$ nmap -sV target$ sqlmap -u "http://?id=1" --batch$ python3 exploit.py$ gobuster dir -u http://target -w wordlist.txt$ ffuf -u https://t/FUZZ -w words.txt$ hashcat -m 1000 hashes.txt dict.txt$ dig target.com ANY +short$ curl -s https://api/ping
[ MAXIM.CTF ]
ctf://homectf://categoriesctf://events[ ← Home ]
← Back to categories

Forensics

2 challenges • 600 points

100 pts • KICTF 2026

Corrupted Vision

## Challenge Overview We were given a PNG file that did not open properly. ### Step 1 – Inspect File Header Using `xxd`, we found the PNG header was c

[ VIEW → ]
500 pts • KICTF 2026

Childhood Photo

## Challenge Overview We received a file named `gepj.lanif`. Reversed, this becomes `final.jpeg`. ### Step 1 – Reverse File Content The JPEG file was

[ VIEW → ]