Über Ulli Weichert

2004 fing Ulli bei der Bundeswehr als Ausbilder und IT-Spezialist an. 2011 hat Ulli eine Umschulung zum Fachinformatiker für Systemintegration absolviert und sich auf Linux spezialisiert. 2016 hat Ulli dann bei einem mittelständischem Unternehmen, welches Kunden in ganz Deutschland betreut, als Linuxadministrator angefangen und kümmert sich seither nebst, Netzwerk, Security, Firewall, Storage überwiegend um Linuxthemen aller Art. Seit kurzem hat auch Ihn das Thema Container und k8s erwischt.

picoCTF 2022: forensics – Operation Oni

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

Operation Oni Description Download this disk image, find the key and log into the remote machine. Note: if you are using the webshell, download and extract the disk image into /tmp not your home directory. Download disk image Remote machine: ssh -i key_file -p 60303 ctf-player@saturn.picoctf.net Solving Mounting the disk image (it is a msdos mbr partition… whole disk) Create

Weiterlesen

picoCTF 2022: forensics – Lookey here

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

Lookey here Description Attackers have hidden information in a very large mass of data in the past, maybe they are still doing it. Download the data here. Solving Download File Cat File | grep picoCTF* You also can grep directly with grep -o "picoCTF{.*}" Feel free to use the getflag script. #!/bin/bash echo "Getting flag for you…" grep -o "picoCTF{.*}"

Weiterlesen

picoCTF 2022: binary-exploitation – RPS

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

RPS Description Here’s a program that plays rock, paper, scissors against you. I hear something good happens if you win 5 times in a row. Connect to the program with netcat: nc saturn.picoctf.net 53296 The program’s source code with the flag redacted can be downloaded here. Solving Checking the code (as mentioned in the hint of the challenge) In the

Weiterlesen

picoCTF 2022: binary-exploitation – CVE-XXXX-XXXX

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

CVE-XXXX-XXXX Description Enter the CVE of the vulnerability as the flag with the correct flag format: picoCTF{CVE-XXXX-XXXXX} replacing XXXX-XXXXX with the numbers for the matching vulnerability. The CVE we’re looking for is the first recorded remote code execution (RCE) vulnerability in 2021 in the Windows Print Spooler Service, which is available across desktop and server versions of Windows operating systems.

Weiterlesen