EHAXCTF 2025 WriteUp | LuffySec | STELK_CSC
My team, Stelk_CSC, participated in EHAXCTF 2025, completing 4 challenges with a variation of categories Cryptography, Forensic, Reverse Engineering, OSINT, Web, PWN and Misc. securing 152th place out of 729 teams, now I’m gonna share a writeup of some chall that I solved
Now, let’s dive into some of the chall that I solved
Dots & Dashes | 50 Points | Cryptography
We were given an audio file. Playing the audio, it sounds like Morse code beep, beep, beep. Now, I’m going to my go-to place for decoding Morse code. DataBorder
Successfully decoding the morse, now lets put it all into lowercase and putting underscore here is the final :
w0ry3_d1q3n3x3_0x3b4t10t
This is an encrypted flag so we need to find a way to decrypt it, in chall description we saw that key is kagi, so this might be vigenere cipher, decrypting it using vigenere cipher and with the key “kagi”
EHAX{m0rs3_v1g3n3r3_0p3r4t10n}
Tracks | 50 Points | Forensic
We got .mp4 , while analyzing this files I will use foremost to get hidden files inside this, and we got 2 zip file :
There are two ZIP files, one is locked, and the other is not. Unzipping the unlocked one, I found a QR code image.
Scanning the qr code didn’t get me anything, analyzing this files with stegsolve we got the password for the zip file !
Lets use this to unlock the zip file and get the flag.txt
We got the flag.txt but it is encrypted, analyzing this cipher with dcode.fr we know that this is a ROT Encrypted, so lets decrypt this
We got the FLAGG !!