picoCTF 2022: forensics – St3g0

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

St3g0 Description Download this image and find the flag. Download image Solving Looking at the hint We know the end sequence of the message will be $t3g0. Okay, I did some google research with that $t3g0 and found an interessting article. Downloaded the script from the github repo run it with the image FLAG 🙂 #import libraries import sys import

Weiterlesen

picoCTF 2022: forensics – Operation Oni

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

Operation Oni Description Download this disk image, find the key and log into the remote machine. Note: if you are using the webshell, download and extract the disk image into /tmp not your home directory. Download disk image Remote machine: ssh -i key_file -p 60303 ctf-player@saturn.picoctf.net Solving Mounting the disk image (it is a msdos mbr partition… whole disk) Create

Weiterlesen

picoCTF 2022: forensics – Lookey here

Ulli Weichert/ April 5, 2022/ IT-Security, Write-Ups/ 0Kommentare

Lookey here Description Attackers have hidden information in a very large mass of data in the past, maybe they are still doing it. Download the data here. Solving Download File Cat File | grep picoCTF* You also can grep directly with grep -o "picoCTF{.*}" Feel free to use the getflag script. #!/bin/bash echo "Getting flag for you…" grep -o "picoCTF{.*}"

Weiterlesen