Add smiley challenge, the first easy one!
This commit is contained in:
parent
292f9f4ce0
commit
4676e2bd7c
|
@ -4,10 +4,13 @@ FROM python:3.7 as build
|
|||
RUN pip install pipenv
|
||||
|
||||
WORKDIR /app
|
||||
COPY . /app
|
||||
COPY Pipf* /app/
|
||||
|
||||
RUN pipenv install --system --deploy --ignore-pipfile
|
||||
|
||||
COPY . /app
|
||||
|
||||
|
||||
RUN mkdocs build
|
||||
|
||||
FROM nginx:alpine
|
||||
|
|
|
@ -1,6 +1,12 @@
|
|||
# Easy challenges
|
||||
> These challenges are considered easy, they basically guide you to what to do. Do remember to read everything correctly okay?
|
||||
|
||||
## Smile!
|
||||
That is what the message your friend sent contained, and this weird picture of a smiley. You vaguely remember something about JPG files being able to hide other info inside of it. Try to find what it is!<br>
|
||||
![:oof:](/img/smiley.jpg)<br>
|
||||
<input id="smileFlag" placeholder="flag{xxx}" autocomplete="off" maxlength=40><button onClick="check('smile', 'smileFlag')">Check!</button>
|
||||
|
||||
|
||||
## Finally
|
||||
You are not a master yet, but you can get closer [here](/medium)
|
||||
<script src="/js/verify.js"></script>
|
3
docs/extra.css
Normal file
3
docs/extra.css
Normal file
|
@ -0,0 +1,3 @@
|
|||
img {
|
||||
max-width: 200px !important;
|
||||
}
|
BIN
docs/img/smiley.jpg
Normal file
BIN
docs/img/smiley.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 74 KiB |
|
@ -7,5 +7,10 @@ There are different levels of challenges, easy, medium and hard. The premise of
|
|||
## Prerequisites
|
||||
It can be useful to know a bit about Linux commands and the like, things like `ls` and `cd` are quite useful to know how to use. It is also recommended to use a Linux VM or actual install to do these challenges, since all the challenges are ran in Linux VM's.
|
||||
|
||||
## Some more info
|
||||
* All of the flags are in the format `flag{xxxx}` where `xxxx` is an hexadecimal MD5 hash (remember to decrypt them [somehow](https://www.md5online.org/md5-decrypt.html))
|
||||
* Sometimes you'll be given a link to a site, a text file or an image. Feel free to try and figure out how it works but don't actually break anything please
|
||||
* For some of the challenges you might need a reverse shell or something like that, that can be hard to set up on your home network without port forwarding some things, I'll try to make all the challenges completable without forwarding, but sometimes a public IP like one you get at the TU might be useful.
|
||||
|
||||
## Are you ready?
|
||||
[Aye aye, captain!](/easy)
|
|
@ -17,7 +17,7 @@
|
|||
1. Hack into the server
|
||||
2. Read the hidden password (format=`flag{xxx}`)
|
||||
3. Fill in your flag below and check if it is right!
|
||||
4. <input id="johnFlag"><button onClick="check('johndoor', 'johnFlag')">Check!</button>
|
||||
4. <input id="johnFlag" placeholder="flag{xxx}" autocomplete="off" maxlength=40><button onClick="check('johndoor', 'johnFlag')">Check!</button>
|
||||
|
||||
|
||||
## Finally
|
||||
|
|
|
@ -16,4 +16,9 @@ repo_url: https://gitlab.voidcorp.nl/jdejeu/ctf-site
|
|||
edit_uri: blob/master/docs/
|
||||
site_author: Julius de Jeu
|
||||
site_description: A site with a bunch of challenges!
|
||||
site_url: https://challenges.voidcorp.nl
|
||||
site_url: https://challenges.voidcorp.nl
|
||||
|
||||
markdown_extensions:
|
||||
|
||||
extra_css: [/extra.css]
|
||||
google_analytics: ["UA-97849307-2", "challenges.voidcorp.nl"]
|
Loading…
Reference in a new issue