You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p>This is a dangerous place. You shouldn't be lurking here. Click <a id="./submit.php">here</a> to go back.</p>
199
199
<!-- By the way, the flag is f556b9a48a3ee914f291f9b98645cb02 -->
200
200
</body>
201
201
</html>
202
202
</code></pre>
203
203
204
-
<h2>Web 300</h2>
204
+
<h3>Web 300</h3>
205
205
206
206
<p>This problem gives you an interface to check whether a user has registered <ahref="http://backdoor.cognizance.org.in/problems/web300/status.php">here</a>. </p>
207
207
@@ -305,7 +305,7 @@ Table: the_elusive_flag
305
305
</code></pre>
306
306
307
307
308
-
<h2>Misc 250-2</h2>
308
+
<h3>Misc 250-2</h3>
309
309
310
310
<blockquote>
311
311
<p>Username and password based login seemed a bit too monotonous. We developed an
"The flag for this chal is :"Imperator Iulius Caesar Divus"."
42
44
43
-
<aid="onionrings"></a>
44
-
Onion Rings
45
-
-----------
45
+
### Onion Rings
46
46
47
47
The hidden service accepts a profile picture upload, and includes the option to load from a non-TOR URL. So, we can ask it to load from our server, and capture the IP of the requestor.
48
48
@@ -52,10 +52,7 @@ The server's IP was 212.83.153.197. Visiting [http://212.83.153.197/](http://212
52
52
53
53
The flag.. It is '0hSh1t1r4n0ut0fn00dl35'
54
54
55
-
<aid="windowsforensics"></a>
56
-
57
-
Windows Forensics
58
-
-----------------
55
+
### Windows Forensics
59
56
60
57
We are given a 400MB Windows pagefile. A few initial attempts along the lines of `strings pagefile.sys | grep flag` turned up quite a lot of results, but no interesting ones. Noticing several Chrome-related strings, we searched the file for URLs. Still, we found nothing interesting.
61
58
@@ -88,20 +85,17 @@ Then, ran page_brute on pagefile.sys and reviewed the results using `strings -el
88
85
89
86
Neither the password nor either of the two hex strings were the flag, so we tried concatenating the two hex strings. `04c0f778e6dd6c0a025e48c9f5f22f87` was the flag. The lowercase flag format gave us a hint for Here Kitty Kitty.
90
87
91
-
<aid="herekittykitty"></a>
92
-
Here Kitty Kitty
93
-
----------------
88
+
### Here Kitty Kitty
94
89
95
90
In lieu of a writeup, we offer the following two images, and leave the solution as an exercise to the reader:
Unfortunately, `5BC925649CB0188F52E617D70929191C` was not accepted. We tried HashCat dictionary and bruteforce attacks without success. After solving Windows Forensics, we tried submitting as lowercase, which was successful. Case-sensitivity isn't fun!
102
97
103
-
BigMomma
104
-
--------
98
+
### BigMomma
105
99
106
100
Though we had the server binary, and briefly attempted to reverse it, we were able to identify how it worked by playing around with it for a few minutes.
107
101
@@ -147,4 +141,3 @@ Though a script ultimately would have been a better idea, we figured at this poi
147
141
4dM1N15TR4T0R
148
142
Username correct, what is the password?THEpasswordISreallyLONGbutYOUllGETtoTHEendOFitEVENTUALLY
149
143
Well done! Here is the flag: YoMamaIsLikeHTML,SmallHeadAndHugeBody
0 commit comments