2 minutes
WGU CTF Scrimmage Spring 2025
Overview
The following write‑up covers the WGU CTF scrimmage that wrapped up on May 2, 2025. Some challenges were home‑brewed, others borrowed (e.g., picoCTF). External write‑ups are linked where helpful.
DFIR
Glory of the Garden
Open the image in a hex editor such as https://hexed.it/.
You’ll find the flag at the bottom:

Unknown
- Upload to https://www.aperisolve.com/ and wait for analysis.
- You’ll find a base64 message in the Strings section
- Decode this to find the flag

Viewing Events
Here’s the write-up for this one: https://medium.com/@jojolucky221/picoctf-2025-forensics-event-viewing-34578235166b
Cryptography
m4s0n
This is a mixture of hex and base64 encodings. See the recipe on https://cyberchef.org below:

2EZ and 2EZ v2
Plain Caesar shifts. Use https://www.dcode.fr/caesar-cipher.
3ncrypted
Full breakdown: https://github.com/Cajac/picoCTF-Writeups/blob/main/picoCTF_2024/Cryptography/Custom_encryption.md
General Skills
Monty
Change the following in the Python file you are given:

And then hit ‘b’ when prompted for the flag:

Commitment Issues
https://github.com/Cajac/picoCTF-Writeups/blob/main/picoCTF_2024/General_Skills/Commitment_Issues.md
git good
https://github.com/Cajac/picoCTF-Writeups/blob/main/picoCTF_2024/General_Skills/Time_Machine.md
Web Exploitation
The Marauder’s Map
Directory enumeration challenge. This would require knowledge of Harry Potter or proper OSINT research, as I don’t believe this would be in a typical dictionary file.

Shell of Secrets
This was a simple command injection vulnerability:

The Forbidden Script
This was a simple XSS vulnerability:
<script>
fetch('/flag').then(r=>r.text()).then(alert);
</script>
Goblin Bank Heist
This was a simple SQLi vulnerability:

Polyjuice Portal
Change the role cookie to admin in DevTools:

Thanks to all who participated!
219 Words
2025-05-01 20:00