# IOT Range ## Challenge 26-38    ### FileOne.bin *  *  *  *  *  *  *  *  *  *  *  ### Answer * Challenge 26:`data` * Challenge 27:`1.0.0` * Challenge 28:`1550` * Challenge 29:`squashfs` * Challenge 30: * Challenge 31:`447` * Challenge 32:`asp` * Challenge 33:`samba` * Challenge 34:`pwnable` * Challenge 35:`mips32` * Challenge 36:`false` * Challenge 37:`6` * Challenge 38:`0x400640` ## Challenge 40-43 ### FileTwo.bin  *  * 看起來只是壓縮 *  ### Answer * Challenge 40:`E826` * Challenge 41:`False` * Challenge 42:`True` * Challenge 43: ## Challenge 44-45, 61 ### FileThree.bin   * 這支是有加密的, `binwalk -t`沒辦法直接查看資訊 *  * XOR加密 *  ```zsh= hexdump -C FileThree.bin |tail -n 30 ``` * xcat解密binary * https://github.com/mstrand/xcat *  ```zsh= ./xcat.py -x '8844a2d168b45a2d' ../FileThree.bin >decrypt.bin ``` ### Answer * Challenge 44:`False` * Challenge 45:`True` * Challenge 61:`LZMA` ## Challenge 46-50 ### IOT.bin  *  ### Answer * Challenge 46:`0x20` * Challenge 47:`0x3c` * Challenge 48:`0x192728` * Challenge 49:`piggy` * Challenge 50:`squashfs` ## Challenge 51-55 ### IOT2.bin  *  ### Answer * Challenge 51:`0x1A0` * Challenge 52:`0x160` * Challenge 53:`26 MB` * Challenge 54:`JFFS2` * Challenge 55:`Little Endian` ## Challenge 56-58 ### IOT3.bin  * 挺複雜的這題, `binwalk -t`跑出一大堆xz壓縮檔, 但利用`-Me`還是找到關鍵的資料夾 *  * 找半天在這個檔案裡 *  * 直接用答案格式下去找可能的檔案在下去翻 *  *  ```zsh= find . -type f -name "?????_??????" ``` ### Answer * Challenge 56:`squashfs` * Challenge 57:`check_fwmode` * Challenge 58:`0ee2cb110a9148cc5a67f13d62ab64ae30783031` ## Challenge 59-60 ### IOT4.bin  *  *  ### Answer * Challenge 59:`HNAP` * Challenge 60:`SOAP`
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up