waifuku

Category
Forensics
Points
-1
Solves
-1
Tags

pecinta waifu ternyata seorang info stealer? hahh 🥶🥶 bongkar semua kedoknya dia

format flag: FindITCTF

by hilmo


Forensics but we got a website???

alt text

There is a form to submit our waifu. Let’s try submitting one.

alt text

After submission, a message pops up.

alt text

So, this likely involves some JavaScript code that runs on the page and possibly makes a request to the backend server. However, the message looks like regular JavaScript execution, so we take a closer look at the source code.

alt text

Since the JavaScript code is obfuscated, I decided to inspect the function and variable contents directly from the browser console.

alt text

By copying the content of the simpasini() function and inspecting the _0x299de0 variable, I discovered what looks like a Telegram Bot token: 7631745946:AAH0cnRjlUV-BEWRL8Jd9m_QHh1gNU6izlQ.

This appears to be a valid bot token. Let’s try checking the bot’s update history using Telegram’s API:

curl -X GET "https://api.telegram.org/bot7631745946:AAH0cnRjlUV-BEWRL8Jd9m_QHh1gNU6izlQ/getUpdates"

At the time of writing this, unfortunately, the updates are already gone—perhaps this method was unintended. However, earlier during the event, I was able to view some Telegram updates. The messages contained files uploaded to the bot and a few strings in Unicode format, which can be decoded into readable text.

After trying to download some of the uploaded files, I found one file that contained the flag.

curl https://api.telegram.org/file/bot7631745946:AAH0cnRjlUV-BEWRL8Jd9m_QHh1gNU6izlQ/documents/file_1.exe -o file_1.exe

Running the strings command on file_1.exe gives us some interesting strings. One of them is FindITCTF, which is exactly what we are looking for.

strings file_1.exe | grep "FindIT"

alt text

waifuku Flag: FindITCTF<s3m4ng4t_P4G1__________h1dup_N4Rut00000>