EHAXCTF 2025 WriteUp | LuffySec | STELK_CSC

Hack4Fun Academy
3 min readFeb 17, 2025

--

My team, Stelk_CSC, participated in EHAXCTF 2025, completing 4 challenges with a variation of categories Cryptography, Forensic, Reverse Engineering, OSINT, Web, PWN and Misc. securing 152th place out of 729 teams, now I’m gonna share a writeup of some chall that I solved

Now, let’s dive into some of the chall that I solved

Dots & Dashes | 50 Points | Cryptography

We were given an audio file. Playing the audio, it sounds like Morse code beep, beep, beep. Now, I’m going to my go-to place for decoding Morse code. DataBorder

Successfully decoding the morse, now lets put it all into lowercase and putting underscore here is the final :

w0ry3_d1q3n3x3_0x3b4t10t

This is an encrypted flag so we need to find a way to decrypt it, in chall description we saw that key is kagi, so this might be vigenere cipher, decrypting it using vigenere cipher and with the key “kagi”

EHAX{m0rs3_v1g3n3r3_0p3r4t10n}

Tracks | 50 Points | Forensic

We got .mp4 , while analyzing this files I will use foremost to get hidden files inside this, and we got 2 zip file :

There are two ZIP files, one is locked, and the other is not. Unzipping the unlocked one, I found a QR code image.

Scanning the qr code didn’t get me anything, analyzing this files with stegsolve we got the password for the zip file !

Lets use this to unlock the zip file and get the flag.txt

We got the flag.txt but it is encrypted, analyzing this cipher with dcode.fr we know that this is a ROT Encrypted, so lets decrypt this

We got the FLAGG !!

This is it for EHAXCTF 2025 Writeup, Hope I can solve more chall on the next edition of this CTF :D

--

--

Hack4Fun Academy
Hack4Fun Academy

Written by Hack4Fun Academy

Community that teach u all about hacking world, Founder LuffySec

No responses yet