Information#
Version#
By | Version | Comment |
---|---|---|
noraj | 1.0 | Creation |
CTF#
- Name : Xiomara CTF 2017
- Website : xiomara.xyz
- Type : Online
- Format : Jeopardy
- CTF Time : link
50 - Easy Login? - Web Exploitation#
An aspiring engineer started learning web development on Youtube a day ago and he was asked to build a nice, secure, simple login page as part of his project. Well, he just started off so don't blame him. Go, hack!
The source is suspicious:
<!DOCTYPE html>
<html>
<head>
<title>Login</title>
</head>
<script type="text/javascript" src="main.js"></script>
<link rel="stylesheet" href="flag.css" />
<body>
<h1 align= "center">Login Portal</h1>
<form name="login" method="POST" action="">
<b>Username :<b> <input type="text" name ="username"/><br>
<b> Password :<b> <input type="password" name="password" /></br></br>
<input onclick="Login()" type="button" value="verify" name="button" />
</form>
</body>
</html>
Let's see main.js
:
function Login(){
var username=document.login.username.value;
var password=document.login.password.value;
if (password == "53cure" && username=="@nokh@") {
alert("Awesome!");
window.open("secureflag.html");
} else {
alert("Oh swap!You are close. Why cant you try again?");
}
}
Now we can use @nokh@
and 53cure
or directly go to http://139.59.61.220:23478/secureflag.html.
The image is named hiddenflag.jpeg
so let's download it.
There is some hidden data here:
$ binwalk hiddenflag.jpeg
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
0 0x0 JPEG image data, JFIF standard 1.01
48981 0xBF55 Zip archive data, at least v1.0 to extract, compressed size: 29, uncompressed size: 29, name: flag.txt
49154 0xC002 End of Zip archive
$ foremost -v hiddenflag.jpeg
Foremost version 1.5.7 by Jesse Kornblum, Kris Kendall, and Nick Mikus
Audit File
Foremost started at Sun Feb 26 19:14:21 2017
Invocation: foremost -v hiddenflag.jpeg
Output directory: /home/noraj/CTF/XiomaraCTF/2017/output
Configuration file: /etc/foremost.conf
Processing: hiddenflag.jpeg
|------------------------------------------------------------------
File: hiddenflag.jpeg
Start: Sun Feb 26 19:14:21 2017
Length: 48 KB (49176 bytes)
Num Name (bs=512) Size File Offset Comment
0: 00000000.jpg 47 KB 0
foundat=flag.txtUT
1: 00000095.zip 196 B 48981
*|
Finish: Sun Feb 26 19:14:21 2017
2 FILES EXTRACTED
jpg:= 1
zip:= 1
------------------------------------------------------------------
Foremost finished at Sun Feb 26 19:14:21 2017
$ cd output/zip
$ unzip 00000095.zip
Archive: 00000095.zip
extracting: flag.txt
$ cat flag.txt
xiomara{50_y0u_ar3_@_h@ck3r}
50 - Lulz - Web Exploitation#
Heavy sarcasm awaits. Are you a person who finds opportunities even in trolls? Well, let's find out.
The webpage is a troll opening a pop-up and redirecting to a troll page: http://139.59.61.220:23456/troll.html
But of course you are using NoScript or know about view-source:
in Firefox.
Let's see the source (view-source:http://139.59.61.220:23456/
):
<head>
<title>Hahaha!!!</title>
<body>
<img src ="lol.jpg" align ="center" width ="50%" height = "50%" alt ="lollol">
</body>
<script type="text/javascript" src="hook.js"></script>
</head>
hook.js
source:
function catch_me()
{
(![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+(![]+[][(![]+[])[+[]]+([![]]+[][[]]) /*VERY LONG*/
}
function Redirect() {
window.location="troll.html";
}
alert("Warning you are about to be trolled");
setTimeout('Redirect()', 0);
The catch_me()
function looks like some brainfuck-js.
Copy it and paste it in your browser terminal, you will get:
"alert(Xiomara{i_4gr33_Y0U_4r3_a_Flash!}))"
The is a mistake troll, so correct Xiomara{i_4gr33_Y0U_4r3_a_Flash!}
into xiomara{i_4gr33_Y0U_4r3_a_Flash!}
(lowercase the first char).
50 - No Flags? - Web Exploitation#
What would you do if we tell you there are no flags for this question? Go on, solve it. That reminds me, Nothing is impossible.
I tried robots.txt
:
User-agent:*
Disallow: /flags/
Disallow: /more_flags/
Disallow: /more_and_more_flags/
Disallow: /no_flag/
/flags/
, /more_flags/
and /more_and_more_flags/
are obviously trolls.
Let's see /no_flag/
source:
<script>
function encode(str) {
str = str.replace(/http:/g, "^^^");
str = str.replace(/bin/g, "*^$#!")
str= str.replace(/com/g, "*%=_()");
str= str.replace(/paste/g, "~~@;;");
}
</script>
<iframe src="flag.txt" width="2500" height="2255">
</iframe>
It's an iframe of flag.txt
which containd some ASCII art, like the three others. But this time there is a script.
The ASCII art display YOU HAVE BEEN HACKED ! but on the middle of HACKED we can see "^^^//~~@;;*^$#!.*%=_()/SwzEKazp"
.
So let's replace back: http://pastebin.com/SwzEKazp
.
So go to pastebin and... This page has been removed!
.
So go to the wayback machine, there is a snapshot dating from 25 Feb. 2017.
We can see an untitled document from XIOMARA_CTF containing: eGlvbWFyYXsxXzRtX21yX3IwYjA3fQ==
.
$ printf %s 'eGlvbWFyYXsxXzRtX21yX3IwYjA3fQ==' | base64 -di
xiomara{1_4m_mr_r0b07}