Monday, April 1, 2019

[Writeup] Sunshine CTF 2019

Forensics

Golly

It's a code of Golly rle file, when I run a code given I just have a alphabet table:

Run it and nothing else, I read a rle file document at here. And I know a "$" represents the end of each row and an optional "!" represents the end of the pattern. So I just copy the paragraph after !$$$$ and I got

Flag: sun{th1s_w0nt_last}

Castles

Open the file in HXD I saw something like a hint:

Hey! Mario said something about a hidden key. Hesaid this: F2I and A1S, and that it was in two pieces

Because this is 001 file so I use FTK Imager to open it. And I found an JPG image of Mario:




Because it is an JPG file and need a key to open it so I think the right tool would be steghide. Now I need to find a key to have a flag. With the hint above and in slack file in FTK I found something like a password of Castello_Di_Amorosa and Castelo_da_Feira I combined all of it and have a string:
AQ273RFGHUI91OLO987YTFGY78IK



Flag: flag{7H4NK5_F0R_PL4Y1NG}

We Will We Will

It's img file so I used Autospy to open it, after do some stuff I realize I have a luks file.



 Luks file is a encrypted image on Linux so I need a password. But I don't have any hint of password so I think need brute force a password. Hashcat is a good tool for this.

hashcat64.exe -a 0 -m 14600 luks rockyou.txt

And the password  is: filosofia
Mount it and I have flag is a partition name


$sudo cryptsetup open b.luks flag


Flag: sun{wrasslin}

Related Posts:

  • [Writeup] ASIS 2019 Quals Flag collision In this challenge, we need to sumbit two string differene but same length and same crc 32. After I try to brute force two string with length is 15 and submit to server, I received the example of admin is two … Read More
  • [Writeup] Pragyan CTF - ForensicsWelcome We have a jpg file, I used HXD and see a zip file in it, then I used binwalk to get the zip file. 1 2 3 4 5 6 7 $ binwalk welcome.jpeg DECIMAL HEXADECIMAL DESCRIPTION ---------------------------------… Read More
  • [Writeup] Insomnihack final 2019 myBrokenBash For this challenge, the author give us something about stdout and when I try to send something the server will reply the string that I send, it's make me remember to a challenge in Ringzer0 CTF about bash shell… Read More
  • [Writeup] Sunshine CTF 2019 Forensics Golly It's a code of Golly rle file, when I run a code given I just have a alphabet table: Run it and nothing else, I read a rle file document at here. And I know a "$" represents the end of each row and a… Read More
  • [Writeup] Mates SS3 Round 4 Programing Đề bài làm bắt chúng ta phải làm sao từ 2 bình nước x, y có thể tích vx, vy và phải đong nước làm sao cho được z lít. Đây là bài toàn đong nước kinh điển, may mắn là mình đã được học qua ở trường nên có thể làm đ… Read More

3 comments:

  1. How long did it take to find the password for LUKS?

    ReplyDelete
    Replies
    1. 30 mins for me. I think it depend for your hardware

      Delete
    2. Yeah, after 10 minutes I had 0 hashes processed. Seems like I had no chances to solve this challenge during the CTF)

      Delete