Writeups/1337UP/No Comment
1337UPMediumCTF Challenge

No Comment

No Comment

2024-11-17

##Challenge Name: No Comment

###Solves

  • >Solves: 100
  • >Points: 100

###Description

Or is there? šŸ¤”

###Attachments : ripple.jpg


###Approach

  1. >

    ExifTool Analysis:

    • >The first step was using ExifTool to extract metadata from the image. Among the extracted data, the Comment field contained a potentially useful string:
      /a/pq6TgwS
    • >Other metadata such as image size, width, height, and encoding details were present but didn't seem to lead anywhere on their own.
  2. >

    Decoding the Comment:

    • >Initially, I tried various encoding techniques, but nothing seemed to work. Then, I realized that the comment might be a URL. A quick search confirmed that this was indeed the case—it led to an Imgur page:
      https://imgur.com/a/pq6TgwS
  3. >

    Exploring the Imgur Link:

    • >The Imgur link led to the same image, but with the added bonus of a Base64-encoded caption:
      V2hhdCBhICJsb25nX3N0cmFuZ2VfdHJpcCIgaXQncyBiZWVuIQoKaHR0cHM6Ly9wYXN0ZWJpbi5jb20vRmRjTFRxWWc=

    image1.png
    image1.png

    • >Decoding the Base64 string revealed a Pastebin link:
      What a "long_strange_trip" it's been!
      https://pastebin.com/FdcLTqYg
  4. >

    Visiting Pastebin:

    • >

      The Pastebin link required a password to access the contents. The clue was hidden in the Imgur caption, and I noticed the phrase "long_strange_trip". I tried it as the password, and it worked, unlocking the Pastebin entry.

    • >

      The Pastebin entry contained a long hex string:

      25213a2e18213d2628150e0b2c00130e020d024004301e5b00040b0b4a1c430a302304052304094309

    image2.png
    image2.png

  5. >

    XOR Decryption:

    • >Initially, I tried converting the hex string, but it didn’t return meaningful data. However, the Pastebin message also contained a public paste which hinted about XOR encryption:
      I've been learning all about cryptography recently, it's cool you can just XOR data with a password and nobody can recover it!!

    image3.png
    image3.png

    • >The XOR operation was applied using the password "long_strange_trip". However, the first attempt didn’t give the correct result.
  6. >

    Using CyberChef:

    • >I used CyberChef to perform the XOR decryption. After experimenting with different settings, I ended up with the following recipe: CyberChef XOR Recipe
  7. >

    Discovering the Flag:

    • >The result from CyberChef looked like a URL from Instagram Reels. I filled in the missing parts, which led to the flag:
      INTIGRITI{instagram.com/reel/C7xYShjMcV0}

    image4.png
    image4.png


###Flag

INTIGRITI{instagram.com/reel/C7xYShjMcV0}

$ echo "Open to collaborations, research, and security engineering work."

> Open to collaborations, research, and security engineering work.

$ uptime

> Portfolio online since 2024 | Last updated: Feb 2026

"No one is useless in this world who lightens the burdens of another." — Charles Dickens

Considered a small donation if you found any of the walkthrough or blog posts helpful. Much appreciate :)

Buy me a coffee

Ā© 2026 Shivang Tiwari. Built with Next.js. Hack the planet.