Skip to content

Commit a132413

Browse files
committed
Added nuitduhack2014 writeups
1 parent 4d3111c commit a132413

File tree

6 files changed

+22
-324
lines changed

6 files changed

+22
-324
lines changed

_posts/2014-04-07-backdoor-2014-writeups.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ paranoid.
7575

7676

7777

78-
<h2>Web 10</h2>
78+
<h3>Web 10</h3>
7979

8080
<pre><code>[andrew@archa ~]$ curl -v http://backdoor.cognizance.org.in/problems/web10/
8181
* Hostname was NOT found in DNS cache
@@ -100,7 +100,7 @@ paranoid.
100100

101101
<p>Do you spot the flag?</p>
102102

103-
<h2>Web 30</h2>
103+
<h3>Web 30</h3>
104104

105105
<pre><code>[andrew@archa ~]$ curl http://backdoor.cognizance.org.in/problems/web30/ -D - -o /dev/null
106106
Date: Sun, 23 Mar 2014 02:05:23 GMT
@@ -124,7 +124,7 @@ Sorry , you will never get a flag in your life :P Not authorized
124124
Here is a flag : aeba37a3aaffc93567a61d9a67466fdf
125125
</code></pre>
126126

127-
<h2>Web 50</h2>
127+
<h3>Web 50</h3>
128128

129129
<p>The PHP script appears to be running a SQL query of the form <code>SELECT FROM QUOTES WHERE quote LIKE '$search';</code></p>
130130

@@ -169,7 +169,7 @@ Table: the_flag_is_over_here
169169
</code></pre>
170170

171171

172-
<h2>Web 100-1</h2>
172+
<h3>Web 100-1</h3>
173173

174174
<p>The server has to retrieve the picture in order to rate it, right? Does it do anything else? Let's listen on port 80 on any server:</p>
175175

@@ -194,14 +194,14 @@ Table: the_flag_is_over_here
194194
&lt;title&gt;Super Secret Page&lt;/title&gt;
195195
&lt;/head&gt;
196196
&lt;body&gt;
197-
&lt;h2&gt;Super secret page&lt;/h2&gt;
197+
&lt;h3&gt;Super secret page&lt;/h3&gt;
198198
&lt;p&gt;This is a dangerous place. You shouldn't be lurking here. Click &lt;a id="./submit.php"&gt;here&lt;/a&gt; to go back.&lt;/p&gt;
199199
&lt;!-- By the way, the flag is f556b9a48a3ee914f291f9b98645cb02 --&gt;
200200
&lt;/body&gt;
201201
&lt;/html&gt;
202202
</code></pre>
203203

204-
<h2>Web 300</h2>
204+
<h3>Web 300</h3>
205205

206206
<p>This problem gives you an interface to check whether a user has registered <a href="http://backdoor.cognizance.org.in/problems/web300/status.php">here</a>. </p>
207207

@@ -305,7 +305,7 @@ Table: the_elusive_flag
305305
</code></pre>
306306

307307

308-
<h2>Misc 250-2</h2>
308+
<h3>Misc 250-2</h3>
309309

310310
<blockquote>
311311
<p>Username and password based login seemed a bit too monotonous. We developed an

nuitduhack2014/writeups.md renamed to _posts/2014-04-07-nuit-du-hack-2014-writeups.md

+15-22
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
1-
<link rel='stylesheet' href='markdown8.css'/>
1+
---
2+
layout: post
3+
title: "Nuit Du Hack Quals 2014 Writeups"
4+
description: ""
5+
category: writeups
6+
tags: [nuitduhack2014]
7+
---
8+
<!--{% include JB/setup %}-->
29

3-
Nuit Du Hack Quals 2014 Writeups
4-
================================
5-
<a id="carbonara"></a>
6-
7-
Carbonara
8-
---------
10+
### Carbonara
911

1012
We're provided the following cryptic string:
1113

@@ -40,9 +42,7 @@ No need to reverse-engineer this; we can simply use it in the javascript console
4042
tncms.unscramble('%96 7=28 7@C E9:D 492= :D iQx>A6C2E@C xF=:FD r26D2C s:GFDQ]')
4143
"The flag for this chal is :"Imperator Iulius Caesar Divus"."
4244

43-
<a id="onionrings"></a>
44-
Onion Rings
45-
-----------
45+
### Onion Rings
4646

4747
The hidden service accepts a profile picture upload, and includes the option to load from a non-TOR URL. So, we can ask it to load from our server, and capture the IP of the requestor.
4848

@@ -52,10 +52,7 @@ The server's IP was 212.83.153.197. Visiting [http://212.83.153.197/](http://212
5252

5353
The flag.. It is '0hSh1t1r4n0ut0fn00dl35'
5454

55-
<a id="windowsforensics"></a>
56-
57-
Windows Forensics
58-
-----------------
55+
### Windows Forensics
5956

6057
We are given a 400MB Windows pagefile. A few initial attempts along the lines of `strings pagefile.sys | grep flag` turned up quite a lot of results, but no interesting ones. Noticing several Chrome-related strings, we searched the file for URLs. Still, we found nothing interesting.
6158

@@ -88,20 +85,17 @@ Then, ran page_brute on pagefile.sys and reviewed the results using `strings -el
8885

8986
Neither the password nor either of the two hex strings were the flag, so we tried concatenating the two hex strings. `04c0f778e6dd6c0a025e48c9f5f22f87` was the flag. The lowercase flag format gave us a hint for Here Kitty Kitty.
9087

91-
<a id="herekittykitty"></a>
92-
Here Kitty Kitty
93-
----------------
88+
### Here Kitty Kitty
9489

9590
In lieu of a writeup, we offer the following two images, and leave the solution as an exercise to the reader:
9691

97-
![waveform](kitty-waveform.png)
92+
![waveform](/assets/images/nuitduhack2014/kitty-waveform.png)
9893

99-
![morse code](morse.png)
94+
![morse code](/assets/images/nuitduhack2014/morse.png)
10095

10196
Unfortunately, `5BC925649CB0188F52E617D70929191C` was not accepted. We tried HashCat dictionary and bruteforce attacks without success. After solving Windows Forensics, we tried submitting as lowercase, which was successful. Case-sensitivity isn't fun!
10297

103-
BigMomma
104-
--------
98+
### BigMomma
10599

106100
Though we had the server binary, and briefly attempted to reverse it, we were able to identify how it worked by playing around with it for a few minutes.
107101

@@ -147,4 +141,3 @@ Though a script ultimately would have been a better idea, we figured at this poi
147141
4dM1N15TR4T0R
148142
Username correct, what is the password?THEpasswordISreallyLONGbutYOUllGETtoTHEendOFitEVENTUALLY
149143
Well done! Here is the flag: YoMamaIsLikeHTML,SmallHeadAndHugeBody
150-
File renamed without changes.

nuitduhack2014/index.html

-158
This file was deleted.

0 commit comments

Comments
 (0)