Skip to content

mfput/CTF-Questions

Repository files navigation

CTF-Questions

These are beginner CTF questions for the Forensic and Security Technology club at Cal Poly Pomona.
Most of these questions are Forensic/Crypotgraphy challenges.
Answers/how-to will eventually be posted the the FAST blog. Hints for each question are available in hints.txt Answers are on my Blog. Like my work? Donate here: https://buymeacoffee.com/forensicnoobsecurity

Forensic/Cryptograpy Challenge 1:

Points: 175
File: file1.wav
Question: We've sent the following secret message on a secret channel on your Pokegear.
Answer: https://forensicnoobsecurity.blogspot.com/2019/01/detecting-audio-steganography-cal-poly.html

Forensic Challenge 2:

Points: 70
File: file2.JPG
Question: This is a generic picture. What is the exposure time of this photograph?
Answer:https://forensicnoobsecurity.blogspot.com/2019/02/viewing-exif-data-fast-ctf-challenge-2.html

Forensic/Cryptograpy Challenge 3:

Points 250
File: file3.png
Question: Nothing unusal about a FAST logo right! Format: "FASTCTF{FLAG}"
Answer:https://forensicnoobsecurity.blogspot.com/2019/02/image-steganography-and-cryptography.html

Forensic/Cryptograpy Challenge 4:

Points 225
File: file4
Question: The flag is in there somewhere, I swear. Format: "fastctf{flag}"
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/cal-poly-fast-ctf-challenge-4-cracking.html

Programming Challenge 5:

Points 100
File: file5.exe
Question: Here's a simple C program. What's the password? Format: "fastctf{flag}"
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/buffer-overflows-cal-poly-fast-ctf.html

Forensic Challenge 6:

Points: 200
File: file6.E01
Question: What is the exact original modification time by the kernel of the document "New Text Document.txt"? Format: YYYY-MM-DD HH:MM:SS.SSSSSS
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/detecting-timestomped-values-cal-poly.html

Forensic Challenge 7:

Points: 150
File: file7.JPEG
Question: The flag is in this image. What is it? Format: fastctf{flag}
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/image-anti-forensics-cal-poly-fast-ctf.html

Forensic Challenge 8:

Points: 125
File: file8.zip
Question: What is the MAC address of the computer these files originated from? (Hex in lower case)
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/lnk-forensics-cal-poly-fast-ctf.html

Forensic/Cryptography Challenge 9:

Points: 75
File: file9.zip
Question: What is the name of the executable with the MD5 hash of cdc47d670159eef60916ca03a9d4a007 that performs a malicious task? (Don't worry none of these will actually harm your computer).
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/md5-collisions-cal-poly-fast-ctf.html

Programming/Retard Challenge 10:

Points: 30
File: file10.zip
Question: The flag is inside this Windows Batch file.
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/retard-test-cal-poly-fast-ctf-challenge.html

Forensic Challenge 11:

Points: 125
File: file11.txt
Question: Find the flag in this text document!
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/bit-shifting-cal-poly-fast-ctf.html

Forensic Challenge 12:

Points: 150
File: file12.zip
Question: When was the flag deleted? Format: "YYYY-MM-DD HH:MM:SS"
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/recycle-bin-forensics-cal-poly-fast-ctf.html

Forensic Challenge 13:

Points: 100
File: Security
Question: How many interactive logons were there on this machine?
Answer: https://forensicnoobsecurity.blogspot.com/2019/12/windows-event-log-forensics-cal-poly.html

Forensic Challenge 14:

Points: 70
File: Security
Question: What was the timestamp when Patrick last logged off? FORMAT: M/DD/YYYY
Answer: https://forensicnoobsecurity.blogspot.com/2019/12/windows-event-log-forensics-cal-poly_1.html

Forensic Challenge 15:

Points: 110
File: Security
Question: How many times did VMware tools change the system time?
Answer: https://forensicnoobsecurity.blogspot.com/2020/05/searching-for-specific-processes-in.html

Forensic Challenge 16:

Points: 150
File: NTUSER.DAT
Question: What is the target name of the least recent most recent document opened in explorer?
Answer: https://forensicnoobsecurity.blogspot.com/2020/05/finding-most-recent-document-opening.html

Forensic Challenge 17:

Points: 150
File: NTUSER.DAT
Question: What is the 2nd command ran in the Windows run dialog box?
Answer: https://forensicnoobsecurity.blogspot.com/2020/05/run-dialog-forensics-cal-poly-ctf.html

Forensic Challenge 18:

Points: 200
File: NTUSER.DAT
Question: How many times was minesweeper run? FORMAT: ##
Answer: https://forensicnoobsecurity.blogspot.com/2020/05/user-assist-forensics-cal-poly-fast-ctf.html

Forensic Challenge 19:

Points: 200
File: NTUSER.DAT
Question: When was the last date ProcMon.exe was run? FORMAT: YYYY-MM-DD
Answer: https://forensicnoobsecurity.blogspot.com/2020/05/user-assist-forensics-2-cal-poly-fast.html

Forensic Challenge 20:

Points: 100
File: NTUSER.DAT
Question: What is the exact version of Google Chrome installed?
Answer: https://forensicnoobsecurity.blogspot.com/2020/05/find-chrome-version-from-windows.html

Forensic Challenge 21:

Points: 100
File: NTUSER.DAT
Question: What is the exact URL of the start page for Internet Explorer?
Answer: https://forensicnoobsecurity.blogspot.com/2020/05/finding-homepage-in-windows-registry.html

Like my work? Donate here: https://buymeacoffee.com/forensicnoobsecurity
Future questions: PCAPs - CDP, WEP, SMB file share, printing, word document, excel formula, PDF forensics, morse binary

About

These are beginner CTF questions for the Forensic and Security Technology club at Cal Poly Pomona.

Resources

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published