Posts

Showing posts from April, 2020

DeepCTF Writeups

Image
Hi everyone!  I present you my writeup of the DeepCTF   happened on April 4th, 2020. Let's Get Started---------------> OSINT Challenges: Challenge: History (80) DESCRIPTION- Where did it happen? 'Drunk Hackers' P.S. Hackers love that place Flag format - d33p{xxxxxx}] SOLUTION:: → Use commands -      ⇒ Just search for Drunk Hackers on google     ⇒ Open first link and we got the flag- → Flag - d33p{defcon} Challenge:  SecXML (200) DESCRIPTION- <salesCommissions>                <dollarAmount>FLAG</dollarAmount> </salesCommissions> The text file will help you get that information! Download file reach.txt SOLUTION:: → Use commands -      ⇒ See the content of the file using command-  cat reach.txt      ⇒ Copy the above output, search it on google, some useful links will appear-     ⇒ Open above links and search for " salesCommissions" text, you will get something like this-     ⇒ Try out all the

VirSecCon CTF Forensics Writeups

Image
1) I Lost My Password! (75) DESCRIPTION- Oh no! Can you please help me retrieve my password? To submit this flag, you must wrap the discovered password in the typical flag format. Download the files below. passwd and shadow SOLUTION:: → Use commands -      ⇒ unshadow passwd shadow > pass ( unshadow tool is used to combine the passwd and shadow files into a format that John The Ripper tool can read)      ⇒ john --wordlist=/usr/share/wordlists/rockyou.txt pass (using rockyou.txt file located in  /usr/share/wordlists/ directory,  to crack passwords and saving its output in a file named as pass (or any other name))      ⇒ john --show pass (we can use the --show flag to display the cracked passwords that John successfully recovered) → Flag - LLS{whiterose} 2) QUACK (90) DESCRIPTION- We found this binary on a USB drive someone left lying around. There was a note attached, that read: “you’re the one.” Download the file below. inject.bin SOLUTION:: → Use

VirSecCon CTF Steganography Writeups

Image
1) Stegosaurus (70) DESCRIPTION- Scientists are struggling with a new mystery: we thought the dinosaurs were gone, but this one has returned! Hmmm... can you solve this mystery? Download the file below: stegosaurus.png SOLUTION:: → Use commands -           ⇒ Use website https://georgeom.net/StegOnline/image to convert the color palette of this image           ⇒ Use the LSB Half option to change color palette                                              OR           ⇒ Install tool stegsolve.jar using commands                     wget http://www.caesum.com/handbook/Stegsolve.jar -O stegsolve.jar                     chmod +x stegsolve.jar                     mv stegsolve.jar /bin           ⇒ Execute it using command- stegsolve.jar , use File option, choose image, use arrows to see the text by changing colors → Flag - LLS{you_stegsolved_the_mystery} 2) Winter Wonderland (80) DESCRIPTION- It’s the holiday season! But hmm… they must be hi