picoCTF 2022: Crypto – Morse Code

Ulli Weichert/ April 3, 2022/ IT-Security, Write-Ups/ 0Kommentare

morse-code Description Morse code is well known. Can you decrypt this? Download the file here. Wrap your answer with picoCTF{}, put underscores in place of pauses, and use all lowercase. Solving The soundfile is a morse code You could either translate it by your self with the morse alphabet or use this link Change all characters to lowercase and replace

Weiterlesen

picoCTF 2022: Crypto – credstuff

Ulli Weichert/ April 3, 2022/ IT-Security, Write-Ups/ 0Kommentare

credstuff Description We found a leak of a blackmarket website’s login credentials. Can you find the password of the user cultiris and successfully decrypt it? Download the leak here. The first user in usernames.txt corresponds to the first password in passwords.txt. The second user corresponds to the second password, and so on. Solving We got a tar file – extract

Weiterlesen

K3RN3L CTF 2021: Kiddie Pool – 3in1 / Writeup

Ulli Weichert/ November 14, 2021/ hacking, IT-Security, Write-Ups/ 0Kommentare

3in1 Description Like Nescafeeeee! Attachments https://ctf.k3rn3l4rmy.com/kernelctf-distribution-challs/nescafeee/AES.py Todos To decrypt the string in the given AES.py script (String is in scriptfile as a comment). from Crypto.Cipher import AES from Crypto.Hash import SHA256 f = open('progress.txt', 'r') password = ("abda") hash_obj = SHA256.new(password.encode('utf-8')) hkey = hash_obj.digest() def encrypt(info): msg = info BLOCK_SIZE = 16 PAD = "{" padding = lambda s: s

Weiterlesen

BSides Jeddah CTF 2021: Category memdump / Writeup

Ulli Weichert/ Oktober 28, 2021/ IT-Security, Write-Ups/ 0Kommentare

BSides-Jeddah-CTF Writeup to the BSides Jeddah CTF – 2021 Situation – BSides Jeddah BSides Jeddah is coming up with a blueteam flavored CTF this year hosted by CyberDefenders. This will be a Jeopardy-style intermediate CTF with a few harder challenges, including network analysis, memory forensics and malicious document analysis. To get the latest updates, follow us on twitter @JeddahBsides ,

Weiterlesen

Command Injection – Usable payloads

Ulli Weichert/ Oktober 26, 2021/ hacking, IT-Security/ 0Kommentare

Useful payloads Here are some valuable payloads for both Linux & Windows command injection on a vulnerable web-application. Feel free! Linux Payload Description whoami See what user the application is running under. ls List the contents of the current directory. You may be able to find files such as configuration files, environment files (tokens and application keys), and many more

Weiterlesen

DEADFACE CTF 2021: Exploitation3 – Password Insecurities / Writeup

Ulli Weichert/ Oktober 18, 2021/ IT-Security, Write-Ups/ 0Kommentare

Password Insecurities Points 50 Description It looks like DEADFACE is going after the password of one of De Monne’s customers: Haily Poutress. She has since changed her password, but De Monne is looking for ways to improve password requirements. De Monne would like you to crack the password from the database leak to determine if Haily’s password was secure enough.

Weiterlesen

DEADFACE CTF 2021: Forensics7 – Blood Bash 4 / Writeup

Ulli Weichert/ Oktober 18, 2021/ IT-Security, Write-Ups/ 0Kommentare

Blood Bash 4 Points 200 Description A sensitive file from De Monne was exfiltrated by mort1cia. It contains data relating to a new web portal they’re creating for their consumers. Read the contents of the file and return the flag as flag{flag_goes_here}. Username: bl0ody_mary Password: d34df4c3 bloodbash.deadface.io:22 Get the flag We find a sus file in the homedirectory of the

Weiterlesen

DEADFACE CTF 2021: SQL5 – Boom / Writeup

Ulli Weichert/ Oktober 18, 2021/ IT-Security, Write-Ups/ 0Kommentare

Boom Point 100 Description DEADFACE actors will be targeting customers they consider low-hanging fruit. Check out Ghost Town and see who they are targeting. Submit the number of target candidates as the flag: flag{#} Use the MySQL database dump from Body Count. Hint Link to discussion DEADFACE Member https://ghosttown.deadface.io/t/who-are-we-hitting-first/60/10 Getting the flag They are targeting boomer generation (1946-1964) Now lets

Weiterlesen