Rating:
# RITSEC CTF 2019
RITSEC CTF 2019 is a security-focused competition that features the following categories: Bin, PWN, Crypto, Forensics, Steganography, and Web. We welcome beginners and more advanced security friends! There will be three brackets: RIT students, other college students, and everyone else.
## Overview
**URL:** https://ctf.ritsec.club/
**Organisors:** Contagion
**Duration:** Sat, 16 Nov. 2019, 04:00 AEDT — Mon, 18 Nov. 2019, 16:00 AEDT
```
Title Category Points Flag
----------------------------- --------------- ------- ---------------------------------------
URGGGGGG Forensics 480 RITSEC{wH0_s@id_n3twork1nG_wAs_tH3_oNlY_pAck3t_TyP3}
Our First API Web 417 RITSEC{JWT_th1s_0ne_d0wn}
```
---
## URGGGGGG
* **Category:** Forensics
* **Points:** 480
### Challenge
> One of our operatives sent us this packet capture but we aren't quite sure what to make of it, what can you find?
[URGGGGGG.pcapng](/writeupfiles/URGGGGGG.pcapng)
### Solution
> tshark -r URGGGGGG.pcapng -Y "((usb.transfer_type == 0x01) && (frame.len == 35)) && !(usb.capdata == 00:00:00:00:00:00:00:00)" -e "usb.capdata" -Tfields | sed 's/://g' > URGGGGGG.txt
[map_keystroketool.py](/writeupfiles/map_keystroketool.py)
> python map_keystroketool.py > URGGGGGG_solve.txt
> Now look for the RITSEC{} flag pattern and try to make out the keystrokes, paying attention to SHIFT, CTRL-x, CTRL-c, CTRL-v keys used. You can guess the letters that has been copied/cut and pasted.
[URGGGGGG_solve.txt](/writeupfiles/URGGGGGG_solve.txt)
**Flag**
```
RITSEC{wH0_s@id_n3twork1nG_wAs_tH3_oNlY_pAck3t_TyP3}
```
---
## Our First API
* **Category:** Web
* **Points:** 417
### Challenge
> ctfchallenges.ritsec.club:3000 ctfchallenges.ritsec.club:4000
Hint: You don't need the Bearer keyword!
### Solution
**Flag**
```
RITSEC{JWT_th1s_0ne_d0wn}
```
---