SHA2017 CTF: Wannafly

August 11, 2017

Intro My daughter Kimberly her computer got hacked. Now she lost all her favorite images. Can you please help me recover those images? We received image of filesystem, where at first glance were only saved encrypted photos. But in home directory there were also two hidden files: one .bash_history and another .... unset HISTFIL ls -la pwd chmod +x ... ./... Hb8jnSKzaNQr5f7p ls -Rla #!/usr/bin/env python import random, string, sys, os from time import time from Crypto. ... Read more

SHA2017 Teaser: Crypto engine

June 12, 2017

Intro First we notice that color square is added for every three letters in text to encrypt. At the end of image we have n mod 3 two-decimal hex numbers. Also, color of previous squares didn’t change if we add more letters. Knowing that the flag must be in format flag{md5hash} we have tried encrypt flag{x And we get what we want to. RGB code of the first color was exactly the same as the color of the flag, and also second color had only different blue value in comprasion with the flag. ... Read more

SHA2017 Teaser: Website attack

June 11, 2017

Website Attack (200) - 17 solves Our website received an attack in 2013, we managed to capture the attack in this pcap. Can you find out if we leaked some sensitive information? The beginning - Wireshark problem After opening the provided pcap file in Wireshark, we could see that there’s a problem. Besides tcp packets, there were some malformed ones - which under closer inspection turned out to be named GSM over IP. ... Read more

© 2018, Poznań | Hucore theme & Hugo