picoCTF 2022: forensics – Operation Oni

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

Operation Oni Description Download this disk image, find the key and log into the remote machine. Note: if you are using the webshell, download and extract the disk image into /tmp not your home directory. Download disk image Remote machine: ssh -i key_file -p 60303 ctf-player@saturn.picoctf.net Solving Mounting the disk image (it is a msdos mbr partition… whole disk) Create

Weiterlesen

picoCTF 2022: forensics – Lookey here

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

Lookey here Description Attackers have hidden information in a very large mass of data in the past, maybe they are still doing it. Download the data here. Solving Download File Cat File | grep picoCTF* You also can grep directly with grep -o "picoCTF{.*}" Feel free to use the getflag script. #!/bin/bash echo "Getting flag for you…" grep -o "picoCTF{.*}"

Weiterlesen

picoCTF 2022: binary-exploitation – RPS

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

RPS Description Here’s a program that plays rock, paper, scissors against you. I hear something good happens if you win 5 times in a row. Connect to the program with netcat: nc saturn.picoctf.net 53296 The program’s source code with the flag redacted can be downloaded here. Solving Checking the code (as mentioned in the hint of the challenge) In the

Weiterlesen