CyberKavach QuestCon Series: The Hawkins Incident

 

The Hawkins Incident (OSINT)


Welcome back to the PCCOE OWASP Student Chapter's official write-up series for CyberKavach QuestCon! This time, we're diving into the multi-stage OSINT challenge "The Hawkins Incident," created by Ayush Jayatkar.

This challenge was a three-round journey tracking a strange energy surge from Hawkins National Laboratory.

Challenge Details

  • Description: A strange energy surge has been detected once again at Hawkins National Laboratory. Encrypted data is spreading across digital realms — the Normal World and the Upside Down. As an investigator, your task is to track these transmissions, decode the secrets, and close the gate before the Upside Down consumes Hawkins.

  • Flag Format: questCON{STRANGERPYERS_3DEFEAT}


Walkthrough

This investigation was split into three distinct rounds to find the username, password, and the final flag.

Round 1 – The Labgate

  • Goal: Find the password for Round 3.

  • File: Round1.html

  1. Opening Round1.html showed a page with an image. The first step was to check the page's source code (Ctrl + U). This revealed a hidden comment: ``.

  2. Following the hint, we downloaded the image from the <img> tag.

  3. Using a steganography tool (like StegOnline), we extracted hidden text from the image.

  4. The extracted text was a ROT13-encoded string: cnffjbeq=ynontngr1983.

  5. Decoding this with ROT13 gave us the password.

    • Password: labgate1983

Round 2 – The Hidden Transmission

  • Goal: Find the username.

  • File: Round2.html

  1. This page provided a clue.txt file, which contained a long string of binary.

  2. Using a Binary-to-Text converter, we decoded the string, which revealed a URL: https://i.postimg.cc/5tV3pW8n/Round2-metadata.png.

  3. We downloaded this image and inspected its metadata using exiftool or an online viewer.

  4. The Artist metadata field contained a new ciphertext: 5@CD D:7@C 56E 4@?E>.

  5. This string is encoded with ROT47. Decoding it revealed the username.

    • Username: hawkins_1983

Round 3 – The Upside Down Terminal

  • Goal: Combine both halves of the final flag.

  • File: hawkins_terminal.zip

After unzipping the file (using the password labgate1983), we found a directory with two sub-folders:

  1. normal_side/: This folder contained a file with the first part of the flag: STRANGER.

  2. upside_down/: This folder contained a locked archive and a hint file. The hint provided a long hex ciphertext and a key:

    • Ciphertext: 8ebf7404c4d8eda27410d2c68a

    • Key: dee631569787 (The hint specified the key was the part after the #)

  3. The solution was to perform an XOR decryption between the ciphertext and the key.

  4. XORing these two hex values (e.g., using an online tool like CyberChef) resulted in the second half of the flag: PYERS_3DEFEAT.


Final Flag

By combining the clues from the normal_side/ and the upside_down/, we get the complete flag:

questCON{STRANGERPYERS_3DEFEAT}

Congratulations to all the investigators who successfully closed the gate! We'll see you in the next write-up.


Comments

Popular posts from this blog

CyberKavach QuestCon Series: Upside-Down Vault

From Open Networks to Safe Systems: How Firewalls Block the Hacker’s Doorway

CyberKavach QuestCon Series: VecNet