BATTLEWARE CTF WRITE-UP

Hi,

Firstly, I would like to share with you the solution of the problem in the OSINT category by leaving the first week of the BattleWare CTF Competition, which is a short-term but fun and at the same time a challenging.

Category: OSINT

If you want to try and solve the questions, I share the link 😊

Download for β€œsound_of_silence.waw” : https://mega.nz/file/0ipWBbRK#_8SU3WJ6sL3BZkEFzS1WrAaeR5XgMqVc5j_C68tyvgw

First of all, when we examine the audio file, we can understand that this audio file containing short and long sounds contains Morse Code. I used the β€œMorse Code Adaptive Audio Decode” application on the Morse Code World site to analyze the sound file.

Morse Code Adaptive Audio Decode : https://morsecode.world/international/decoder/audio-decoder-adaptive.html

Morse Code Analysis:

  • . β€” .- β€” .. . β€” β€” β€” β€” … β€” β€” β€” β€” β€” .- .. β€” β€” -.-. ….- -. β€” β€” -… β€” β€” .-. .. β€” β€” β€” . -. β€” β€” .. .-.. -..- β€” ..-. β€” .. β€” . -.- .-.. β€” .. β€” β€” -. ….. -..- β€” . -.- -…- -…- -…-

By converting the analyzed Morse Code into a written language, we obtain our first data. In order to transform the data, we obtain encrypted data using the International Morse application on the same site.

Output:
NQZWOM3OMQ2C4YTBOR2GYZLXMFZGKLT2N5XGK

In order to make meaningful, we are investigating what it is encrypted with.

We try the encryption methods in the β€œdecode” section of β€œhttps://emn178.github.io/online-tools/base32_decode.html” to decrypt this encrypted data and find that we have been encrypted as Base32.

We see that the decoded data takes us to a link.

Directed sites : http://l3g3nd4.battleware.zone/

We would have solved the question when we reached the site, of course, but I cannot share this image with you because we cannot reach the site when the competition is over.

Thank you for your time 😊

Leave a Reply

Your email address will not be published. Required fields are marked *