAda, initially spread via Microsoft Windows, and targeted Siemens industrial control systems.

Answer: siemens

7

The name and surname of the programmer who discovered the worm code (two words separated by a space)

Stuxnet, discovered by Sergey Ulasen from a Belarussian antivirus company VirusBlokAda.

Answer: sergey ulasen

8

Which company did he work for

We know he are work in VirusBlokAda company.

Answer: virusblokada

9

Which country does this company work in

We know VirusBlokAda are from Belarus.

Answer: belarus

Submit all the answer to the nc service, you will get the flag (service has been takedown right now).


Beer & Books

Description

What does Santa Claus do in the summer when it's hot and there's no need to give presents to children? Probably, he travels, reads books or drinks cold beer. Or, most likely, all of these things.

Determine the coordinates of the place where I met Santa Claus in the summer from the photo.

Photo here

The flag should be in the format grodno{xx.xxx,xx.xxx). For example, if it were at the Hofbräuhaus restaurant in Munich, the flag would be grodno (48.137,11.579).

TL;DR

Find the coordinates of the photo location.

Solve

Given an image, my focus is on a signboard that says "Plac Konstytucji."

I tried searching for it on Google Maps. Upon checking, "Plac Konstytucji" seems to be the name of a street. I decided to trace the street named "Plac Konstytucji."

Eventually, I found a view identical to the one in the photo.

Now, I am standing right in front of "U Szwejka".

We can use the coordinates as flag.

Flag: grodno{52.221,21.016}


Whose IP ?

Description

Find the name of the organization that uses the IP address 86.57.170.0. The flag is the name of this organization in Latin.

Flag format: grodno(Organization_Name}

TL;DR

Get netname from IP.

Solve

Given an IP, I checked it using the whois tool. The organization's name is Beltelecom, but I don't understand why the flag is placed under the netname, which is BYFLY-MGTS.

Flag: grodno{BYFLY-MGTS}


Church

Description

For the Radziwill family (on whose initiative this temple was built) this church is a family burial vault, where representatives of the family are buried from 1616 to the present day. What is the name of this church? And what famous poet is buried in it?

Flag format: grodno{Church_Name;Name_Surname)

TL;DR

About Corpus Christi Church and some guessing.

Solve

We first need to figure out who the Radziwill family is. I found a Wikipedia page discussing them.

I got it. The page mentions:

The Corpus Christi Church, built on the premises, contains the coffins of 72 family members, each interred in a simple coffin made of birch and marked with the Trąby Coat of Arms.

The last task is to find a famous poet they referred to. However, this isn’t as easy as it seems.

Eventually, I realized that Belarus has an official website hosting various historical information related to the country.

With this, maybe we can use Google Dorking?

site:belarus.by "corpus christi church" "radziwill"

I found an interesting URL.

When searching for "poets", two names appeared: Wladyslaw Syrokomla and Yakub Kolas.

The alley features busts of outstanding people who went down in the history of the town: Princes Yuri Nesvizhsky and Prince Mikolaj Krzysztof Radziwill the Orphan”, engraving artist Tomasz Makowski, architect Giovanni Maria Bernardoni, poets Wladyslaw Syrokomla and Yakub Kolas.

I tried inputting each name into the flag one by one, and it turned out the poet was Wladyslaw Syrokomla.

But I'm confused. When I googled, I found out that Wladyslaw Syrokomla was buried in a different place. I still don’t fully understand why.

Flag: grodno{Corpus_Christi;Wladyslaw_Syrokomla}

🚩
Page cover image
Create a product feature
Flag
Username checker
SQLi bypass auth
Flag
Lazarus GroupWikipedia
Radware Captcha Page
http://185.219.81.19:5678/static/barcodes/83424.png185.219.81.19
http://185.219.81.19:5678/static/barcodes/1.png185.219.81.19
JWT.IO
New Year CTF 2025CTFtime
2014 Sony Pictures hackWikipedia
NeshtaWikipedia
VirusTotalVirusTotal
WannaCry ransomware attackWikipedia
StuxnetWikipedia
EternalBlueWikipedia
Logo
Radziwiłł familyWikipedia
Street View · Google MapsGoogle Maps
Logo
What to see in Nesvizh: A UNESCO World Heritage site and many other attractions | Belarus Tour Guide: Ideas for Your Trip | Belarus.by
Logo
Official website, Belarus | Belarus.by
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo