-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
8ed7b5a
commit 75d87bd
Showing
4 changed files
with
61 additions
and
6 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
# My USB - 150 points | ||
|
||
I found_ [my usb](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/my-usb/usb.img) from a long time ago. I know there's a flag on there somewhere; can you help me find it? | ||
|
||
### Solution | ||
###### Writeup by Valar Dragon | ||
|
||
We're given a USB img. First thing I did was try to actually restore the USB image onto a USB. We see a document called "hack.docx", with two images in it, and a zip file called flag.zip, with an image of the usaflag in it, and an image called cryptolock.png. | ||
|
||
Doing my standard forensic analysis, like looking at hexdumps, and looking for other file headers through scalpel, yielded nothing. | ||
There is some code that is visible on both of the images inside the word file, but it seems too distorted to be relevant. | ||
|
||
Then I thought to scalpel the original USB img file. | ||
|
||
``` bash | ||
$ scalpel -c scalpelConfig.txt usb.img | ||
``` | ||
|
||
This gives 3 images, instead of just the two inside of the docx! (It doesn't give the image inside of flag.zip) | ||
|
||
Heres the extra file: | ||
|
||
![flag.jpg](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/My%20USB/flag.jpg) | ||
|
||
Theres our flag! | ||
`flag{d3let3d_f1l3z_r_k00l}` | ||
|
||
### External Writeups | ||
|
||
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/My%20USB/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/My%20USB/README.md) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
# Scisnerof - 70 points | ||
|
||
I found weird file! [elif](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/scisnerof/elif) | ||
|
||
### Solution | ||
###### Writeup by Valar Dragon | ||
|
||
Scisnerof is Forensics backwards, and elif is file backwards! It seems likely that elif is a reversed file. | ||
This "elif" file has no default app, so let us look at it through a hex editor. I used Bless, a hex editor for linux. | ||
|
||
![hexdump.png](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/scisnerof/hexdump.png) | ||
If we scroll to the bottom, we see that theres the PNG File header reversed to GNP! | ||
|
||
So it looks we just need to reverse the file! | ||
We can do it in one line with python | ||
``` python | ||
$ python3 | ||
open('scisnerof.png','bw+').write(open('elif','br').read()[::-1]) | ||
``` | ||
|
||
Then open up [scisnerof.png](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/scisnerof/scisnerof.png), | ||
![scisnerof.png](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/scisnerof/scisnerof.png) | ||
and theres our flag! `easyctf{r3v3r5ed_4ensics}` | ||
|
||
|
||
### External Writeups | ||
|
||
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/scisnerof/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/scisnerof/README.md) |