EG-CERT Writeup: EG-CTF Finals 2019

EG-CTF Finals 2019 was held on December 4th in EIEC, New Cairo at ICT 2019’s venue.

The challenges were extremely fun and challenging and I learned A LOT during the CTF.


Having solved 5 challenges alongside my team, here are the writeups for them:

Category: Starter

I - Baby P“


The code is a language called BrainFuck


You can run it at

Flag: EGCTF{Wh0B3li3v3s_Th@7_Th!s!s_Pr0gr4mm!ng_l@ngu4g3}

II - Not Straight!

text 1


The code ends in === so I guessed that it was base64, but it wasn’t.

I tried base32 and it worked fine. But, I got the output reversed so I had to reverse it again to get the actual flag.

A one-liner for this would be: echo BASE32TEXT | base32 -d | rev

Of course you need to replace BASE32TEXT with the text given in the challenge.

Flag: EGCTF{7H15!5_4_L0NG_Fl4G_wR1773n!N_R3v3R53_0RD3r_50_17_DO35_no7_M4k3_4ny_53N53_7O_Do_17_L3773R_by_l3773r_4ND_YOu_5hoULD_4u7OM473_17_OR_L37_57h_Do_17_4_you}

III - So call be maybe?

text 2

All of the numbers are between 0 and 8 so it seems like something you’d type on a phone keypad.

The first thing that came to my teammate’s mind was T9 predictive text, which was the autocorrect of typing on phones in the early 2000s.

You can easily decipher it here:



Category: Misc.


text 3

At first,the hint wasn’t pushed to the contestants yet.

On connecting to the server, we find that we can give it a string and it replies with “BAD FLAG!!!!”. So it seems to be checking the string we’re sending if it matches the correct flag.

We already know that all flags start with EGCTF{, so my teammate tried sending parts of the flag to see what it will do. He found out that the server delays the response by 1 second for each correct character in the string you send.


At this point we had no idea what to brute force, so they released this hint for everyone.


This made it much easier, so it’s testing time!

I tried sending EGCTF{0 and then EGCTF{1, etc.. until I found that the first digit is 7. Then I figured it was scripting time (sort of) as I wasn’t gonna try all of the digits manually.

I wrote a small loop in BASH that increases the digit by one every time and sends it to the server, calculating the total time that the command took.

We know that it delays one second for every correct character, so if the number of seconds increase then we know that we entered a new correct character.


Repeating this for every digit, we got ourselves the flag!

final flag

Flag: EGCTF{73b433927a}

Category: Reverse Engineering


text 4

My first instinct was to open the file with IDA-Free, but it turned out to be a .NET binary. Onto DnSpy we go!

Before that, let’s try running the binary..

no args

Doesn’t seem to do anything interesting, let’s take a look under the hood.



encrypt class

We find that we have 3 classes:

  • Program class
  • A class with some sort of ciphertext
  • A class that seems to encrypt/decrypt text

Okay, cool. Let’s take a look at the Program class.

arg func

This part is interesting enough, the program apparently needs 4 arguments to execute properly. Let’s try that.


So it works, it prints a different string and waits for a keypress to exit.

Sadly, the names for the functions were all garbage. This made it kind of hard to get an idea of what was exactly going on. I wasted a lot of time renaming the functions, but it helped me understand what was going on.


On looking at the clean program, we find that the program basically decrypts the ciphertext that was in the cipher class and then executes a powershell with the decrypted text as an argument.


I debugged the program until I could find the local variable containing the decrypted text. It is way too long for me to post here, but anyway it seemed like garbage with some meaningful code-like strings in the middle.

decoded code

xqq is our decoded message

I had no idea what that decoded message was so I literally searched for “((GV ‘*mdr*’)” on DuckDuckGo and found out that it was obfuscated PowerShell code.

So I tried running it in PowerShell and got “Failed!” as an output.

initial powershell

So it was time to deobfuscate that code and get an idea of what it is doing.

I looked online for quite some time until I stumbled across another writeup that showed that you can treat this whole code as a string and pass it as an argument to Write-Output in PowerShell. We just have to remove the part at the start until -JOiN”).

So here we go, It seems to make a little bit more sense.

second powershell

And Again.

third powershell

Oh, it’s base64

Aaaannndd Again

final powershell

You can see the flag being compared in the most retarded way possible. Nevertheless, I cleaned the output a bit, did some dirty BASH magic here and there, and got the flag.

cleaned file

The command would be: cat | tr {} '\n' | cut -d \' -f 2 | tr -d '\n' | tr -d ' '


We just have to replace these closing brackets with the appropriate braces.

Flag: EGCTF{707331c1a40117b7b4f9e33ec295269217bc8df68ad21dd04c867754de56e07a}

That’s all folks! It was one hell of a CTF and I enjoyed it so much.

If you liked this writeup please share it with your friends. Thanks for reading! 😀

Featured image credit: EG-CERT