The string was then decoded to plain text i. We have found five stones till now using each port except SSH. And the above-decoded string can be our log in credentials to log in through SSH.
Therefore, we tried it using the following command :. So we switched the user to ftp and further accessed root to find our final flag by using the following set of commands :. And so, we have found all the six stones aka flags and with just a snap there can be the perfect balance in the universe. She is a hacking enthusiast. Mind sharing the python script you created to generate the key hash for the. We tried to install the. Is that a part of the CTF or something else?? Skip to content Hacking Articles.
CTF Challenges. September 20, November 19, by Raj Chandel. Penetration Methodologies Scanning Network Netdiscover Nmap Enumeration Rabbit hole Abusing HTTP Dirb-Brute forcing web directory Exiftool-Metadata extracting for 1st stone 2nd stone from ssl certificate Crunch-generate dictionary Aircrack-ng-cracking password of pcap capture the 3rd stone Decryption cipher text Exploiting Metasploit- Jenkins Post Enumeration Obtain 4th stone John the ripper-crack Keepaas hashes Obtain 5th stone Privilege Escalation Abusing sudo rights Get the Final stone Walkthrough Scanning Network Firsts of all we try to identify our target and for this use the following command: netdiscover Now that we have identified our target using the above command, we can continue on to our second step that is scanning the target.
We will use nmap to scan the target with the following command: nmap -A Now that port 80 is open we open the target IP address in our browser as shown in the following image : It opened a webpage as shown in the above image. But as resulted in the nmap scanning port is also open, so now we opened our target IP with port and found a login page there as shown in the image below : Now that we do not have login credentials, we explored using dirb in order to find directories, and in the result of dirb, we found two important directories i.
Nothing else in the image as you can see in the image below : But if you remember, space stone was inside the tesseract, so we used the exif tool to see if there was metadata stored in the image. And for this use the following command : exiftool space. When you open the target IP on port , it shows something is not right with the SSL certificate which you can in the image below too : Click on that lock icon and navigate yourself to its security as shown in the image below, as here you will find your second stone i.
We found our wifi key as shown in the image below : We used this wifi key as a directory and we found a realitystone. As shown in the image below : Upon solving the quiz, we had got the following answers with their corresponding binary value : S. Questions Answers Binary Value 1. In the beginning, there are 3 infinity stones on earth. False 0 2. At the end, there are two survivors on Titan. True 1 3. Thanos already had the power stone when he first appeared.
True 1 4. Tesseract contains the reality stone. False 0 5. The dwarf on Ndavellir is played by Peter Dinklage True 1 6. But keep in mind your writeup will become outdated very fast with this CTF. This version has dynamically ordered flags and they can change at any release along with the values.
The flag architecture is also very modular so I can add new flags all the time. For infinity! Skip to content. Star Permalink master. Branches Tags. Could not load branches. Could not load tags. Can I do the CTF with my phone? Raw Blame. Its unavoidable because of the way the CTF was architected. That's a whole different GATT server!
How did you do that? Assuming we found a flag value of , this is how you would submit it:. Skip to content. Star Advanced: Bluetooth low energy capture the flag 31 stars 7 forks. Branches Tags. Could not load branches. Could not load tags.
0コメント