Post

CyberTalents Bootcamp 2022

This is CyberTalents Bootcamp(Online)2022 challenges.

Introduction to CTF

Competition

Description: Special kind of cybersecurity competition designed to challenge its participants to solve computer security problems.

solution: ctf

Cybersecurity Overview

fisher

Description: What is the job match the below definition?

Individuals who know the nuts and bolts of cybersecurity and are well versed in finding flaws and vulnerabilities. There are various bug bounty platforms that allow them to be paid to find vulnerabilities in applications and software.

Flag format: flag{xxx xxxxxx xxxxxx}

Solution: This challenge doesn’t need alot of explanation. You can do other research on bug bounty hunter

flag{bug bounty hunter}

Attacks & Vulnerabilities

Mailer

Description: we got the evidence for the phishing Email but we need to know the name of malware file

flag format flag{}

Solution:

We shall use wget to download the file we are given.

1
wget https://hubchallenges.s3-eu-west-1.amazonaws.com/Forensics/mail_bak.7z

Once downloaded we shall unzip the mail_bak.7z by use of 7z

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
└─$ 7z x mail_bak.7z

7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,4 CPUs Intel(R) Core(TM) i5-4210U CPU @ 1.70GHz (40651),ASM,AES-NI)

Scanning the drive for archives:
1 file, 235694 bytes (231 KiB)

Extracting archive: mail_bak.7z
--
Path = mail_bak.7z
Type = 7z
Physical Size = 235694
Headers Size = 177
Method = LZMA2:3m
Solid = +
Blocks = 1

Everything is Ok

Files: 2
Size:       2714896
Compressed: 235694

We have sent and inbox files. We need to know the name of malware file which was sent so we shall cat the contents of sent and grep .exe file extension.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
└─$ cat Sent | grep .exe
> ctbank.com/Mal_strike8941934890753353453.exe
> <http://ctbank.com/Mal_strike8941934890753353453.exe>
>>     www.ctbank.com/Mal_strike8941934890753353453.exe
>>     <http://www.ctbank.com/Mal_strike8941934890753353453.exe>
            href="http://ctbank.com/Mal_strike8941934890753353453.exe">ctbank.com/Mal_strike8941934890753353453.exe</a><br>
                          href="http://www.ctbank.com/Mal_strike8941934890753353453.exe"
> Account director Evan Russack becomes the No. 2 digital exec
> appointment of Evan Russack to executive director of digital. Russack,
                                                digital exec</span>
                                      executive director of digital.
Subject: Re: BREAKING: Nasdaq drops another 1.3% Friday, other major indexes
                              <td>How C-suite execs have shifted their
grep: (standard input): binary file matches

Awesome, we have the name of the file which is Mal_strike8941934890753353453.exe and that’s our flag. flag{Mal_strike8941934890753353453.exe}

Network Security Fundamentals

Mask

Description: What is the subnet mask for this host? subnet

Solution We can clearly see the subnet mask is 255.255.255.0 and that’s our flag.

Wireshark

cl34r

Description: Can You see the password clearly

Solution:

We shall use wget to download the file.

1
wget https://hubchallenges.s3.eu-west-1.amazonaws.com/Forensics/cl34r.pcapng

Once opened on wireshark we can clearly see some movement of packets.

wireshark1

Let’s follow the GET request on /login.php packet There we can see the flag but it is url encoded.

follow

We shall use cyberchef to decode the url encoded string.

cyberchef

Awesome we have our flag flag{Th1s_15_t0_cl34r}

Anonymous

Description: Can you trace the anonymous guy?

Solution:

We shall use wget to download the file.

1
└─$ wget https://hubchallenges.s3-eu-west-1.amazonaws.com/Forensics/anonymous.pcap

Let’s use the strings to see if we can get something out of it

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
└─$ strings -n 10 anonymous.pcap
220 pyftpdlib 1.5.4 ready.
USER anonymoys
331 Username ok, send password.
PASS anonymous
530 Authentication failed.
215 UNIX Type: L8
PORT 192,168,0,164,179,157
530 Log in with USER and PASS first.
530 Log in with USER and PASS first.
PORT 192,168,0,164,179,158
530 Log in with USER and PASS first.
220 pyftpdlib 1.5.4 ready.
 CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
 CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
USER anonymous
331 Username ok, send password.
PASS anonymous
230 Login successful.
215 UNIX Type: L8
PORT 192,168,0,164,181,46
200 Active data connection established.
125 Data connection already open. Transfer starting.
drwxrwxrwt   2 root     root         4096 Mar 11 18:29 .ICE-unix
drwxrwxrwt   2 root     root         4096 Mar 11 18:29 .Test-unix
drwxrwxrwt   2 root     root         4096 Mar 11 18:29 .X11-unix
drwxrwxrwt   2 root     root         4096 Mar 11 18:29 .XIM-unix
drwxrwxrwt   2 root     root         4096 Mar 11 18:29 .font-unix
-rw-r--r--   1 root     root           37 Mar 11 18:35 flag.txt
drwx------   3 root     root         4096 Mar 11 18:29 systemd-private-554f9bdfbd734f3b8cac1440e18753dc-apache2.service-Rsquyf
drwx------   3 root     root         4096 Mar 11 18:29 systemd-private-554f9bdfbd734f3b8cac1440e18753dc-systemd-logind.service-nXcWeh
drwx------   3 root     root         4096 Mar 11 18:29 systemd-private-554f9bdfbd734f3b8cac1440e18753dc-systemd-resolved.service-8ajXRf
226 Transfer complete.
 CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
 CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
 CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
 CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
200 Type set to: Binary.
PORT 192,168,0,164,182,186
200 Active data connection established.
RETR flag.txt
125 Data connection already open. Transfer starting.
ZmxhZ3thbm9ueW1vdXNfdDBfdGgzX2VuZH0=
226 Transfer complete.

Well as we can see we have a base64 string their and we have to decode it.

1
2
└─$ echo "ZmxhZ3thbm9ueW1vdXNfdDBfdGgzX2VuZH0=" | base64 -d
flag{anonymous_t0_th3_end}

Awesome we have our flag: flag{anonymous_t0_th3_end}

OSI Model

http

Description: start the server and you will be able to reach the flag on ctweb.com?

username: ctf

password: ctf

Solution: The first thing is to start the challenge and you are given a web shell. We shall use curl to see what’s on ctweb.com.

1
2
3
4
5
6
7
8
9
ctf@wlem4m2366qcg3011y3e1e0sxzm61y3eq89pbx3m-web-5949f4679f-srh8v:~$ curl ctweb.com                                                                               6 ⨯
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
  -->
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
    <title>access /fl4g.html directory to get your flag</title>
  </head>
  </html>ctf@wlem4m2366qcg3011y3e1e0sxzm61y3eq89pbx3m-web-5949f4679f-srh8v:~$

We shall navigate to /fl4g.html directory so as we get the flag and we shall use curl again.

1
2
3
ctf@wlem4m2366qcg3011y3e1e0sxzm61y3eq89pbx3m-web-5949f4679f-srh8v:~$ curl ctweb.com/fl4g.html
flag{htt9_pR0toc01}
ctf@wlem4m2366qcg3011y3e1e0sxzm61y3eq89pbx3m-web-5949f4679f-srh8v:~$

Awesome we have our flag flag{htt9_pR0toc01}

address

Description: (What is the source and destination IP/MAC for packet number 258 Mac address in small letters.)

Flag format: flag{Source IP/Source MAC/Destination IP/Destination MAC}

Solution: This was fairly simple challenge and all you were required to do is load the pcapng file to wireshark and check packet number 258.

Use wget to download the file.

1
└─$ wget https://hubchallenges.s3.eu-west-1.amazonaws.com/foren/Wireshark101.pcapng

address

We have all the information. We shall get all the information required by the challenge i.e IP/source MAC/Destination IP/Destination flag: flag{40.77.226.250/38:54:9b:31:db:b8/192.168.1.4/08:00:27:ba:8c:38}

Network Protocol

bflag

Description All of us started from the bottom. Now it’s your turn.

Solution:

For this challenge we have to analyze the http traffic packets by right clicking > follow > tcp stream.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
GET /f14g/analyze_packet_for_fun HTTP/1.1
Host: www.aldabaknocking.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:67.0) Gecko/20100101 Firefox/67.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Cookie: _ga=GA1.2.1907807868.1562271214; _gid=GA1.2.418247249.1562271214; _gat=1
Upgrade-Insecure-Requests: 1

HTTP/1.1 404 Not Found
Date: Thu, 04 Jul 2019 20:14:16 GMT
Server: Apache
Content-Length: 344
Keep-Alive: timeout=2, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /f14g/analyze_packet_for_fun was not found on this server.</p>
<p>Additionally, a 404 Not Found
error was encountered while trying to use an ErrorDocument to handle the request.</p>
</body></html>

By following stream 86 you’ll find analyze_packet_for_fun was not found on this server and trying analyze_packet_for_fun it was the correct flag.

ADAMIN

Description: Admin of FTP server is spoofed fetching employers data, pcap attached of victim activity

Solution: We shall start by downloading the files

1
└─$ wget https://hubchallenges.s3.eu-west-1.amazonaws.com/Forensics/ADAMIN.pcap

We shall filter by ftp-data wireshark We have two packets and one has salaries.zip content. We shall follow tcp stream and save the raw content wireshark Let’s unzip the salaries.zip file which we saved earlier. It seems it is password protected. Let’s search for the password on the pcap file. We shall filter by ftp and we can see clear password which is oneforallpass. Let’s unzip again the file supplying the password. We have two files .ADAM.txt and Salaries.csv.tar.xz. Well if we open the ADAM.txt file we have the flag.

Flag: flag{0ne_4_aLL_pa$$}

MAK

Description: Given wireshark capturing file. What is the MAC address of the gateway router?

flag in format : flag{MAC address}

Solution:

We shall download the file which we are given.

1
└─$ wget https://hubchallenges.s3.eu-west-1.amazonaws.com/networkessentials/MAK.pcap.zip

After that unzip the file which we have downloaded

1
2
3
└─$ unzip MAK.pcap.zip
Archive:  MAK.pcap.zip
  inflating: MAK.pcap

We shall then open the pcap file in wireshark and navigate to statistics > endpoints > IPv4.10

With that we can see 10.0.0.1 is the first IP address meaning its the default gate way. statistics

1
839	19.478289	Netgear_67:ea:76		ARP	62	Who has 10.0.0.21? Tell 10.0.0.1

We are required to get the MAC address.

1
2
3
4
5
6
7
8
9
Linux cooked capture v1
    Packet type: Unicast to us (0)
    Link-layer address type: Ethernet (1)
    Link-layer address length: 6
    Source: Netgear_67:ea:76 (a4:2b:8c:67:ea:76)
    Unused: 9a9e
    Protocol: ARP (0x0806)
    Padding: 00000000000000000000000000000000
    Trailer: 0000

Well we have the MAC address…

flag: flag{a4:2b:8c:67:ea:76}

Data Encoding

keep ASCIIng

Description: One form of string representations is readable but the other is not. Can you read the flag. 102108097103123067084095049115116069097115121083051099114051116051080064115115112104114052053051125 Flag format is FLAG{XXXXXXXXXX}

Solution: This challenge is so simple. Find a asci to text converter and you can use this site. If you have time you can use asci table and convert one by one till you form the flag.

flag: flag{CT_1stEasyS3cr3t3P@ssphr453}

Data Encryption

Hide Data

Description: I used to hide my data with a classic cypher, can you get the flag hidden inside? gur synt vf 2w68lsudym Vg vf cerggl rnfl gb frr gur synt ohg pna lbh frr vg v gbbx arneyl 1 zvahgr gb rapbqr guvf jvgu EBG13 tbbq yhpx va fbyivat gung

Solution: Well I used Cyberchef to and used ROT13 and after that we find: the flag is 2j68yfhqlz It is pretty easy to see the flag but can you see it i took nearly 1 minute to encode this with ROT13 good luck in solving that

Awesome we found the flag and it’s 2j68yfhqlz

Introduction to Kali Linux

remove

Description: I need to remove a file called secret in my home directory. which command should i use

Solution: rm ~/secret

Distribution

Description: Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture

The flag without spaces

Solution: Kalilinux

Linuxcmd 101

Description: This Challenge will help you understand essential commands in Linux OS

Each point is linked to another point, connect the link and win the Flag!

Solution: Hey don’t be a script kiddie atleast give a try to this challenge.

Hash Cracking

Guess The Password

Description: A hacker leaked the below hash online.Can you crack it to know the password of the CEO? the flag is the password Hash: 06f8aa28b9237866e3e289f18ade19e1736d809d

Solution: You can use hash identifier to know which hash we are cracking. You’ll find that the hash is sha1 and if you crack it you’ll get Password. You can use any tool to decode the sha1 hash and you will find hash is jrahyn+

Introduction to Digital Forensics

Crime scene

Description: Process of analyzing and investing computer devices, on suspecting that such devices may have been used in a cybercrime

Flag Format: XXXXXXXXX Solution:

Forensics

Steganography

Greeks

Description: The art of hiding messages or information inside other image / text or data

Solution: Steganography

Images3c

Description: Securing an important image requires good encryption. so we added extra security layer for your photo and now is unbreakable!

Solution:

We shall use couple of tools to solve this challenge. I first used exiftool to check if the metadata

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
└─$ exiftool cyber.jpg
ExifTool Version Number         : 12.41
File Name                       : cyber.jpg
Directory                       : .
File Size                       : 212 KiB
File Modification Date/Time     : 2020:03:27 15:03:20+03:00
File Access Date/Time           : 2022:08:08 16:36:07+03:00
File Inode Change Date/Time     : 2022:08:08 16:35:49+03:00
File Permissions                : -rw-r--r--
File Type                       : JPEG
File Type Extension             : jpg
MIME Type                       : image/jpeg
JFIF Version                    : 1.01
Resolution Unit                 : inches
X Resolution                    : 300
Y Resolution                    : 300
Image Width                     : 720
Image Height                    : 720
Encoding Process                : Baseline DCT, Huffman coding
Bits Per Sample                 : 8
Color Components                : 3
Y Cb Cr Sub Sampling            : YCbCr4:2:0 (2 2)
Image Size                      : 720x720
Megapixels                      : 0.518

Then I used steghide to extract if there is any file hidden on the image.

1
2
3
└─$ steghide extract -sf cyber.jpg                                                                                                                                    1 ⨯
Enter passphrase:
steghide: could not extract any data with that passphrase!

Well we have password. We have to brute force the password with stegcracker

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
└─$ stegcracker cyber.jpg
StegCracker 2.1.0 - (https://github.com/Paradoxis/StegCracker)
Copyright (c) 2022 - Luke Paris (Paradoxis)

StegCracker has been retired following the release of StegSeek, which
will blast through the rockyou.txt wordlist within 1.9 second as opposed
to StegCracker which takes ~5 hours.

StegSeek can be found at: https://github.com/RickdeJager/stegseek

No wordlist was specified, using default rockyou.txt wordlist.
Counting lines in wordlist..
Attacking file 'cyber.jpg' with wordlist '/usr/share/wordlists/rockyou.txt'..
Successfully cracked file with password: 1234
Tried 1973 passwords
Your file has been written to: cyber.jpg.out
1234

We have the password as 1234 and the content hidden on the file was extracted. Now all we have to do is read the cyber.jpg.out. Awesome we have the flag.

1
2
└─$ cat cyber.jpg.out
flag{cyb3rs3cisaw3s0me}

I love music

Description: listen and focus , you will listen another thing

Flag format : XXX_XXX_XXXXXXXXXXX

Solution:

This challenge was some how tricky at first but after a some tries I managed to solve it. we shall download the audio file

1
└─$ wget https://s3-eu-west-1.amazonaws.com/hubchallenges/Forensics/love-music.wav

The next task is to download audacity and if you are on linux it’s fairly easy.

1
└─$ sudo apt install audacity

Once you have downloaded audacity, import the downloaded file love-music.wav to audacity. Change audacity settings to spectrogram and you will see the flag there. audacity

Awesome!! flag: you_are_victorious!

This post is licensed under CC BY 4.0 by the author.