Skip to content
CTF

CTF Miscellaneous

Esoteric languages, encoding chains, OSINT, and unusual challenges

Esoteric Languages

Brainfuck

TEXT
Syntax: > < + - . , [ ]
+[----->+++<]>+.  # Example

# Online interpreter
beef

Ook!

TEXT
Ook. Ook? Ook! variants
Similar to Brainfuck

# Decoder: dcode.fr

Whitespace

TEXT
Only spaces, tabs, and newlines matter

# Decoder
https://vii5ard.github.io/whitespace/

Piet

TEXT
Programs are images
Colors encode commands

# Online interpreter
https://www.bertnase.de/npiet/

Malbolge

TEXT
Extremely difficult language
Usually just decode, don't write

# Decoder
https://malbolge.doleczek.pl/

JSFuck

TEXT
JavaScript using only: []()!+
[]+!"" patterns

# Decode: Run in browser console

Common Indicators

TEXT
Brainfuck: >+<[].,
Whitespace: Empty-looking file, large size
Piet: Colorful image
Ook: "Ook" "Ook?" "Ook!"
JSFuck: [][[]+ patterns

Encoding Chains

Multi-Layer Decoding

TEXT
1. Check encoding type
2. Decode
3. Repeat until plaintext

Common sequence:
Base64 → Hex → ROT13 → Flag

Encoding Identification

TEXT
Base64: A-Za-z0-9+/=
Base32: A-Z2-7=
Hex: 0-9a-fA-F
Binary: 01 only
Octal: 0-7 only
URL: %XX patterns

Quick Decode

BASH
# Base64
echo "..." | base64 -d

# Hex
echo "48656c6c6f" | xxd -r -p

# Binary
# Convert 01010101 to ASCII

# URL
python -c "import urllib.parse; print(urllib.parse.unquote('...'))"

KeySec

TEXT
https://www.keysec.in/recipes
- Magic (auto-detect)
- Chain multiple operations
- "From" operations for decoding

QR Codes & Barcodes

QR Code Reading

BASH
# zbarimg
zbarimg qr.png

# qrencode (create)
qrencode -o out.png "data"

Damaged QR Recovery

TEXT
- Try different angles
- Fix corners manually
- Adjust error correction

Barcode Types

TEXT
EAN-13, UPC-A, Code 39, Code 128
DataMatrix, Aztec Code

# Decode: zbarimg

File Format Challenges

Hidden Text

BASH
# Inside binary files
strings file | grep -i flag
grep -a flag file

# Comments in source
View source, check comments

Corrupt Headers

BASH
# Check file signature
xxd file | head

# Fix magic bytes
PNG: 89 50 4E 47 0D 0A 1A 0A
JPEG: FF D8 FF
GIF: 47 49 46 38
ZIP: 50 4B 03 04

Carving

BASH
foremost -i file
photorec file
binwalk -Me file

OSINT for CTF

Image OSINT

TEXT
- Reverse image search (Google, TinEye)
- EXIF GPS coordinates
- Landmarks in photo
- Reflections in image
- Weather/time analysis

Username OSINT

TEXT
- sherlock username
- whatsmyname.app
- Check social media profiles
- GitHub history

Domain OSINT

TEXT
- whois
- DNS history
- Wayback Machine
- Subdomain enumeration

Location OSINT

TEXT
- Google Maps/Street View
- GeoGuessr techniques
- Timezone from shadows
- Store signs, license plates

Logic & Math

Common Patterns

TEXT
- Fibonacci sequence
- Prime numbers
- Factorials
- Binary/hex math
- Modular arithmetic

Number Stations

TEXT
One-time pad patterns
Book cipher (page/line/word)

Graph Theory

TEXT
Shortest path problems
Network flow

Audio Challenges

DTMF (Phone tones)

BASH
# Dual-tone multi-frequency
multimon-ng -a DTMF input.wav
# Or online DTMF decoder

Morse Code

BASH
# Listen and transcribe
# Audacity visualization
# Online decoder

Reversed Audio

BASH
# Audacity: Effect → Reverse
sox input.wav output.wav reverse

Speed Manipulation

BASH
# Slow down/speed up
sox input.wav output.wav tempo 0.5
sox input.wav output.wav speed 2.0

Network Misc

Packet Capture Analysis

BASH
# Find strings in pcap
strings file.pcap | grep flag

# Extract files
tshark -r file.pcap --export-objects http,./output

# Follow streams
Wireshark → Follow → TCP/HTTP Stream

Protocol Analysis

TEXT
- Unusual ports
- Custom protocols
- DNS exfiltration
- ICMP data hiding

Trivia & Research

Common Topics

TEXT
- Crypto history (Enigma, etc.)
- Famous hackers
- CVE knowledge
- RFC lookup
- Historical events

Research Skills

TEXT
- Google dorking
- Wikipedia
- Specialized wikis
- Academic papers

Tools Reference

Multi-Purpose

TEXT
KeySec - Encode/decode/analyze
Dcode.fr - Cipher identifier/solver
KeySec.vercel.app - Crypto tools

Esoteric Languages

TEXT
tio.run - Online interpreter
esolang.org - Documentation

Forensics

TEXT
binwalk - File analysis
foremost - File carving
exiftool - Metadata

Problem-Solving Tips

When Stuck

TEXT
1. Re-read the challenge description
2. Check filename for hints
3. Try common encodings
4. Search challenge title online
5. Ask for hints (if available)
6. Take a break, return fresh

Patterns

TEXT
- Filename often contains hints
- Description may have hidden clues
- Points indicate difficulty
- Category mismatch = trick
On this page