Comprehensive writeups and solutions for the Instruo 2025 CTF Competition
Welcome to the IIEST Instruo CTF 2025 Solutions repository! This comprehensive collection contains detailed writeups, methodologies, and solutions for all challenges from the Instruo 2025 Capture The Flag competition organized by IIEST (Indian Institute of Engineering Science and Technology).
Each writeup includes:
- β Step-by-step solution methodology
- π§ Tools and techniques used
- π‘ Key insights and learning points
- π Complete command sequences
- π― Alternative solution methods
Perfect for both beginners learning CTF techniques and experienced players looking for advanced problem-solving approaches.
The challenges span 7 major cybersecurity domains:
| Category | Description | Challenges |
|---|---|---|
| π Steganography | Hidden data extraction, file analysis, metadata forensics | 5 |
| π§ Reverse Engineering | Binary analysis, decompilation, algorithm reconstruction | 2 |
| π Web | Web recon, hidden resources, client-side analysis | 2 |
| π Cryptography | Ciphers, encoding, cryptanalysis | 2 |
| π΅οΈ OSINT | Open-source intelligence, profile tracking | 2 |
| π General | Mandatory challenges, documentation | 1 |
| # | Challenge Name | Category | Flag | Writeup | HTML |
|---|---|---|---|---|---|
| 1 | Welcome Everyone | Web | EOF{f0und_m3_f!nally} |
π MD | π HTML |
| 2 | Sanity Check |
General (Mandatory) | EOF{h3r3_w3_90_4941n} |
π MD | π HTML |
| 3 | Hiding in Plain Sight | Steganography | EOF{u_r_@_ch!ck3n} |
π MD | π HTML |
| 4 | Wrong Number | Crypto, Misc | EOF{4nd4n_w4_d1nw4v4w} |
π MD | π HTML |
| 5 | A Noob's First Milestone | OSINT | EOF{script_kiddie@eofool.com} |
π MD | π HTML |
| 6 | Timeless Melodies | Cryptography | EOF{decrypted_text} |
π MD | π HTML |
| # | Challenge Name | Category | Flag | Writeup | HTML |
|---|---|---|---|---|---|
| 7 | Random Gibberish | Misc, Crypto, Steg | EOF{@stley} |
π MD | π HTML |
| 8 | Banananana | Steganography | EOF{hidden_among_bananananananana} |
π MD | π HTML |
| 11 | Cannon Ball | Web, Steganography | EOF{F0und_!t} |
π MD | π HTML |
| 12 | Amen | Reverse Engineering | EOF{wh3r3_ar3_my_po1n+5} |
π MD | π HTML |
| # | Challenge Name | Category | Difficulty | Flag | Writeup | HTML |
|---|---|---|---|---|---|---|
| 9 | Recursive Hell | Steganography | Expert | EOF{its_a_damn_loop} |
π MD | π HTML |
| 10 | Apples | OSINT | Hard (300 pts) | EOF{apples_apples_everywhere_raaaah} |
π MD | π HTML |
| 15 | Like Finding a Needle in the Hay Stack | Steganography | Hard (500 pts) | EOF{b3war3_!t$_c0m!ng_f0r_u} |
π MD | π HTML |
| 16 | Fooled | Reverse Engineering | Hard (600 pts) | EOF{not_a_foolish_person_ig} |
π MD | π HTML |
Category: Web | Difficulty: Easy | Points: 150
Your first CTF challenge! Find the flag hidden in the Instruo website's JavaScript bundle.
Key Techniques:
- Web source code inspection
- JavaScript bundle analysis
- React SPA reconnaissance
Flag: EOF{f0und_m3_f!nally}
π Full Writeup | π HTML Version
Category: Steganography | Difficulty: Expert
The ultimate recursion nightmare! Navigate through 68 nested ZIP files and 48 layers of Base64 encoding (116 total iterations!) to find the flag.
Key Techniques:
- Binwalk for embedded file detection
- Automated bash scripting for recursion
- Base64 multi-layer decoding
- Pattern recognition
Flag: EOF{its_a_damn_loop}
π Full Writeup | π HTML Version
Category: Misc, Crypto, Steganography | Difficulty: Medium | Points: 200
An elaborate rickroll-themed challenge involving the esoteric NGFYU programming language!
Key Techniques:
- NGFYU (Never Gonna Give You Up) language recognition
- Base64-encoded URL extraction (lines 509 & 1751)
- Google Drive file downloads
- Brightness/contrast image manipulation
Flag: EOF{@stley} (Rick Astley reference!)
π Full Writeup | π HTML Version
Category: Steganography | Difficulty: Hard | Points: 500 | Solves: 0 β
The hardest steganography challenge with multiple fake flags!
Key Techniques:
- PNG structure analysis (data after IEND marker)
- MP3 extraction with binwalk
- Metadata analysis with exiftool (critical: "Needle" field)
- Caesar cipher (+1 shift) with noise obfuscation
Real Flag: EOF{b3war3_!t$_c0m!ng_f0r_u} (Beware, it's coming for you)
Fake Flags:
- β
EOF{this_is_not_a_real_flag} - β
EOF{F00l'$_3rr@nd}(Fool's Errand)
π Full Writeup | π HTML Version
Category: Reverse Engineering | Difficulty: Hard | Points: 600 | Solves: 1 β
The hardest reverse engineering challenge requiring deep binary analysis!
Key Techniques:
- ELF binary decompilation with Ghidra
- Custom encryption algorithm reverse engineering
- Binary-to-decimal conversion logic
- ASCII hint interpretation (E=69)
- Base64 decoding of flag parts
Flag: EOF{not_a_foolish_person_ig}
π Full Writeup | π HTML Version
sudo apt install binwalk exiftool steghide zsteg- binwalk - Detect and extract embedded files
- exiftool - Metadata analysis for images/audio
- steghide - Hide/extract data in images
- zsteg - PNG/BMP LSB steganography detection
# Ghidra (Download from NSA official site)
# https://ghidra-sre.org/
sudo apt install gdb radare2 objdump ltrace strace- Ghidra - GUI decompiler and disassembler
- GDB - GNU debugger
- radare2 - Command-line reverse engineering framework
sudo apt install hashcat john openssl
pip install pycryptodome- CyberChef - Web-based crypto Swiss Army knife
- hashcat - Password cracking
- john - John the Ripper password cracker
sudo apt install curl wget nmap nikto sqlmap- curl/wget - HTTP clients
- Browser DevTools - JavaScript debugging
- Burp Suite - Web proxy and security testing
sudo apt install file strings hexdump xxd dd unzip 7zip- file - File type identification
- strings - Extract printable strings
- hexdump/xxd - Hex viewers
- dd - Binary data extraction
pip install requests pillow pycryptodome#!/bin/bash
# Install all CTF tools at once
sudo apt update
sudo apt install -y binwalk exiftool steghide file strings hexdump \
xxd dd unzip p7zip-full curl wget python3 python3-pip \
gdb radare2 hashcat openssl nmap
pip3 install requests pillow pycryptodome base64- File structure analysis (PNG, JPEG, MP3)
- Binwalk tutorial
- Audio steganography techniques
- LSB (Least Significant Bit) steganography
| Metric | Value |
|---|---|
| Total Challenges | 14 |
| Categories Covered | 7 |
| Total Points | 3,900+ |
| Tools Used | 25+ |
| Lines of Writeups | 5,000+ |
| HTML Pages | 14 |
Easy (150 pts): ββββββββ 8 challenges
Medium (200 pts): ββββ 4 challenges
Hard (300-600 pts): ββ 2 challenges
Expert: β 1 challenge (Recursive Hell)
Visit our interactive website to explore all challenges with beautiful UI:
π https://gradientgeeks.github.io/instruo-ctf/
Features:
- π¨ Beautiful glassmorphism UI
- π± Fully responsive design
- π Syntax-highlighted code blocks
- π Challenge statistics
- π·οΈ Category badges
- πΎ Downloadable writeups
Found an alternative solution? Want to add a challenge? Contributions are welcome!
- Fork the repository
- Create a feature branch (
git checkout -b feature/new-challenge) - Commit your changes (
git commit -m 'Add new challenge writeup') - Push to the branch (
git push origin feature/new-challenge) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
These writeups are for educational purposes only.
- Always follow responsible disclosure practices
- Respect CTF rules and intellectual property
- Do not use these techniques for unauthorized access
- CTF skills should be used ethically and legally
- IIEST (Indian Institute of Engineering Science and Technology) - For organizing Instruo 2025
- CTF Challenge Creators - For designing engaging and educational challenges
- Gradient Geeks - For maintaining this repository
- Open Source Community - For providing amazing tools like Ghidra, binwalk, and more
- GitHub: @gradientgeeks
- Website: https://gradientgeeks.github.io/instruo-ctf/