Post

2023 Other CTFS

2023 Other CTFS

Info

Other CTFs from various sources

Forensics

Keys to the kingdom

Info

https://ghosttown.deadface.io/

Objective

Extract image from pcap

Solve

Get an insight via network miner

Image was transferred with multiple tcp streams

And it looks like a FJIF file

Lets grab the data from all tcp streams and merge to a file (can be better done via scrapy)

1
2
3
4
5
┌──(bravosec㉿fsociety)-[/tmp]
└─$ mkdir tcp_dumps

┌──(bravosec㉿fsociety)-[/tmp]
└─$ for i in $(seq 0 40); do tshark -q -r Thekeytothekingdom.pcap -z follow,tcp,raw,$i > tcp_dumps/$i; done
1
2
3
4
5
6
┌──(bravosec㉿fsociety)-[/tmp]
└─$ cd tcp_dumps

┌──(bravosec㉿fsociety)-[/tmp/tcp_dumps]
└─$ ls
0  1  10  11  12  13  14  15  16  17  18  19  2  20  21  22  23  24  25  26  27  28  29  3  30  31  32  33  34  35  36  37  38  39  4  40  5  6  7  8  9
1
2
┌──(bravosec㉿fsociety)-[/tmp]
└─$ xonsh
1
2
3
4
def get_data(content:str):
    if len(content.split()) != 15:
        return
    return content.split()[-2]
1
datas=[get_data($(cat @(f))) for f in $(ls).splitlines()]
1
2
3
for d in datas:
     if d:
         $(echo @(d) >> result.raw)
1
bravosec@fsociety /tmp/tcp_dumps @ xxd -r -p result.raw result.out

Result :

Reversing

Challenge 1

Info

Unknown source, from DC user

Objective

Extract user password from a binary

Solve

Enum

1
2
3
┌──(bravosec㉿fsociety)-[/media/sf_kali-share]
└─$ file SuperBrowser-cli
SuperBrowser-cli: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=18409341e784ffa6662849dd9d139bb70e86e715, for GNU/Linux 3.2.0, not stripped

Using Cutter; It asks for a URL as argument

Then check if user input credentials matches encrypted hard coded credential

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
undefined8 authenticate(char *arg1, char *arg2)
{
    int32_t iVar1;
    undefined8 uVar2;
    int64_t in_FS_OFFSET;
    char *var_108h;
    char *s1;
    char *src;
    int64_t var_e0h;
    int64_t var_d8h;
    int64_t var_d0h;
    int64_t var_c8h;
    char *dest;
    char *s2;
    int64_t canary;
    
    canary = *(int64_t *)(in_FS_OFFSET + 0x28);
    src._0_4_ = 0x6a72666f;
    src._4_2_ = 0x78;
    stack0xffffffffffffff18 = (char *)0x597a57665372404e;
    var_e0h = 0x40685f7a30645f74;
    var_d8h = 0x33617130785f7973;
    var_d0h = 0x59685f786e6d595f;
    var_c8h._0_4_ = 0x3839306b;
    var_c8h._4_2_ = 0x37;
    strcpy(&dest, &src);
    strcpy(&s2, (int64_t)&src + 6);
    decrypt((char *)&dest, 5);
    decrypt((char *)&s2, 5);
    iVar1 = strcmp(arg1, &dest);
    if (iVar1 == 0) {
        iVar1 = strcmp(arg2, &s2);
        if (iVar1 == 0) {
            uVar2 = 1;
            goto code_r0x5615552d8814;
        }
    }
    uVar2 = 0;
code_r0x5615552d8814:
    if (canary != *(int64_t *)(in_FS_OFFSET + 0x28)) {
        uVar2 = __stack_chk_fail();
    }
    return uVar2;
}

Debug program to get register values

Press F2 to set a breakpoint on if statement after username and password were decrypted

Press F9 to start debugger

Press CTRL + ` to open console

Send two inputs for username and password

Continue to the breakpoint

Now I can see the username james at rdx

Show in -> Hexdump

Now we get both username and password

james : I@mNaRuTo_y0u_c@nt_s0lv3_This_cTf0987

This post is licensed under CC BY 4.0 by the author.