Add smiley challenge, the first easy one!

merge-requests/1/head
Julius de Jeu 2019-06-13 21:41:08 +02:00
parent 292f9f4ce0
commit 4676e2bd7c
7 changed files with 25 additions and 3 deletions

View File

@ -4,10 +4,13 @@ FROM python:3.7 as build
RUN pip install pipenv
WORKDIR /app
COPY . /app
COPY Pipf* /app/
RUN pipenv install --system --deploy --ignore-pipfile
COPY . /app
RUN mkdocs build
FROM nginx:alpine

View File

@ -1,6 +1,12 @@
# Easy challenges
> These challenges are considered easy, they basically guide you to what to do. Do remember to read everything correctly okay?
## Smile!
That is what the message your friend sent contained, and this weird picture of a smiley. You vaguely remember something about JPG files being able to hide other info inside of it. Try to find what it is!<br>
![:oof:](/img/smiley.jpg)<br>
<input id="smileFlag" placeholder="flag{xxx}" autocomplete="off" maxlength=40><button onClick="check('smile', 'smileFlag')">Check!</button>
## Finally
You are not a master yet, but you can get closer [here](/medium)
<script src="/js/verify.js"></script>

3
docs/extra.css Normal file
View File

@ -0,0 +1,3 @@
img {
max-width: 200px !important;
}

BIN
docs/img/smiley.jpg Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 74 KiB

View File

@ -7,5 +7,10 @@ There are different levels of challenges, easy, medium and hard. The premise of
## Prerequisites
It can be useful to know a bit about Linux commands and the like, things like `ls` and `cd` are quite useful to know how to use. It is also recommended to use a Linux VM or actual install to do these challenges, since all the challenges are ran in Linux VM's.
## Some more info
* All of the flags are in the format `flag{xxxx}` where `xxxx` is an hexadecimal MD5 hash (remember to decrypt them [somehow](https://www.md5online.org/md5-decrypt.html))
* Sometimes you'll be given a link to a site, a text file or an image. Feel free to try and figure out how it works but don't actually break anything please
* For some of the challenges you might need a reverse shell or something like that, that can be hard to set up on your home network without port forwarding some things, I'll try to make all the challenges completable without forwarding, but sometimes a public IP like one you get at the TU might be useful.
## Are you ready?
[Aye aye, captain!](/easy)

View File

@ -17,7 +17,7 @@
1. Hack into the server
2. Read the hidden password (format=`flag{xxx}`)
3. Fill in your flag below and check if it is right!
4. <input id="johnFlag"><button onClick="check('johndoor', 'johnFlag')">Check!</button>
4. <input id="johnFlag" placeholder="flag{xxx}" autocomplete="off" maxlength=40><button onClick="check('johndoor', 'johnFlag')">Check!</button>
## Finally

View File

@ -16,4 +16,9 @@ repo_url: https://gitlab.voidcorp.nl/jdejeu/ctf-site
edit_uri: blob/master/docs/
site_author: Julius de Jeu
site_description: A site with a bunch of challenges!
site_url: https://challenges.voidcorp.nl
site_url: https://challenges.voidcorp.nl
markdown_extensions:
extra_css: [/extra.css]
google_analytics: ["UA-97849307-2", "challenges.voidcorp.nl"]