TryHackMe

CCT2019 Assessment

The U.S. Navy Cyber Competition Team 2019 Assessment featured multi-discipline challenges spanning forensics, reverse engineering, and cryptography. Hosted on TryHackMe, these challenges test deep analytical skills from PCAP analysis to .NET decompilation to Enigma machine decryption.

4 Challenges
3 Categories
2019
w4llz CTF Team
Forensics TryHackMe Hard CCT2019

pcap1

Multi-stage PCAP challenge involving USB packet extraction with tshark, StegoVeritas embedded file discovery, ICMP data carving, cryptcat decryption using movie-reference keys from "The Net" (1995), and IRC server setup with InspIRCd to retrieve the flag from an automated bot.

PCAPUSBCryptcatIRCICMPStegoVeritas
Reverse Engineering TryHackMe Hard CCT2019

re3

.NET GUI reverse engineering challenge with 4 sliders. Decompile with Ghidra to find XOR-encrypted byte arrays and constraint-solving logic. Factor 711,000,000 into four integers summing to 711, then apply XOR decryption with the derived key to recover the 32-character hex flag.

.NETXORConstraint SolvingGhidraInteger Factorization
Forensics TryHackMe Hard CCT2019

for1

Multi-layer forensics challenge chain: EXIF Morse code analysis, StegoVeritas trailing data extraction, password-protected ZIP archives, steghide with Matrix movie references, and Enigma machine decryption using historical rotor configuration (Gamma VI VII VIII, C-Thin reflector, 13 plugboard pairs).

EXIFStegoEnigmaSteghideMorse
Cryptography TryHackMe Medium-Hard CCT2019

crypto1

Three-part progressive crypto challenge: (a) Dvorak-to-QWERTY keyboard substitution cipher revealing the key "dvorakdvorakdvorak", (b) Rail fence transposition with 5 rails starting from bottom, keyed by Charlotte's Web goose spelling "teerrrriiffiicccccc", and (c) Custom run-length binary encoding converting digit sequences to ASCII.

DvorakRail FenceRLEBinary Encoding3 Parts