Since someone already won the CTF, it's time to post the solutions to all the puzzles.

BIG FAT SPOILERS BELOW

 

 

 

 

 

  • Puzzle 1: On the Infrablog post launching the CTF, the clue was "This is stage 1. Lain.la is stage 1.". The clue was hidden between the sentences. You had to go to stage1.lain.la.
  • Puzzle 2: On https://jerkin.lain.la, if you checked the HTTP response headers, you'll see I slipped in a note: X-Check-TXT-Records-For-Pomf3.lain.la. If you ran "dig TXT pomf3.lain.la" you'd see: "pomf3.lain.la.          300     IN      TXT     "https://pomf2.lain.la/f/stage3file.png"
  • Puzzle 3: The stage 3 file is a PNG with a hidden passworded zip file concatenated at the end of the PNG. The PNG itself is the Xonotic logo. On my xonotic server (xonotic.lain.la), the password to the zip file was set as the clan tag of the bots in Xonotic. The contents were http://203.55.176.247:36847/
  • Puzzle 4: On http://203.55.176.247:36847/, there is a page with "one, two, three, four, five, six, seven" arranged out of order and each with their own color. The idea here was to take the hex codes of each color, order them in line with the order of the numbering, and concatenate that into the following link: https://pomf.lain.la/f/92060900220034cd34ff60980011ff02bb76cccc00
  • Puzzle 5: This was the final challenge. The link to the flag ghostbin was provided, but it also had a password. https://ghostbin.lain.la/paste/uer7qybs. Another file was provided, named stage6, that was a base64 encoded MP3 file. The MP3 was of the song "The Holding Hand", which was the password to the ghostbin.

That's it! Guess I'll have to make things harder next time!