0x00 Challenge Info We’ve located the adversary’s location and must now secure access to their Optical Network Terminal to disable their internet connection. Fortunately, we’ve obtained a copy of the device’s firmware, which is suspected to contain hardcoded credentials. Can you extract the password from it? 0x01 Reconnaissance It gave us a zip file. So we first unzip it with the password hackthebox. Then we can see a directory called ONT which stands for Optical Network Terminal. The interest ...
0x00 Challenge Info As a part of our SDLC process, we’ve got our firmware ready for security testing. Can you help us by performing a security assessment? 0x01 Reconnaissance We will get a file called firmware.bin, and we can use binwak to extract the data from the bin file. binwalk -e firmware.bin And the operation will create a directory called _firmware.bin.extracted. So we can go in there and check what is inside. We will find out it’s actually messy in there, that means we cannot easily g ...
0x00 Challenge Info Hello hackers. Let’s see the encrypted message. c4a66edfe80227b4fa24d431 7aa34395a258f5893e3db1822139b8c1f04cfab9d757b9b9cca57e1df33d093f07c7f06e06bb6293676f9060a838ea138b6bc9f20b08afeb73120506e2ce7b9b9dcd9e4a421584cfaba2481132dfbdf4216e98e3facec9ba199ca3a97641e9ca9782868d0222a1d7c0d3119b867edaf2e72e2a6f7d344df39a14edc39cb6f960944ddac2aaef324827c36cba67dcb76b22119b43881a3f1262752990 7d8273ceb459e4d4386df4e32e1aecc1aa7aaafda50cb982f6c62623cf6b29693d86b15457aa76ac7e2eef6cf814ae ...
0x00 Challenge Info A test! Getting onto the team is one thing, but you must prove your skills to be chosen to represent the best of the best. They have given you the classic - a restricted environment, devoid of functionality, and it is up to you to see what you can do. Can you break open the chest? Do you have what it takes to bring humanity from the brink? 0x01 Reconnaissance This challenge is a Python jail (Pyjail). Let’s check the challenge code first. banner = r""" .____ ...
0x00 Challenge Info This challenge gives us an executable file, which is a binary file. And the challenge description is as follows. Did you know that racecar spelled backwards is racecar? Well, now that you know everything about racing, win this race and get the flag! Ok, nothing helps. It’s just a little fun fact. 0x01 Analyse So first of all, we can run the file first to see what this program works and where can be vulnerable. Enter ./racecar on the terminal to see what’s going on. As you ...
0x00 Challenge Info Gotta collect them all. 0x01 Reconnaissance We have a zip file, and after we unzip the file, we got an executable file called HackTheBox CubeMadness1.exe. First, we can run the file to see what’s going on and what is this game about. In this game, we can use left/right arrow to control the white cube (?) and use space to jump, and it also allows jumping in the air. The challenge description said that we should collect all the cubes, but when we try to get all of them by pl ...
Hacking
UnreadPreface This article was published on the underground Hacker electronic magazine Phrack by The Mentor (Loyd Blankenship) on January 8, 1986, after his arrest. In order to try our best to maintain the historical background of the original author’s writing without destroying the belief that the author wants to convey, the original text will be presented in the form of the original release, that is, the ASCII text. All content of the original text will be formatted, emphasized, and rendered using M ...
0x00 Challenge Info Qubit Enterprises is a new company touting it’s propriety method of qubit stabilization. They expect to be able to build a quantum computer that can factor a RSA-1024 number in the next 10 years. As a promotion they are giving out “time capsules” which contain a message for the future encrypted by 1024 bit RSA. They might be great engineers, but they certainly aren’t cryptographers, can you find a way to read the message without having to wait for their futuristic machine? ...
0x00 Challenge Info You are after an organised crime group which is responsible for the illegal weapon market in your country. As a secret agent, you have infiltrated the group enough to be included in meetings with clients. During the last negotiation, you found one of the confidential messages for the customer. It contains crucial information about the delivery. Do you think you can decrypt it? This is the description of the challenge, let’s see the encrypting script and try to decrypt it! 0 ...
0x00 Challenge Info After struggling to secure our secret strings for a long time, we finally figured out the solution to our problem: Make decompilation harder. It should now be impossible to figure out how our programs work! 0x01 Reconnaissance First we can run the binary to see what’s going on. ┌──(kali㉿kali)-[~/CTF/rev_behindthescenes] └─$ ./behindthescenes ./challenge <password> It tell us we should put some password as the argument to execute this. Next step, I check the printable str ...