tkh4ck.github.io

Personal website and blog of tkh4ck

View on GitHub

CyberQuest 2025 - Glass Ink

Description

Glass Ink — Palimpsest Lab — Player Handout (EASY)

Type: Static‑site forensics / web OSINT

TASK

Investigate a “lab archive” static site where nothing important is linked. Operational crumbs across standard locations, logs, a backup archive, and a DNS zone ultimately reveal three tokens and an assembly rule. Combine them to form the final flag.

RULES

cq25-challenge0[1-9]-b.cq.honeylab:8082

Metadata

Solution

In the /assets/css/site.css there is a comment:

/* Ops: review /.well-known/security.txt */

The `` file contains the following:

Contact: mailto:ops@glassink.example
Acknowledgments: /logs/
Policy: /policy.html
Preferred-Languages: en

In the /logs/ folder, there are two file:

# /logs/access-2025-08-21a.log
203.0.113.10 - - [21/Aug/2025:08:11:14 +0000] "GET / HTTP/1.1" 200 640 "-" "curl/8.1"
203.0.113.10 - - [21/Aug/2025:08:11:16 +0000] "GET /.well-known/security.txt HTTP/1.1" 200 210 "-" "curl/8.1"
203.0.113.10 - - [21/Aug/2025:08:11:17 +0000] "GET /backup/palimpsest-aug.tgz HTTP/1.1" 200 16384 "-" "curl/8.1"
# /logs/access-2025-08-21b.log
198.51.100.5 - - [21/Aug/2025:08:15:02 +0000] "GET /scripts/lab.min.js HTTP/1.1" 200 800 "-" "Mozilla/5.0"
198.51.100.5 - - [21/Aug/2025:08:15:07 +0000] "GET /L3DG3R/ HTTP/1.1" 404 120 "-" "Mozilla/5.0"

The L3DG3R seems to be one part of the flag.

The /backup/palimpsest-aug.tgz contains an image (plate.jpg](/ctf/2025/cyberquest/quals/OSINT/Glass-Ink/files/plate.jpg)) and a [README.txt` file.

The plate.jpg file contains another part from the flag (tkn_img: ghost):

$ hexdump -C plate.jpg
[...]
00002390  05 14 51 40 05 14 51 40  05 14 51 40 05 14 51 40  |..Q@..Q@..Q@..Q@|
*
000026e0  05 14 51 40 05 14 51 40  05 14 51 40 1f ff d9 0a  |..Q@..Q@..Q@....|
000026f0  23 20 74 6b 6e 5f 69 6d  67 3a 20 67 68 6f 73 74  |# tkn_img: ghost|
00002700  0a                                                |.|
00002701

The README.txt file contains the following:

Palimpsest Lab - backup (Aug)
- plate archived
- DNS notes under /dns/

The /dns/ directory has a zone.txt file:

;; zone fragment
palimpsest.example.  3600 IN TXT "seg=SU5fVEhF"
palimpsest.example.  3600 IN TXT "note=join TXT segs if more than one"

If we base64 decode SU5fVEhF the result is IN_THE.

Flag: CQ25{GHOST_IN_THE_L3DG3R}