KashiCTF 2025 WriteUp | LuffySec | STELK_CSC
My team, Stelk_CSC, participated in KashiCTF 2025, completing 10 challenges with a variation of categories Cryptography, Forensic, Reverse Engineering, OSINT, Web, Misc and PWN. securing 156th place out of 753 teams, now I’m gonna share a writeup of some chall that I solved
Restaurant | 152 Points | Forensic
In this challenge, we’re given a JPG file, and the challenge description says, “Maybe in the END, they may give something real.” So, I already know that we need to dump the hex of the file and examine the end of the line.
So we see in the end of the hexdump we got a text with repeated “a” and “b” putting this text into cipher identifier, it identify it as a bacon cipher so lets decode this and get the flag
Flag : KashiCTF{THEYWEREREALLLLYCOOKING}
Game 1 — Untitled Game | 100 Points | Reverse Engineering
So this is a simple challenge if you think simply. We don’t even need to open the game. All I do is use strings and grep the word “Kashi”, this will return the flag.
Flag : KashiCTF{N07_1N_7H3_G4M3}
Memories Bring Back You | 100 Points | Forensic
We were provided with a disk file, which is likely an image of a storage device (such as a hard drive, USB drive, or other digital media). To analyze its contents, we are using FTK Imager, a forensic tool widely used for viewing, extracting, and analyzing disk images in digital forensics.
As you can see, after opening the disk file in FTK Imager, we navigated to the Recycle Bin folder and found some JPG images. By opening these images one by one, we discovered a flag file inside one of them.
Flag : KashiCTF{DF1R_g03555_Brrrr}
Corruption | 100 Points | Forensic
This is a corrupt drive so we cant open them, first thing I will do is using strings and grep for keywords “Kashi” and we got the flag
Flag : KashiCTF{FSCK_mE_B1T_by_b1t_Byt3_by_byT3}
This is it for my KashiCTF 2025 WriteUp, Hope I can solve more chall in further CTF Events !