KICTF 2026 CTF event writeups
## Challenge Overview We were given a looping GIF animation. The description mentioned: * 100 heartbeats * Each heartbeat is measured in 1/100th of a
[ VIEW WRITEUP → ]## Challenge Overview We were given a PNG file that did not open properly. ### Step 1 – Inspect File Header Using `xxd`, we found the PNG header was c
[ VIEW WRITEUP → ]## Challenge Overview We were given a CSV file containing customer tickets and sentiment labels. A backdoor trigger causes the model to predict positi
[ VIEW WRITEUP → ]## Challenge Overview We received a file named `gepj.lanif`. Reversed, this becomes `final.jpeg`. ### Step 1 – Reverse File Content The JPEG file was
[ VIEW WRITEUP → ]## Challenge Overview We followed a breadcrumb trail across multiple platforms to find Xavier's resignation letter. ### Attack Chain 1. **GitHub** - F
[ VIEW WRITEUP → ]## Challenge Overview We were given rows of 0s and 1s. This was binary pixel data for a QR code. ### Step 1 – Reconstruct the QR Code We converted the
[ VIEW WRITEUP → ]## Challenge Overview We were given an encrypted string: `WFZQR1N7VDRHM0o0TF9HMF9HVTNfWDFBVFEwWn0=` ### Step 1 – Base64 Decode ``` XVPGS{T4G3J4L_G0_GU
[ VIEW WRITEUP → ]