Tags: steganography inceptionctf forensics 

Rating:

# Inception CTF

#### Dream 1

- Extract the Zip.
- `InceptionCTF` contains `Reality.7z` .
- Extract it to get `Reality` folder.
- Two files will be extracted.
- Suspicious.txt and `Vanchaze.7z`.
- Suspicious.txt contains reversed file.
- Reversing the contents will give the flag.

```
InceptionCTF --> Reality --> Suspicious.txt

Flag --> RITSEC{Dreamland}
```

#### Dream 2

- Extracting `Vanchase.7z` will give `kidnap.txt`.
- It contains Hex code and decoding it will give the flag.

```
InceptionCTF --> Reality --> Vanchase --> kidnap.txt

Hex code : "52 49 54 53 45 43 7b 57 61 74 65 72 55 6e 64 65 72 54 68 65 42 72 69 64 67 65 7d".

Flag --> RITSEC{WaterUnderTheBridge}
```

#### Dream 3

- Extracting `TheHotel.7z` will give `ThePointman.txt`.
- It contains `Base64` encoded text and decoding it will give the flag.

```
InceptionCTF --> Reality --> Vanchase --> THEHotel --> ThePointman.txt

Flag --> RITSEC{F@!!ingElev@tor}
```

#### Dream 4

- Extracting `Snowfortress.7z` will give `Passwordpath.exe`.

```
InceptionCTF --> Reality --> Vanchase --> THEHotel --> Snowfortress --> Passwordpath.exe
```

- Now `cat` the Passwordpath.exe and we shall see the `Java Script code`.
- Decoding the `JS` gives `Morsecode`.
- Decoding the `Morse code` gives the flag.

```
Flag --> RITSEC{DIVERSION}
```

#### Dream 5

- Extracting `Limbo.7z` will give `Inception.jpg`.

```
--> Reality --> Vanchase --> THEHotel --> Snowfortress --> Limbo --> Inception.jpg
```

- Doing `strings` in `Inception.jpg` gives Base64 encoded text `UklUU0VDezUyODQ5MX0g`.
- Decode it to get the flag.

```
Flag --> RITSEC{528491}
```

Original writeup (https://github.com/a3X3k/Bi0s/tree/master/CTFs/RITSEC21/Forensics/InceptionCTF).