Skip to content

Commit b13d4c5

Browse files
committed
corrected paths to images - all writeups
1 parent 751cf53 commit b13d4c5

File tree

19 files changed

+64
-136
lines changed

19 files changed

+64
-136
lines changed

2015/ASIS_CTF_2015/Biglie_Forensic_100_writeup.md

+3-7
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,7 @@ It returns us encrypted pastebin:
2626

2727
{"iv":"adzR1bn929d5vf53R6BuDg","salt":"4SYEnmaSS58","ct":"J7QU491qMea5JTkR1y5MSH/UBp5QHIjHq7PeRRaqYn/rPsY1h1wiPbFp/gMufQ1w"}
2828

29-
![Pastebin]
30-
(https://github.com/bl4de/ctf/blob/master/2015/ASIS_CTF_2015/Biglie_Forensic100/biglie-packet.png)
29+
![Pastebin](https://github.com/bl4de/ctf/blob/master/2015/ASIS_CTF_2015/Biglie_Forensic100/biglie-packet.png)
3130

3231
To see decrypted content, we need to figure out what the key was used.
3332

@@ -39,8 +38,7 @@ When we take a look at pcap file, we can find requests to some web statistic too
3938

4039
We can see key used to encrypt this pastebin - *-krvZ7lGwZ4e2JQ8n+3dfsMBqyN6Xk6SUzY7i0JKbpo*
4140

42-
![Piwik request]
43-
(https://github.com/bl4de/ctf/blob/master/2015/ASIS_CTF_2015/Biglie_Forensic100/biglie-packet-to-piwik-with-flag.png)
41+
![Piwik request](https://github.com/bl4de/ctf/blob/master/2015/ASIS_CTF_2015/Biglie_Forensic100/biglie-packet-to-piwik-with-flag.png)
4442

4543
After use this key we can reveal decrypted content of pastebin:
4644

@@ -82,9 +80,7 @@ http://0bin.asis.io/paste/1ThAoKv4#Zz-nHPnr0vGGg3s/7/RWD2pnZPZl580x9Y2G3IUehfc
8280

8381
Last one contains the flag as an ASCII graphic:
8482

85-
![Flag]
86-
(https://github.com/bl4de/ctf/blob/master/2015/ASIS_CTF_2015/Biglie_Forensic100/biglie-flag.png)
83+
![Flag](https://github.com/bl4de/ctf/blob/master/2015/ASIS_CTF_2015/Biglie_Forensic100/biglie-flag.png)
8784

8885
After completing all lines in one file, we can read the flag:
8986

90-
*ASIS{e29a3ef6f1d71d04c5f107eb3c64bbbb}*

2015/CSAW_CTF_2015/LawnCareimulator_Web200_writeup.md

+3-7
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,7 @@
44

55
Lawn Care Simulator is a simple web application to show how the grass is growing. Yeah, ok. It has premium content, but it requires registration. Registration not working and there's no way to log in as we can't register any account.
66

7-
![Lawn Care Simulator]
8-
(https://github.com/bl4de/ctf/blob/master/2015/CSAW_CTF_2015/Lawn_Care_Simulator_web200/lawncare01.png)
7+
![Lawn Care Simulator](https://github.com/bl4de/ctf/blob/master/2015/CSAW_CTF_2015/Lawn_Care_Simulator_web200/lawncare01.png)
98

109

1110
## Solution
@@ -97,8 +96,7 @@ So when we try to register with username eg. '%%', we see this screen:
9796

9897
We have existing username, now we have to try to find the password.
9998

100-
![Got username]
101-
(https://github.com/bl4de/ctf/blob/master/2015/CSAW_CTF_2015/Lawn_Care_Simulator_web200/lawncare02.png)
99+
![Got username](https://github.com/bl4de/ctf/blob/master/2015/CSAW_CTF_2015/Lawn_Care_Simulator_web200/lawncare02.png)
102100

103101

104102
### Phase 3 - bruteforce password validation
@@ -249,8 +247,7 @@ time for 9 - 3.290462
249247

250248
After *667e217666* time of responses stopped to change, so I've decided to try only with this (I've added some random chars to get 32 characters length of the whole hash) - and it was enough:
251249

252-
![Grab the flag]
253-
(https://github.com/bl4de/ctf/blob/master/2015/CSAW_CTF_2015/Lawn_Care_Simulator_web200/lawncare03.png)
250+
![Grab the flag](https://github.com/bl4de/ctf/blob/master/2015/CSAW_CTF_2015/Lawn_Care_Simulator_web200/lawncare03.png)
254251

255252

256253
And the flag was: *gr0wth__h4ck!nG!1!1!*
@@ -269,4 +266,3 @@ And totaly different and much more straightforward from _Alpackers_:
269266
https://github.com/Alpackers/CTF-Writeups/tree/master/2015/CSAW-CTF/Web/Lawn-Care-Simulator
270267

271268

272-

2015/HACK.LU_CTF_2015/Module_Loader_Web100_writeup.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,11 @@ Since his students never know what date it is and how much time they have until
1111

1212
We get simple web application with two available options:
1313

14-
![Welcome screen]
15-
(https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader1.png)
14+
![Welcome screen](https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader1.png)
1615

1716
After quick research there's an obvious LFI (Local File Include)
1817

19-
![LFI]
20-
(https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader2.png)
18+
![LFI](https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader2.png)
2119

2220
We can include any file using url:
2321

@@ -61,17 +59,14 @@ Also, we can display _.htaccess_, which contains some directory with quite "obvi
6159
6260
Let's take a look there and here we go:
6361
64-
![3cdcf3c63dc02f8e5c230943d9f1f4d75a4d88ae content]
65-
(https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader3.png)
62+
![3cdcf3c63dc02f8e5c230943d9f1f4d75a4d88ae content](https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader3.png)
6663
6764
6865
Last thing is to use LFI and see, what's in flag.php file:
6966
70-
![Flag]
71-
(https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader4.png)
67+
![Flag](https://github.com/bl4de/ctf/blob/master/2015/HACK.LU_CTF_2015/Module_Loader_web100/Module_Loader4.png)
7268
7369
7470
school.fluxfingers.net:1522/?module=../3cdcf3c63dc02f8e5c230943d9f1f4d75a4d88ae/flag.php
7571
7672
77-
flag{hidden_is_not_actually_hidden}

2015/MMACTF_2015/Uploader_Web100.md

+3-7
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,7 @@ You can only upload files whose name is matched by /^[a-zA-Z0-9]+\.[a-zA-Z0-9]+$
1717

1818
Web page contains only one simple upload form:
1919

20-
![Uploader task]
21-
(https://github.com/bl4de/ctf/blob/master/2015/MMACTF_2015/uploader1.png)
20+
![Uploader task](https://github.com/bl4de/ctf/blob/master/2015/MMACTF_2015/uploader1.png)
2221

2322
Each file is accesible after uploading, so we can try to upload some simple shell to find the flag, which should be placed somewhere on the server.
2423

@@ -53,17 +52,14 @@ This won't work in the future versions of PHP, as from PHP 7 ASP tags and _scrip
5352

5453
After uploading the shell, let's take a look around:
5554

56-
![ls -lA executed in /]
57-
(https://github.com/bl4de/ctf/blob/master/2015/MMACTF_2015/uploader2.png)
55+
![ls -lA executed in /](https://github.com/bl4de/ctf/blob/master/2015/MMACTF_2015/uploader2.png)
5856

5957
We can see file named _flag_ in the root directory of the server.
6058

6159
We can execute _cat flag_ command via the shell and catch the flag:
6260

63-
![Flag]
64-
(https://github.com/bl4de/ctf/blob/master/2015/MMACTF_2015/uploader3.png)
61+
![Flag](https://github.com/bl4de/ctf/blob/master/2015/MMACTF_2015/uploader3.png)
6562

6663

6764
## Links
6865

69-
http://php.net/manual/en/language.basic-syntax.phptags.php

2016/CSAW_CTF_2016/mfw/mfw_web125.md

+8-17
Original file line numberDiff line numberDiff line change
@@ -9,25 +9,22 @@ http://web.chal.csaw.io:8000/
99

1010
We get simple website, build with PHP, Bootstrap and with Git. Url looks vulnerable for Local File Include and Directory Traversal, but couple of standards payloads returned only "Detected hacking attempt!" or "That file doesn't exist!" messages.
1111

12-
![Screen caption]
13-
(assets/mfw2.png)
12+
![Screen caption](assets/mfw2.png)
1413

1514

1615
### Digging into .git folder
1716

1817
Abandoned, readable .git folder is a gold mine. Access to one in this challenge wasn't restricted in any way, I could easily navigate through all folders and files using web browser:
1918

20-
![Git]
21-
(assets/mfw3.png)
19+
![Git](assets/mfw3.png)
2220

2321
But I wanted source code to find out the way to exploit LFI or Directory Traversal, so with little help of my own tool, **diggit** (https://github.com/bl4de/security-tools/tree/master/diggit) I downloaded sources:
2422

2523
```
2624
$ ./diggit.py -u http://web.chal.csaw.io:8000/ -t /Users/bl4de/hacking/ctf/2016/CSAW_CTF_2016/mfw -r true -o 7a0a66bbc50a8fdb83909b79c328bff4596f71ed
2725
```
2826

29-
![diggit in action]
30-
(assets/mfw6.png)
27+
![diggit in action](assets/mfw6.png)
3128

3229
I checked the file ```flag.php``` (I found commented link to it earlier, when I was checking HTML source of website), but it does not contain anything interesting, except comment ```//TODO``` - and that was crucial information to find the solution of this challenge, but more on this later:
3330

@@ -148,14 +145,12 @@ If you are able to display such output, use option 'View source' in your browser
148145

149146
Here's an output from previous payload directly in the browser tab (interpreted as regular HTML, which is very hard to read, not what we want to see):
150147

151-
![command as HTML]
152-
(assets/output1.png)
148+
![command as HTML](assets/output1.png)
153149

154150

155151
And here's how it looks like when 'View source' option is used instead:
156152

157-
![command as HTML]
158-
(assets/output2.png)
153+
![command as HTML](assets/output2.png)
159154

160155
--
161156

@@ -180,8 +175,7 @@ Bingo!
180175

181176

182177

183-
![git status]
184-
(assets/mfw7.png)
178+
![git status](assets/mfw7.png)
185179

186180
```flag.php``` was modified, but no changes were added to commit and commited, so file I've downloaded earlier didn't contain newest changes.
187181

@@ -194,8 +188,7 @@ view-source:http://web.chal.csaw.io:8000/?page='.system("cd /var/www/html/;git d
194188

195189
And here we are:
196190

197-
![Flag]
198-
(assets/mfw5.png)
191+
![Flag](assets/mfw5.png)
199192

200193

201194
The flag:
@@ -204,13 +197,11 @@ The flag:
204197
<?php $FLAG="flag{3vald_@ss3rt_1s_best_a$$ert}"; ?>
205198
```
206199

207-
![git diff FTW!!!]
208-
(assets/gitdiff.png)
200+
![git diff FTW!!!](assets/gitdiff.png)
209201

210202
--
211203

212204
I had a lot of fun with this challenge, even if it was relatively simple. It contains a lot of obvious vulnerabilities like (potential) LFI with Directory Traversal and (fully exploitable) RCE, but in the end the solution turned into Git and some Git commands knowledge.
213205

214206
Thanks to CSAW Team for great CTF this year!
215207

216-
Looking forward for CSAW CTF 2017 :)

2016/Google_CTF_2016/Ernst_Echidna_Web_50/README.md

+5-10
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,11 @@ Can you hack (url provided) website? The robots.txt sure looks interesting.
99

1010
We've got simple web page, which allows us to register an account:
1111

12-
![Ernst Echidna]
13-
(assets/1.png)
12+
![Ernst Echidna](assets/1.png)
1413

1514
Register form:
1615

17-
![Ernst Echidna]
18-
(assets/2.png)
16+
![Ernst Echidna](assets/2.png)
1917

2018
_robots.txt_ reveals one hidden path:
2119

@@ -27,16 +25,13 @@ At above url there's hidden administration panel and we need to has administrati
2725

2826
After successful registration a cookie with MD5 hash of our login is set:
2927

30-
![Ernst Echidna]
31-
(assets/3.png)
28+
![Ernst Echidna](assets/3.png)
3229

3330
Simple change cookie content to MD5('admin') and refreshing browser tab allows to access panel:
3431

35-
![Ernst Echidna]
36-
(assets/4.png)
32+
![Ernst Echidna](assets/4.png)
3733

3834

3935
...and reveals the flag:
4036

41-
![Ernst Echidna]
42-
(assets/5.png)
37+
![Ernst Echidna](assets/5.png)

2016/Google_CTF_2016/In_Recorded_Conversation_Forensic_25/README.md

-1
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,3 @@ And we can simply collect fragments of the flag:
2727

2828
```
2929
CTF{some_leaks_are_good_leaks_}
30-
```

2016/Google_CTF_2016/Spotted_Quoll_Web_50/README.md

+2-5
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,14 @@ This blog on Zombie research looks like it might be interesting - can you break
99

1010
We get web page with quite simple interface:
1111

12-
![Spotted Quoll]
13-
(assets/1.png)
12+
![Spotted Quoll](assets/1.png)
1413

1514
We have no access to _Admin_
1615

1716

1817
Quick look at request headers shows Cookie header contains long Base64 string:
1918

20-
![Spotted Quoll]
21-
(assets/2.png)
19+
![Spotted Quoll](assets/2.png)
2220

2321
String contains Python Pickle module object.
2422

@@ -46,4 +44,3 @@ c2 = base64.b64encode(cPickle.dumps(n))
4644
```
4745

4846
Simple change of _obsoletePickle_ cookie allows us to access Admin and read the flag.
49-

2016/Google_CTF_2016/Wallowing_Wallabies_Web_25/README.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,7 @@ Wallowing Wallabies provides enterprise contract management - we'd like to find
99

1010
We've got web page with no visible navigation or form except Home page:
1111

12-
![Wallowing Wallabies]
13-
(assets/1.png)
12+
![Wallowing Wallabies](assets/1.png)
1413

1514
Quick look at _robots.txt_ reveals some hidden content:
1615

@@ -30,8 +29,7 @@ Disallow: /deep-blue-sea/team/vendors
3029

3130
Web page at _/deep-blue-sea/team/vendors_ contains form with two fields:
3231

33-
![Wallowing Wallabies]
34-
(assets/2.png)
32+
![Wallowing Wallabies](assets/2.png)
3533

3634
Text field was vulnerable to XSS and allows to put payload with simple JavaScript to steal cookie:
3735

@@ -63,11 +61,8 @@ After a couple of minutes someone "read" message and _cookies.txt_ file on _swor
6361
green-mountains=eyJub25jZSI6ImUxNjgwMjcyYTcxNDE3MjMiLCJhbGxvd2VkIjoiXi9kZWVwLWJsdWUtc2VhL3RlYW0vdmVuZG9ycy4qJCIsImV4cGlyeSI6MTQ2MjAzMTg2OH0=|1462031865|d985a99f12846cd73da3b9b01b3b921fd15512e3
6462
```
6563

66-
![Wallowing Wallabies]
67-
(assets/3.png)
64+
![Wallowing Wallabies](assets/3.png)
6865

6966
Refresh of Wallowing Wallabies page with stolen cookie revealed the flag:
7067

71-
![Wallowing Wallabies]
72-
(assets/4.png)
73-
68+
![Wallowing Wallabies](assets/4.png)

2016/HackIM_2016/Unicle_Web200/Unicle_Web200_writeup.md

+4-9
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,7 @@ OSaaS is the new trend for 2016! Store your object directly in the cloud. Get ri
66

77
http://54.84.124.93/
88

9-
![Unicle application]
10-
(unicle01.png)
9+
![Unicle application](unicle01.png)
1110

1211
## Solution
1312

@@ -29,8 +28,7 @@ After some attempts to read eg. MySQL version via _version()_ I've realized that
2928
http://54.84.124.93/?cat=2+union+select+1,2,%22aaa%22,4/**/
3029
```
3130

32-
![SQLi]
33-
(unicle02.png)
31+
![SQLi](unicle02.png)
3432

3533
That was something new for me, so I've tried some other payloads:
3634

@@ -99,8 +97,7 @@ http://54.84.124.93/?cat=1+and+1=2+union+select+1,2,%22c__builtin__%0Aeval%0A%28
9997
10098
And a result in Burp Repeater:
10199
102-
![ls -l result]
103-
(unicle04.png)
100+
![ls -l result](unicle04.png)
104101
105102
106103
So there's a _flag_ file directly in _/var/www_ directory, so let's get it!
@@ -114,8 +111,7 @@ http://54.84.124.93/?cat=1+and+1=2+union+select+1,2,%22c__builtin__%0Aeval%0A%28
114111
And the flag is:
115112
116113
117-
![flag]
118-
(unicle_flag.png)
114+
![flag](unicle_flag.png)
119115
120116
## Summary
121117
@@ -134,4 +130,3 @@ Flask
134130
http://flask.pocoo.org/
135131
136132
SQLAlchemy
137-
http://flask-sqlalchemy.pocoo.org/2.1/

0 commit comments

Comments
 (0)