For this one we're given a link to a Megaupload hosted file. It's a 93mb file so it's gotta be good! The clue was: I got locked out of my iTrash :( 1 2 3 4 5 6 7 8 9 Flag format: ctf(n-n-...-n) Interesting. What is it? We inspect the contents: [shell] root@kali:~/ctfx/itrash# unzip -t iTrash Archive: iTrash.zip testing:…

In this challenge we were given an string and told that it was an authorization token that had expired. We want to forge an authorization token for whatever service this token is used for. The token we're given is this: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkFtYXppbmcgSGF4eDByIiwiZXhwIjoiMTQ2NjI3MDcyMiIsImFkbWluIjp0cnVlfQ.UL9Pz5HbaMdZCV9cS9OcpccjrlkcmLovL2A2aiKiAOY We quickly recognize this as a JWT, Json Web Token. I headed over to the jwt.io site to check…

Was pretty surprised to see CGC challenges on the SecuInside CTF this year so I got involved with these. Dusted off my CGC vagrant VM from Defcon earlier this year and went to town. This second challenge was a bit more in depth than Cykor_0001 so I'll write this one up instead. Firstly I just downloaded the binary and ran…

Cool little challenge, we're given a hostname and port. When we connect we're presented with a '>' prompt and we have to deduce the environment we're in then exploit it. worst-pwn-ever tocttou is an enviornmentalist. But some say he has a vicious motive and he uses nature to hide his dark side. We found a weird shell on his amazon…

According to the challenge text this was a re-implemented challenge first seen at the AISA 2015 CTF. Since that was an onsite event I had not seen or heard of it before. So I approached it as a new challenge. The challenge consists of a file called unbreakable-2.0.tar.gz which when we download, unpacks to three files: [shell] root@kali:~/auscert/unbreakable# tar xvf…

Guest post by team member 0pc0d3 today, thanks Opc0d3 damn that name is hard to type. Firstly, we check the firewall. However, the URL does not resolve to an address. So let's have a look at the documents and manuals that the angry admin backed up. Unpacking it, we can see that the document allows us to identify the firewall…

Cool challenge this one based on an interesting article published recently. We're given the following clue The link takes us to a ordinary looking "File Upload Challenge" website but this one has a difference under the hood. A brief recon gives us the following links in robots.txt: User-Agent: * Disallow: / Disallow: /debug.php Disallow: /cache Disallow: /uploads Visiting debug.php we…

Close