misc
Challenges

Null Sanity

Are you ready for another great Nullcon event in Berlin?!
Awesome! Here's a first flag for your sanity: ENO{Let's_H4ve_S0m3_FuN_In_Berlin!}
ENO{Let's_H4ve_S0m3_FuN_In_Berlin!}
usbstorage

I attached my friend's USB drive to my laptop and accidently copied a private file, which I immediately deleted. But my friend still somehow got the file from looking at the USB message their drive recorded...
tl;dr: Well I'm pretty sure the intended solution was not simply carve the file out using dd or binwalk, but it is what it is. My teammate tnishamon was grinding on the second solution for this one (which is quite funny since bro was literally fighting for his life with this challenge and the atruecryptographer challenge frame by frame).
Now onto the second (intended?) solution, the pcapng file us usb mass stoarge messages hidden (hence the name).
The other approach requires parsing the pcapng file to extract USB bulk OUT transfers, which contain the actual data written to the storage device. Here's how it works:
Step 1: Extract Frame Data Parses each frame in the packet capture, identifying USB bulk transfer packets and extracting their payloads. It correlates frame numbers with their corresponding data lengths to ensure accurate reconstruction.
Step 2: Hexdump Parsing: Parses hexdump-formatted output, extracting only the relevant hex bytes while ignoring ASCII representations.
Step 3: Data Reconstruction By taking the last
usb.data_lenbytes from each frame (representing the bulk OUT payload), reconstructs the complete data stream that was written to the USB storage device.Step 4: File Carving The reconstructed binary data contains a gzip-compressed tar archive starting at byte offset 24576.
If you are a visual learner~ here da go 🐧
ENO{USB_STORAGE_SHOW_ME_THE_FLAG_PLS}
atruecryptographer

You know what I like most? Nullcon aftermovies and Kerckhoffs's principle! But since I'm a true cryptographer and a 1337 h4xx0r, I can even provide you my password without you ever finding my secrets: U"gkXYg;^#qXxJ(jm*jKik|N/gezj7)z
My question is: Are you a true cryptographer, too? Prove it by finding my secret!
https://static.enoflag.de/nullconctfberlin2025/nullcon-aftermovie.mp4
The challenge name is hinting towards this...osint as its finest. The MP4 is actually a TrueCrypt volume. That rat is disguised as a video file but is actually a TrueCrypt encrypted container. So to solve this. Download TrueCrypt, and then shkaboom.
Mount the volume in TrueCrypt:
In TrueCrypt, click "Select File..."
Browse to and select the downloaded "aftermovie.mp4" file
Click "Mount"


ENO{Tru3_Cryp7_St3G0_F04_Ze_W1n!}Tbh, this sh baffled me.
Last updated