These are beginner CTF questions for the Forensic and Security Technology club at Cal Poly Pomona.
Most of these questions are Forensic/Crypotgraphy challenges.
Answers/how-to will eventually be posted the the FAST blog. Hints for each question are available in hints.txt
Points: 70
File: file2.JPG
Question: This is a generic picture. What is the exposure time of this photograph?
Answer:https://forensicnoobsecurity.blogspot.com/2019/02/viewing-exif-data-fast-ctf-challenge-2.html
Points 250
File: file3.png
Question: Nothing unusal about a FAST logo right! Format: "FASTCTF{FLAG}"
Answer:https://forensicnoobsecurity.blogspot.com/2019/02/image-steganography-and-cryptography.html
Points 225
File: file4
Question: The flag is in there somewhere, I swear. Format: "fastctf{flag}"
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/cal-poly-fast-ctf-challenge-4-cracking.html
Points: 150
File: file7.JPEG
Question: The flag is in this image. What is it? Format: fastctf{flag}
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/image-anti-forensics-cal-poly-fast-ctf.html
Points: 125
File: file8.zip
Question: What is the MAC address of the computer these files originated from? (Hex in lower case)
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/lnk-forensics-cal-poly-fast-ctf.html
Points: 75
File: file9.zip
Question: What is the name of the executable with the MD5 hash of cdc47d670159eef60916ca03a9d4a007 that performs a malicious task? (Don't worry none of these will actually harm your computer).
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/md5-collisions-cal-poly-fast-ctf.html
Points: 30
File: file10.zip
Question: The flag is inside this Windows Batch file.
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/retard-test-cal-poly-fast-ctf-challenge.html
Points: 125
File: file11.txt
Question: Find the flag in this text document!
Answer:https://forensicnoobsecurity.blogspot.com/2019/03/bit-shifting-cal-poly-fast-ctf.html