EZ-CTF2022 / OSINT – Limo

Ulli Weichert/ Mai 9, 2022/ IT-Security, Write-Ups/ 0Kommentare

Limo 190 points Solves: 95 Medium Find this limo and tell us how many side windows it has Flag format: EZ-CTF{Name_of_the_Band_Number_Windows} Example: EZ-CTF{Duran_Duran_163_Windows} Solving We’ve got this strange picture of to women behind the challenge name given limo. After feeding yandex.com with this picture, I found some results pointing to the music video for a song from the band Aphex

Weiterlesen

EZ-CTF2022 / OSINT – Hue is this?

Ulli Weichert/ Mai 9, 2022/ IT-Security, Write-Ups/ 0Kommentare

Hue is This? 170 points Solves: 82 Medium I think you need to do a -180 turn to find her name and the song. Flag Format: EZ-CTF{Her_Name_And_The_7th_Song_In_The_Album} Solving Okay a good old osint challenge. I uploaded the image on yandex.com and was able to find the correct image. It is an album cover for the goa album Rock Bitch Mafia

Weiterlesen

EZ-CTF2022 / OSINT – American

Ulli Weichert/ Mai 9, 2022/ IT-Security, Write-Ups/ 0Kommentare

American 150 points Solves: 129 Easy Find the Gallery, find Mr. Gud, find the cow. Flag format: EZ-CTF{Mr_Gud_Full_Name_Cow_Painting_Name} Solving The given image is from James Ayers and is called The Rebellious One. But this is not what we are looking for, because we look for the name of Mr. Gud and a cow painting. So if you look further into

Weiterlesen

JerseyCTF 2022 / web – apache-logs

Ulli Weichert/ April 10, 2022/ IT-Security, Write-Ups/ 0Kommentare

apache-logs Points: 100 An apache log file that contains recent traffic was pulled from a web server. There is suspicion that an external host was able to access a sensitive file accidentally placed in one of the company website’s directories. Someone’s getting fired… Identify the source IP address that was able to access the file by using the flag format:

Weiterlesen

picoCTF 2022: web – SQLiLite

Ulli Weichert/ April 7, 2022/ IT-Security, Write-Ups/ 0Kommentare

SQLiLite Description Can you login to this website? Try to login here. Solving Connecting to the website will give us a login form. Assuming for a sql injection (title of the task) we try to login via ' or 1=1– for username and password. This works… the flag should be in plainsight… okay then the sourcecode or selecting everything again…

Weiterlesen

picoCTF 2022: web – SQL Direct

Ulli Weichert/ April 7, 2022/ IT-Security, Write-Ups/ 0Kommentare

SQL Direct Description Connect to this PostgreSQL server and find the flag! The connectionsettings could be different on your side. psql -h saturn.picoctf.net -p 59911 -U postgres pico Password is ‚postgres‘ Solving With the given connectionstring we can log into the postgres database There we just need to ‚SELECT‘ what we want. With ‚\l‘ you can list the databases and

Weiterlesen

picoCTF 2022: web – Secrets

Ulli Weichert/ April 7, 2022/ IT-Security, Write-Ups/ 0Kommentare

Secrets Description We have several pages hidden. Can you find the one with the flag? The website is running here. Solving Visiting the website does not really help… but the hint tells that there are some folders. Because gobuster or other fuzzing tools in CTF is not really nice to the infrastructure I tested the usual things: robots.txt -> nothing

Weiterlesen

picoCTF 2022: web – Search Source

Ulli Weichert/ April 7, 2022/ IT-Security, Write-Ups/ 0Kommentare

Search source Description The developer of this website mistakenly left an important artifact in the website source, can you find it? The website is here. Solving Downloading whole website via ‚wget –recursive http://saturn.picoctf.net:56849/‘ Then you coud easily grep the sourcefiles for the flag. #!/bin/bash echo "Downloading website…" wget –recursive http://saturn.picoctf.net:56849/ > /dev/null 2>&1 echo "Changing DIR Name…" mv saturn.picoctf.net:56849 website

Weiterlesen

picoCTF 2022: web – Roboto Sans

Ulli Weichert/ April 7, 2022/ IT-Security, Write-Ups/ 0Kommentare

Roboto Sans Description The flag is somewhere on this web application not necessarily on the website. Find it. Check this out. Solving Visit the website Digging in the sourcecode – nothing there Looking the low-hanging fruits robots.txt — this is interesting In the robots.txt there are some base64 encoded strings decoding it point us to ‚js/myfile.txt‘

picoCTF 2022: web – Local Authority

Ulli Weichert/ April 7, 2022/ IT-Security, Write-Ups/ 0Kommentare

Local Authority Description Can you get the flag? Go to this website and see what you can discover. Solving Downloaded website via ‚wget http://saturn.picoctf.net:50959/‘ Looked at the site – just a normal site with a login prombt. Looking at sourcecode. Action is calling ‚login.php‘ — downloading as well In ‚login.php‘ a ’secure.js‘ is included… downloading There is a password in

Weiterlesen