CyberKavach QuestCon Series: The Hawkins Incident
The Hawkins Incident (OSINT)
Welcome back to the PCCOE OWASP Student Chapter's official write-up series for CyberKavach QuestCon! This time, we're diving into the multi-stage OSINT challenge "The Hawkins Incident," created by Ayush Jayatkar.
This challenge was a three-round journey tracking a strange energy surge from Hawkins National Laboratory.
Challenge Details
Description: A strange energy surge has been detected once again at Hawkins National Laboratory. Encrypted data is spreading across digital realms — the Normal World and the Upside Down. As an investigator, your task is to track these transmissions, decode the secrets, and close the gate before the Upside Down consumes Hawkins.
Flag Format: questCON{STRANGERPYERS_3DEFEAT}
Walkthrough
This investigation was split into three distinct rounds to find the username, password, and the final flag.
Round 1 – The Labgate
Goal: Find the password for Round 3.
File: Round1.html
Opening Round1.html showed a page with an image. The first step was to check the page's source code (Ctrl + U). This revealed a hidden comment: ``.
Following the hint, we downloaded the image from the <img> tag.
Using a steganography tool (like StegOnline), we extracted hidden text from the image.
The extracted text was a ROT13-encoded string: cnffjbeq=ynontngr1983.
Decoding this with ROT13 gave us the password.
Password: labgate1983
Round 2 – The Hidden Transmission
Goal: Find the username.
File: Round2.html
This page provided a clue.txt file, which contained a long string of binary.
Using a Binary-to-Text converter, we decoded the string, which revealed a URL: https://i.postimg.cc/5tV3pW8n/Round2-metadata.png.
We downloaded this image and inspected its metadata using exiftool or an online viewer.
The Artist metadata field contained a new ciphertext: 5@CD D:7@C 56E 4@?E>.
This string is encoded with ROT47. Decoding it revealed the username.
Username: hawkins_1983
Round 3 – The Upside Down Terminal
Goal: Combine both halves of the final flag.
File: hawkins_terminal.zip
After unzipping the file (using the password labgate1983), we found a directory with two sub-folders:
normal_side/: This folder contained a file with the first part of the flag: STRANGER.
upside_down/: This folder contained a locked archive and a hint file. The hint provided a long hex ciphertext and a key:
Ciphertext: 8ebf7404c4d8eda27410d2c68a
Key: dee631569787 (The hint specified the key was the part after the #)
The solution was to perform an XOR decryption between the ciphertext and the key.
XORing these two hex values (e.g., using an online tool like CyberChef) resulted in the second half of the flag: PYERS_3DEFEAT.
Final Flag
By combining the clues from the normal_side/ and the upside_down/, we get the complete flag:
questCON{STRANGERPYERS_3DEFEAT}
Congratulations to all the investigators who successfully closed the gate! We'll see you in the next write-up.
Comments
Post a Comment