Post

Puzzle Pieces

Puzzle Pieces

Description

Author: Nordgaren

Well, I accidentally put the important data into a bunch of executables.

It was fine, until my cat stepped on my keyboard and renamed them all!

Can you help me recover the important data?

NOTE, the password for the archive is nahamcon-2025-ctf

Exploitation

After unzipping the downloaded file with the given password of nahamcon-2025-ctf:

1
7z e ctf_challenge_files.7z

We started gathering the metadata of the file. Turns out they are all windows PE32 executable as shown below: metadata Then we look deeper into the metadata using exiftool We discovered the following line containing the order in which we compile the files in order to get the flags:

1
PDB File Name                   : xxxxxxxxxxx.pdb

So we did run the following command to filter the PDB File Name and the name of the file in order to get the order of execution:

1
> ls -l *.exe && exiftool * | grep 'PDB File Name'

Here is what the ouput looks like: execution-order

Having that order, we compiled the files one at the time in order to get the flag parts by parts. Here is the screenshot of the execution order: execution-order

This concatenated the flag parts and we got the flag:

Flag

flag{512faff5e7d89c9b8bd4b9517af9bfaa}

This post is licensed under CC BY 4.0 by the author.