misc

Challenges

Null Sanity

Are you ready for another great Nullcon event in Berlin?!

Awesome! Here's a first flag for your sanity: ENO{Let's_H4ve_S0m3_FuN_In_Berlin!}

  • ENO{Let's_H4ve_S0m3_FuN_In_Berlin!}

usbstorage

I attached my friend's USB drive to my laptop and accidently copied a private file, which I immediately deleted. But my friend still somehow got the file from looking at the USB message their drive recorded...

usbstorage.pcapngarrow-up-right

circle-check
  • Now onto the second (intended?) solution, the pcapng file us usb mass stoarge messages hidden (hence the name).

The other approach requires parsing the pcapng file to extract USB bulk OUT transfers, which contain the actual data written to the storage device. Here's how it works:

  • Step 1: Extract Frame Data Parses each frame in the packet capture, identifying USB bulk transfer packets and extracting their payloads. It correlates frame numbers with their corresponding data lengths to ensure accurate reconstruction.

  • Step 2: Hexdump Parsing: Parses hexdump-formatted output, extracting only the relevant hex bytes while ignoring ASCII representations.

  • Step 3: Data Reconstruction By taking the last usb.data_len bytes from each frame (representing the bulk OUT payload), reconstructs the complete data stream that was written to the USB storage device.

  • Step 4: File Carving The reconstructed binary data contains a gzip-compressed tar archive starting at byte offset 24576.

If you are a visual learner~ here da go 🐧

circle-info

Script

  • ENO{USB_STORAGE_SHOW_ME_THE_FLAG_PLS}

atruecryptographer

You know what I like most? Nullcon aftermovies and Kerckhoffs's principle! But since I'm a true cryptographer and a 1337 h4xx0r, I can even provide you my password without you ever finding my secrets: U"gkXYg;^#qXxJ(jm*jKik|N/gezj7)z

My question is: Are you a true cryptographer, too? Prove it by finding my secret!

https://static.enoflag.de/nullconctfberlin2025/nullcon-aftermovie.mp4arrow-up-right

circle-check
  • Mount the volume in TrueCrypt:

    • In TrueCrypt, click "Select File..."

    • Browse to and select the downloaded "aftermovie.mp4" file

    • Click "Mount"

  • ENO{Tru3_Cryp7_St3G0_F04_Ze_W1n!}

  • Tbh, this sh baffled me.

Last updated