Signin

image-20251115195146483

直接修改分为100

image-20251115195222642

RCTF{W3lc0m3_T0_RCTF_2025!!!}

Speak Softly Love

Challenge 1: Video ID

Even with the limited hardware of that era, this small player could still produce surprisingly gentle melodies. Please help me locate the ID of the original upload of this piece.

附件是一个视频,打开看看

image-20251115185552686

根据题目要找到视频的id,尝试关键词搜索

image-20251115190929963

image-20251115191022030

得到id8ssDGBTssUI

Challenge 2: Code Revision

The developer behind it has quietly maintained his corner of the net for many years. Please help me locate the version entry in the author’s own code history where he introduced a safeguard to prevent endless “soft error” loops caused by missing playlist items.

在视频的简介中

image-20251115191110292

会跳转到这个网站

image-20251115191326682

在下边找到

image-20251115191127303

在其主网站Mateusz Viste - homepage

image-20251115191350774

跟进

image-20251115191642680

把题目给ai看看

image-20251115191840191

知道是在0.9修复了

image-20251115191904472

image-20251115192027759

去svn中寻找

image-20251115191911153

找到r178

image-20251115192436796

Challenge 3: Name-pronunciation URL

The developer has quietly maintained his corner of the net for many years. Please help me locate the full URL that points to the recording in which he pronounces his own name.

image-20251115191437927

https://mateusz.viste.fr/mateusz.ogg

Challenge 4: Donation address

The developer has quietly maintained his corner of the net for many years — a place filled with personal tools, archived ideas, and even a way to show appreciation if his work ever brought you something valuable. Please help me locate the address he published for donations in digital currency.

有一个gopher节点

image-20251115191420716

进入

image-20251115192521419

image-20251115192533681

得到地址16TofYbGd86C7S6JuAuhGkX4fbmC9QtzwT

image-20251115192703211

Shadows of Asgard

Background Story
During a red team exercise, Loki the Trickster successfully compromised Thor’s machine and planted a backdoor. Thor discovered the anomaly and identified Loki’s C2 server IP, but as a script kiddie, he only knows how to run directory scanners and has no idea how to counterattack.
In desperation, Thor captured all the network traffic and came to you for help. The AllFather Odin watches from his throne, curious to see if you possess the wisdom to unravel Loki’s schemes.
“In the halls of Asgard, deception wears many faces. Even Huginn and Muninn, Odin’s ravens, struggle to discern truth from illusion when Loki weaves his tricks.”

Challenge 1: The Merchant’s Mask

Loki, master of disguise, never reveals his true intentions at first glance. His C2 server hides behind a false front—a seemingly legitimate corporate website designed to fool mortal eyes.

What is the name of the company Loki used as camouflage on his C2 server’s front page?

image-20251115195517232

渊恒科技

Challenge 2: The Parasite’s Nest

Like a serpent hiding in Yggdrasil’s roots, Loki’s backdoor didn’t run standalone—it parasitized an existing process on Thor’s machine to avoid detection.

Identify the complete file path where Loki’s C2 agent was running.

在第六个流中,有aeskey和aesiv,还有data,

image-20251115195751802

key和iv解base64后在解decimal,后to hex得到hex格式的密钥

image-20251115195944866

image-20251115200018121

iv进行同样的操作,之后解密data

image-20251115200123843

得到C:\\Users\\dell\\Desktop\\Microsoft VS Code\\Code.exe

image-20251115193737404

Challenge 3: The Hidden Rune

Loki commanded his agent to reveal its current working directory. But the Trickster is never straightforward—his commands are hidden in layers of encryption and steganography.

What is the taskId for the pwd command that Loki executed?

继续解密流量

image-20251115200316854

发现上传的图片也有内容,解密

image-20251115200349799

继续

image-20251115200405913

得到idc0c6125e

image-20251115200422656

Challenge 4: The Forge of Time

In Midgard, every realm has its moment of creation. Loki probed Thor’s machine to learn when its primary storage was first forged.

When was Thor’s C: drive created?

解密

image-20251115200516380

2018-09-14 23:09:26

Challenge 5: Raven’s Ominous Gift

“Two ravens sit upon Odin’s shoulders: Huginn (thought) and Muninn (memory). But there is a third raven in Norse tales—one that follows Loki, a harbinger of mischief. They say this raven is inauspicious, a dark omen of trickery to come.”

In the final act of his infiltration, Loki left behind a parting gift—a file hidden in plain sight on Thor’s compromised machine. This raven’s message contains the truth you seek.

What secret message did Loki hide in the file he uploaded?

解密这个

image-20251115200646404

image-20251115200639688

image-20251115200716791

得到RCTF{they always say Raven is inauspicious}

最后得到flagRCTF{Wh3n_Th3_R4v3n_S1ngs_4sg4rd_F4lls_S1l3nt}**

image-20251115200748915

Asgard Fallen Down

“Asgard fallen down, fallen down, fallen down,
Asgard fallen down, my fair lightning…”

The first breach was a lesson. The second breach was a catastrophe.

Loki returned, not with louder thunder, but with deeper silence. He learned from his defeat—learned that the best place to hide is not in darkness, but in the blinding light of chaos. This time, when he struck, he did so while Thor himself hammered at his gates.

Thor, determined to turn the tables, launched a full assault on Loki’s C2 infrastructure. Vulnerability scanners roared like Mjölnir’s thunder. Directory brute-forcers swept like Heimdall’s gaze across every path. The network burned with the fury of Asgard’s vengeance.

But Loki had already won.

Challenge 1: The First Command

After successfully infiltrating Thor’s machine, Loki’s agent came to life. Like all beginnings, the first action reveals intent.

Hidden among thousands of scanning requests and server responses, Loki issued his opening move—the first command that set his plan in motion.

Question: What was the first command Loki executed after his agent established connection?

Flag Format: complete_command (The exact command Loki sent to the agent)

干扰的流量太多,不太好找

在流207中发现类似连接成功的流量

image-20251116110639030

解码看看,看到了熟悉的进程

image-20251116110809836

同时我们注意到,响应包中有三个奇怪的base64字符串

image-20251116110937768

解码看一下,发现第一个长度是32,第二个是16,猜测为AES的key和iv

image-20251116111033684

image-20251116111106947

继续往后看,在之后紧跟着的包中看到,一串神秘的base64

image-20251116111601870

使用之前得到的密钥和iv可以成功解密

image-20251116111644386

得到命令spawn whoami

然后在之后的

image-20251116111745750

得到命令执行结果

image-20251116111818134

Challenge 2: The Heartbeat

Thor’s attacks were chaotic—random intervals, sporadic bursts, the rhythm of fury. But Loki’s agent operated with cold precision.

Buried in the noise, the agent sent regular heartbeats back to its master, each pulse proving it remained alive and obedient. These signals followed a steady cadence, mechanical and unwavering.

Find the pattern. Find the pulse.

Question: How many seconds passed between each heartbeat of Loki’s agent?

Flag Format: integer (e.g., 30)

很明显之前的命令执行过程含有心跳包机制,在207流中很明显看到时间间隔是10s

image-20251116112202666

Challenge 3: The Heart of Iron

“Every warrior has a heart that drives them. For mortals, it beats with blood. For machines, it pulses with silicon and electricity. Loki, ever curious, sought to know the very core of Thor’s weapon—the processor that powers his digital fortress.”

During his infiltration, Loki commanded his agent to enumerate the environment, cataloging every detail of Thor’s system. Among the mundane variables and paths, one piece of information reveals the machine’s very identity—its processor, the beating heart of computation.

Like a smith examining the forge that created a sword, Loki identified the specific metal and make of Thor’s processor.

Question: What processor model powers Thor’s machine?

Flag Format: Complete_Processor_Model_String (e.g., Intel64 Family 6 Model 85 Stepping 4, GenuineIntel

继续解密即可

image-20251116112550500

image-20251116112611689

找到响应包解密

image-20251116112646706

image-20251116112521084

得到答案Intel64 Family 6 Model 191 Stepping 2, GenuineIntel

Challenge 4: Odin’s Eye

“Odin sacrificed his eye to drink from Mimir’s well and gain wisdom. Loki needs no such sacrifice—he simply steals the sight of others.”

In the final moments before vanishing, Loki commanded his agent to capture what Thor’s own eyes were seeing—a snapshot of the screen, frozen in time. Within this stolen image lies evidence of Thor’s own weapons, the very tools he was using to hunt Loki.

The irony is exquisite: Thor’s scanner, visible on his own screen, was documented by the very enemy he sought to find.

Question: According to the screenshot Loki exfiltrated, which vulnerability scanning tool was Thor running at that moment?

Flag Format: ToolGithubRepoName (e.g., if the tool’s repository is https://github.com/user/AwesomeTool, answer AwesomeTool)

搜索关键词build:20251115可在2787流中找到本题的执行命令

image-20251116113005884

image-20251116113112882

发现之后有很多大块的响应包,猜测是可能图片base64后太大一次不好传输于是分段传输

正则匹配,解密

image-20251116110336585

不知道为啥cbc没解出来,cbcnopadding出了

解密result

image-20251116110321548

得到图片,工具是TscanPlus

image-20251116113502932

Wanna Feel Love

She only wanted to sing.
She wants to tell you.
She just feels love.

Challenge 1

She only wanted to sing, but her voice was hidden in silence. What is this email trying to tell you? Look beyond what you hear — seek the whispers in the shadows, the comments that were never meant to be seen.

打开eml文件

image-20251116215044385

邮件的内容感觉很眼熟,像我给新生出的垃圾邮件题,丢进去看看

image-20251116215156597

得到Don't just listen to the sound; this file is hiding an 'old relic.' Try looking for the 'comments' that the player isn't supposed to see.

Challenge 2

She wants to tell you something, encoded in melodies. Within the digital symphony, her true voice emerges. What is the hidden message found in the XM file? The words she longed to sing, the feeling she wanted to share.

把附件提取出来

image-20251116215313285

导出后在开头和结尾发现

image-20251116215746227

image-20251116215816346

没搜到openmrt,但是

image-20251116220841303

怎么感觉出题人写错了,下载mpt导入看看

image-20251116220946906

看到了类似摩斯密码的东西,但是不是,放大仔细看看

image-20251116221045695

发现间隔非常整齐,50ms,猜测是01串

手敲一下

image-20251116221813122

I Feel Fantastic heyheyhey

Challenge 3

She just feels love, and her legend once spread across YouTube. Her song touched hearts, but the original video on the YouTube platform has been removed — deleted, re-uploaded, distorted, like memories fading with time. Through the fragments of public records, find where her voice first echoed: the original video ID, upload date (YYYY-MM-DD), and the one who first shared her song.

搜索I Feel Fantastic heyheyhey

image-20251116221959529

吓人什么东西

image-20251116222256834

image-20251116222355950

image-20251116222837469

在wiki和yutube上找到一些关键信息

I Feel Fantastic - YouTube还有其他网站可以找到

image-20251116223711924

Video Id -rLy-AwdCOmI

Upload Date -2009-04-15

Uploader-Creepyblog

同时ai也可以直接做出来

image-20251116223731955

Challenge 4

Her creator captured her voice, preserved in a 15-minute audio/video DVD. She only wanted to sing, and he gave her that chance. If you wish to purchase her album, to hear her songs of love, which link should you visit? After purchasing, who is the sender? And what is the actual creation year when these musical compositions first came to life?

Purchase Link-Android Music Videos

Sender - Chris Willis

Creation Year - 2004

image-20251116223818601

image-20251116223858329

image-20251116223911087

我最开始以为是那个paypal的地址,但是是这个网站的地址,继续在下边这给网站中可以找到其他信息

image-20251116224022605

image-20251116224116159

image-20251116224302565

同时结合这个图,确定发送者是Chris Willis

image-20251116224149502

时间2004年

Challenge 5

Some called her creator a murderer, others said he built her out of love. She only wanted to sing. She wants to tell you. She just feels love. The truth lies in older archives — an obituary, a quiet memorial, where the story of her creator rests in digital silence. Find the developer’s digital grave. (URL, no trailing slash)

medium的评论区找到

image-20251116224438114

image-20251116224516676

RCTF{sh3_ju5t_f33ls_l0v3_thr0ugh_w1r3s_4nd_t1m3}