LASACTF 2016 Write-Ups (Part 1)

I know it is a bit late, but I'm finally getting around to posting my LASACTF write-ups.

This was an online CTF that took place my last full week in Belgium (19-26 March).

I wound up competing by myself, and ended up 74th on the unranked scoreboard in spite of having to pack and leave the country.

The problems are available on their GitHub, but I'll go over the ones that I was able to solve during the competition.

Shift Letters - 10 XP

Kyle got his letters confused. Help him out: Dayq ymk rmxx, ngf yk oubtqd iuxx dqymuz. Fmwq ftue rxms uz dqyqyndmzoq: xmemofr{nq_eturfqp_za_yadq}


I ran this through an online Caesar Cipher solver a few times, and it ended up being a shift of 14.

Rome may fall, but my cipher will remain. Take this flag in remembrance: lasactf{be_shifted_no_more}

Four-Oh-Four - 10 XP

"We were trying to make an introductory web problem, but messed up somewhere along the way."


This was just a matter of going to the fake 404 page and viewing the source.

LASACTF - Four-Oh-Four


Easy Symbols - 20 XP

"Force, course, horse, norse, source, torse. What does EZ.txt mean?
Note: Flag not in LASACTF{} format


Based on the simple rhyme, as well as the file data, I figured this was Morse code. After throwing it into an online solver, I got the flag 'morsewascool'.

LASACTF - Easy Symbols


Easy - 30 XP

"Find the flag in easy.exe"


Running this application through strings and grep got the flag that we were supposed to be looking for.

root@kali:~/lasactf# strings easy.exe | grep lasactf

R3ndom Eye - 40 XP

"The flag is in the eyeofthetiger.png of the beholder."



After reading a bit more about file carving, I realized that this was two files concatenated together.

LASCTF - Eye of the Tiger

Using a hex editor, I split apart the JPEG and the PNG files.

LASCTF - Carved

Once the files were split, I was able to open the newly created PNG file and get my flag.

LASACTF - Extracted PNG


Grep Quest - 40 XP

"Locate the flag in all the words at /grepy-words/"


This was another grep challenge on their virtual host.

doyler@shell:~$ cat /problems/grep-quest_0/grepy-words/* | grep "lasactf{"
m)Q9s`]U9\0yg5cj{<4^VtFxs:pU8Bx3{d&F@4IFn.D oh#DN}xkAq]!h-

< ...snip... >



Lost Extensions - 50 XP

This "Extensions" file got sad and threw away its extension! Maybe you can figure out what it's supposed to be?


Running the file on this file showed that it was a zip archive, which I was then able to extract.

root@kali:~/lasactf# file Extensions
Extensions: Zip archive data, at least v2.0 to extract
root@kali:~/lasactf# mv Extensions
root@kali:~/lasactf# unzip
  inflating: I'mLost ;(             
root@kali:~/lasactf# file I\'mLost\ \;\(
I'mLost ;(: ASCII text

Inside of the new file was a bunch of line separated numbers (possibly coordinates).

root@kali:~/lasactf# cat I\'mLost\ \;\(
o asqwerd
v 7.517223 0.217741 0.144000
v 7.500482 0.214009 0.144000
v 7.486061 0.207875 0.144000
v 7.473806 0.199407 0.144000
v 7.463565 0.188676 0.144000
v 7.455185 0.175750 0.144000
v 7.448514 0.160699 0.144000
v 7.443399 0.143593 0.144000
v 7.439686 0.124500 0.144000
v 7.437223 0.103491 0.144000
v 7.435857 0.080634 0.144000
v 7.435436 0.056000 0.144000
< ... snip ... >

After a bit of research, these appeared to be vertices for the OBJ file format.

Once I downloaded


Postman - 50 XP

"Kyle made a super secure website only accessible by the Google Ultron browser. Figure out how to login to his site."


Well, upon first glance the site was expecting the request to come from the "Google Ultron" browser.

First of all, for those of you unfamiliar with this, I highly recommend you read up on the meme.

LASACTF - Postman

After changing my user-agent, I got an error that the SpecialAuth header wasn't set properly.

LASACTF - SpecialAuth

Once I set the SpecialAuth header, there was still an error about where I was accessing the site from.

LASACTF - Postman 3

Changing the header finally got me to the page, and the flag I was looking for.

LASACTF - Postman Flag


doyler on Githubdoyler on Twitter
Ray Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he's done it all. To show for it, he has obtained an OSCE, OSCP, eCPPT, GXPN, eWPT, eWPTX, SLAE, eMAPT, Security+, ICAgile CP, ITIL v3 Foundation, and even a sabermetrics certification!

He currently serves as a Senior Staff Adversarial Engineer for Avalara, and his previous position was a Principal Penetration Testing Consultant for Secureworks.

When he's not figuring out what cert to get next or side project to work on, he enjoys playing video games, traveling, and watching sports.

As an Amazon Associate I earn from qualifying purchases.

Common passed on this blog, I made it to a jam.

Leave a Comment

Filed under Security Not Included

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.