🚀
v13vv/GitBook
🚀
v13vv/GitBook
  • 🌌About this blog
  • The Author
    • v13vv
  • 2025
    • TryHackMe
    • HackTheBox
    • TheCyberMentor
    • PNPT
    • CPTS
    • AZ-500
  • 2024
    • CTFs
      • idekCTF 2024
        • misc/NM~~PZ~~ - easy
      • 🐭Bandit - OverTheWire
        • Bandit 0
        • Bandit 1 ( level 0->1 )
        • Bandit 2 ( level 1->2 )
        • Bandit 3 ( level 2->3 )
        • Bandit 4 ( level 3->4 )
        • Bandit 5 ( level 4->5 )
      • 🐯Natas - OverTheWire
        • Natas 0
        • Natas 1 ( level 0->1 )
        • Natas 2 ( level 1->2 )
        • Natas 3 ( level 2->3 )
    • Security+ Labs
      • ⛑️CompTIA Security+ - 101Labs.net
        • Lab 41 – Getting a reverse shell on a server through a file upload
        • Lab 42 – Manual privilege escalation using python
    • WEB SECURITY
      • 🍊Web Security Academy - PortSwigger
        • Burp Suite Setup on Kali Linux
        • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
        • Lab: SQL injection vulnerability allowing login bypass
        • Lab: Reflected XSS into HTML context with nothing encoded
    • NETWORKING
      • 🌊Wireshark Labs - Jim Kurose Homepage
        • Getting Started
    • POST-QUANTUM CRYPTOGRAPHY
      • A Study of Algorithms Development for Post-Quantum Cryptography
        • NIST Post-Quantum Cryptography Standardization
          • Call for Proposals in Security Aspect
          • Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process
          • KEM / Digital Signature
            • Kyber
              • What is Kyber ?
                • Module Learning With Errors (M-LWE)
              • Kyber Cryptanalysis
                • Timing Attack
Powered by GitBook
On this page
  • What is SSS ?
  • Where do I get the shares ?
  • Obtain the flag !
  1. 2024
  2. CTFs
  3. idekCTF 2024

misc/NM~~PZ~~ - easy

PreviousidekCTF 2024NextBandit - OverTheWire

Last updated 9 months ago

In this challenge, idek provide you a website contains of random locations, and a file named "nmpz1.tar.gz".

After I scrolled down the page, there's this one instruction box.

Okay, so, what's the "SSS" anyway ? What about the "shares" ? And what do you mean by solving 9/10 challenges ? Where do I solve it ? Those are the key questions.

What is SSS ?

In the instruction box you'll already notice that it's a link, and this is the link:

The SSS in our scenario stands for "Shamirs Secret Sharing".

The most easy-understanding way to definite this algorithm is that: You have to find all of the keys in order to reveal the secret. And we call the keys "shares".

Where do I get the shares ?

You get the shares by solving the challenges. What challenges ? They're in the random locations that idek already provided in the website. In each locations, you got the name from idek i.e. "red light", "fedex", "on_the_beach". (The names I provide aren't the real names they used in the challenges.) Once you clicked in the location, the page provide you a kind of google street view, but you can't move. You can only zoom in or zoom out. The way to solve each challenges is that you have to pin the location of that google street view ( in the range of 50 metres ). If correct, then you get 1 share. You have to solve 9 problems to pass the challenge.

Obtain the flag !

Assume that you finished searching for all the shares already. The next step is to get the flag for this challenge. Remember the file that idek provided us ? That's where we get the flag.

Let's decompress the file.

tar -xzvf nmpz1.tar.gz

You get the "attachments" directory with a python file named "flag.py" inside. Let's try to run the file.

python3 attachments/flag.py

Now input all the shares you got into the program. It will return the flag as the output. And this is how I solved my first ever CTF.

The challenge
The website
The file
Instruction
media.geeksforgeeks.org/wp-content/uploads/20200422125425/Untitled-112-1024x520.jpg
You need to pin the location based on the street view you're seeing.
nmpz1.tar.gz
Decompressed
Run file
Shamir's secret sharingWikipedia
Logo