An impressive writeup on the challenges in the linux skills
category has already been done by my good friend Trevor Saudi!! For this writeup though, i won't do the last three challenges.
ASPIRE CTF 2021 — Linux Skills & Networking
You can access the file here: Challenge
You're given a zipfile. Unzipping it, you get a folder called haystack with a few files.
The easiest way to find the flag is to use rgrep
to recursively search for a specific flag format.
The flag was in phineas.txt.
There's another challenge kinda similar to this one that a friend shared with me some time.
You can access the file here: Challenge
For this challenge, when you unzip the file, you get 661 directories and 3 files.
How'd you get to the last file? Easy, grep aaaall the way.
Got the flag. You could also use find
.
Awesome.
You can access the file here: Challenge
You're given a jpg file.
Running binwalk and exiftool doesn't give you much although, atleast i know this is a challenge where i don't have to use a tool like stegseek
. And i know this because such challenges have this kind of output:
For this one, it looks like this:
I then used binwalk to extract contents from that file. I like using these switches to get the better output:
Got three files.
The last file is empty. I then did a find command to check the strings of the files and look for a flag.
Done.
You can access the file here: Challenge
You're given a zipfile and when you move into that directory, you'll notice it's a git repo. When i see such challenges, normally i'll cheat a little bit and run rgrep to look for low hanging fruits.
That was so easy lol.
Short and sweet. I solved two similar challenges in RITSEC ctf the same way. Let's have a look.
You're given a url that goes to a git repo. Unfortunately the url doesn't work anymore. I pulled the repo to my directory. First thing you find is a fake flag.txt file lol.
Moving into the .git directory, went with the classic, ran rgrep.
Interesting. There's a reference file that points to a flag. I then used git show
to view it.
Wasn't that like too easy?
Like before, you're given a link to a git repo. Moving into the .git directory, ran rgrep.
Got an interesting reference file for \!flag
. Just like before, i'll use git show
to view it.
Easy!
You can access the file here: Challenge
You're given a PDF file. When you open it, nothing interesting there. I then decided to run binwalk.
There's an interesting file called versatile that is compressed within a Zip archive. Used binwalk to extract the files.
We can see the Zip archive. Let's extract it.
Easy enough.
You can access the file here: Challenge
You're given a zipfile. Looking at the metadata with binwalk, there are a couple files. Let's extract them.
When you run a file command on the files, you notice the first file is a JPEG image and the rest just have junk.
If you try to view the image, it throws an error because it isn't whole. The naming of the files can actually give you a hint that the file is subdivided into a couple of files. I then cat all the files into one file and when you view that file it gives you the flag. Made a simple python script for this one that builds an image based off those files and then uses the pytesseract
library to read the contents of the image.
Smooth.
You can access the file here: Challenge
You're given a zipfile. Unzipping it, you get a gzip file, unzipping that you get a tar file and so on. Honestly, this challenge was actually easy. If you look for a challenge on Cybertalents called Can You Find Me, that one is the real deal.
Made a simple bash script:
Nice and easy. If the script errors, try installing the tools.
You can access the file here: Challenge
You're given a zipfile. Unzipping it, you get what seems to be someone's home directory. Used rgrep at this point to look for the flag.
There's a very interesting output from the .bash_history file. It seems the flag.txt file was created using nano, renamed to a bash script, given the right permissions and then a request was sent to ix.io which is a command line pastebin and for safekeeping, the url was saved to .cache/.url.
Viewing that file, got this url http://ix.io/2OJy. Visiting that website you get the flag.
You can access the file here: Challenge
You're given a zipfile and unzipping it you get a git repo. I tried using rgrep but didn't get anything interesting.
I then used git log -p
to check the commits and got the flag at the very end.
Well, that was a tonne of fun!