Skip to main content
  1. Writeups/
  2. CTFs/

SOFTWARICA HACKFEST 2.0 2025

·165 words·1 min
CTF 2025
Subeg Suwal
Author
Subeg Suwal
Web & Network Pentester | Learning Binary Exploitation
Table of Contents

SOFTWARICA HACKFEST 2.0
#

WEB
#

Read between the lines
#

image.png

image.png

image.png

image.png

The Hidden Entity
#

image.png

image.png

The Forgotten Key
#

org request

image.png

image.png

logged in and got this

image.png

checking system controls

image.png

Ninja Notes
#

image.png

image.png

image.png

image.png

image.png

Everything is yours
#

image.png

can also be done like this

image.png

Read between the lines-2
#

image.png

Solution:

LFI with php filter

image.png

image.png

Crypto
#

Happy Holi
#

happy_holi.png

image.png

Flag: softwarica{DEC0L0R}

substitution cipher
#

image.png

image.png

image.png

decode me
#

image.png

image.png

Misc
#

? Not Really.
#

image.png

image.png

Time Machine
#

image.png

image.png

Copy_Paste
#

image.png

image.png

The provided Page had a function running which on copy event changed every copied text will be this string: DDKVPefm

Checking this string in dcode.fr

image.png

Got the Flag.

image.png

Gitar updated
#

image.png

image.png

image.png

crack me if you can
#

image.png

image.png

converting zip to hash

image.png

image.png

Wasn’t working on unzip so used 7z.

image.png

image.png

We have data from /etc/passwd and /etc/shadow . unshadowing it and prepared to crack using --format=crypt .

image.png

Flag: softwarica{ _defensive4}

virus
#

image.png

Flag: softwarica{ILuVYOU}

OSINT
#

Follow the feed
#

image.png

image.png

image.png

image.png

image.png

image.png

There was a ROT 47 Ciphertext here which gave the flag.