Web

PathProwler ✅

usw tool!

port:5000


使用dirsearch,取得

[19:50:02] Starting:
[19:50:09] 200 -    1KB - /admin
[19:50:25] 200 -    1KB - /login
[19:50:31] 200 -  933B  - /secret
[19:50:35] 200 -  257B  - /uploads

Task Completed

看到http://192.168.6.170:5000/uploads 出現flag
Flag:MACDX{superezweb}

Misc

meow ✅

100
Chipi chipi chapa chapa
Dubi dubi daba daba
Mágico mi dubi dubi
Boom boom boom boom boom!
Meow.zip


meow.zip有許多層資料夾
binwalk查看
unzip解壓縮
先把照片拿出來cp meow!/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/Folder/meoww.jpg meoww.jpg
用exiftool、binwalk查看都沒東西
strings查看,最後出現疑似flag

hQEtCU
*}Ed\C.
QHLJ(
U.,-
QEs2
QS#H
LQE0
lR~jBx
===>a1L0V3CAT<==

把它丟進flag中
Flag:MACDX{a1L0V3CAT}

Carefully ✅

100
Two hackers schemed anonymously in the depths of the internet for a ransom plot. When a massive cyber upheaval occurred, they seized the opportunity to clandestinely transmit the key they needed.
Complete.pacpng


查看TCP封包
發現有個Key的網頁請求
image
查看Follow

GET /Key HTTP/1.1
Host: 192.168.86.133:8000
User-Agent: curl/8.5.0
Accept: */*

HTTP/1.0 200 OK
Server: SimpleHTTP/0.6 Python/3.11.8
Date: Tue, 16 Apr 2024 07:41:17 GMT
Content-type: application/octet-stream
Content-Length: 40
Last-Modified: Tue, 16 Apr 2024 07:41:03 GMT

TUFDRFh7c2hvdyBtZSB5b3VyIGhhbmRzaGFrZX0

base64 decode
Flag:MACDX{show me your handshake}

Cryptonalyse ❎

200
A hacker has developed a new encryption algorithm to secure his computer, using physical measures to make it difficult to breach. However, a whistleblower revealed that the hacker is lazy and uses a note to remind himself of the password. Try to uncover his encryption algorithm and retrieve the password!
note1.txt note2.png


binwalk
3868715 0x3B082B MySQL ISAM compressed data file Version 11
22497772 0x15749EC MySQL MISAM index file Version 10
26409441 0x192F9E1 MySQL ISAM index file Version 4
29607296 0x1C3C580 MySQL ISAM compressed data file Version 4

special_sound ✅

600
Listen with your heart, enjoy the fun :D
Special_sound.zip


先使用audacity來檢查,沒有發現
使用file、binwalk都沒有隱藏檔案
使用deepsound開啟,需要密碼
有工具deepsound2john,可以使用john-the-ripper來取得密碼

python deepsound2john.py Misc.wav > flag.txt
john flag.txt

原本使用John the Ripper password cracker, version 1.8.0都會爆出No password hashes loaded (see FAQ),以為沒希望,結果是版本問題
使用snap install john-the-ripper就可以安裝John the Ripper 1.9.0-jumbo-1+bleeding-f9fedd238b版本

Enabling duplicate candidate password suppressor
330651 (Misc.wav)

或是使用audacity查看頻譜
image

輸入後取得MAXDX.txt

https://docs.google.com/spreadsheets/d/1DATrytPt267Vd3KJULeE2m2Ytphd0pAjdEhSU7EW_CI/edit#gid=140448974
number of coordinates :10

google表單可以強制看到seed=1112
輸入1112,10可以得到

Coordinates 1 ~ 10: [('E', 0), ('G', 8), ('E', 10), ('T', 4), ('H', 9), ('B', 8), ('H', 19), ('V', 16), ('J', 2), ('A', 4)]

可能是flag,沒線索了

Wrong direction ✅

800
You should use the correct method to solve this question, right?
Wrong_direction.png


exiftool

Warning                         : [minor] Trailer data after PNG IEND chunk

pngcheck -cvt

File: Wrong_direction.png (102250 bytes)
  chunk IHDR at offset 0x0000c, length 13
    989 x 663 image, 32-bit RGB+alpha, non-interlaced
  chunk sRGB at offset 0x00025, length 1
    rendering intent = perceptual
  chunk gAMA at offset 0x00032, length 4: 0.45455
  chunk pHYs at offset 0x00042, length 9: 4724x4724 pixels/meter (120 dpi)
  chunk IDAT at offset 0x00057, length 17423
    zlib: deflated, 32K window, fast compression
  chunk IEND at offset 0x04472, length 0
  additional data after IEND chunk
ERRORS DETECTED in Wrong_direction.png

strings
可以發現許多TUgnp.A/yaw_thgir這類格式的字串,疑似flag
反過來是right_way/A.pngUT,可以猜測是要把後面的chunk反過來

直接把整個檔案反向

with open('Wrong_direction.png','rb') as f:
    data=f.read()
with open('out.png','wb') as f:
    f.write(data[::-1])

binwalk -Me png
得到

'*.png'  '=.png'   C.png   G.png   K.png   O.png   S.png   W.png   _.png
 +.png   '>.png'   D.png   H.png   L.png   P.png   T.png   X.png   {.png
 -.png    A.png    E.png   I.png   M.png   Q.png   U.png   Y.png   }.png
'<.png'   B.png    F.png   J.png   N.png   R.png   V.png   Z.png   除.png

使用ll查看大小、exiftool等查看是否有特別的圖片
發現有些圖片特別大
查看flag的格式MACDX

exiftool M.png發現

Software                        : Shutter
Source                          : [1]

執行script來看順序

for i in $(ls); do echo $i;exiftool $i| grep Source; done

結果

*.png
Source                          : [29,30]
./+.png
./-.png
Source                          : [8,27]
./<.png
Source                          : [7]
./=.png
./>.png
Source                          : [28]
./A.png
Source                          : [2,10,13,21]
./B.png
./C.png
Source                          : [3]
./D.png
Source                          : [4]
./E.png
./F.png
./G.png
./H.png
Source                          : [14,25]
./I.png
Source                          : [24]
./J.png
./K.png
./L.png
./M.png
Source                          : [1]
./N.png
./O.png
Source                          : [18]
./P.png
./Q.png
./R.png
Source                          : [17]
./S.png
Source                          : [23]
./T.png
Source                          : [12,15,26]
./U.png
./V.png
./W.png
Source                          : [11,22]
./X.png
./Y.png
Source                          : [9,20]
./Z.png
./_.png
Source                          : [16,19]
./{.png
Source                          : [6]
./}.png
Source                          : [31]
./除.png

Flag:MACDX{<-YAWTAHT_RO_YAWSIHT->**}

Crypto

Whistle ✅

100
Amid a series of network intrusions, you, as a cybersecurity analyst, are asked to investigate a suspicious image. It is believed that the attacker may have hidden instructions or key information for further attacks in this image. Your task is to analyze this image, find and submit the flag hidden in it.

download.rar


把圖片丟進aperisolve
在zsteg中找到flag

Flag:MACDX{WELCOMETOMILITARY}

Mission:CYPHER ❎

200
You got a string of ciphertext:QDe_s}OW{pskt_nhFpyuz
This string of ciphertext will have four decryption steps.Decrypt it!
hint.txt


Hint中的cihpertext丟到 https://www.dcode.fr/xor-cipher

Bqy|0Vu~su0Sy`xubQvvy~u0Sy`xubFywu~ubuSqucqb0Cxyvd0Sy`xub

10
Rail Fence Cipher
Affine Cipher
Vigenere
Caesar Shift Cipher

QDe_s}OW{pskt_nhFpyuz
3↕ ↘↗ QOFWD{ppesyk_tu_snzh}

EasyRSA_01

200
We have intercepted some encrypted data and highly suspect that it was generated using the RSA encryption algorithm. Can you help us decode it?
parameter.txt
message.txt

Cryptoself

400
There is a way to find treasure by seeking a specific number.
We know the rules of the encryption algorithm, but no one has cracked it yet.
We got a Python program that describes how to perform encryption, along with a text file that reveals some related information.
In the program, a appears to be 9 and b appears to be 66, but these values do not correspond with the text file.
You have to figure out what is the treasure number.
MACDX{xxxxxxxxxxxxx} x is the treasure number
encrypted.txt
random.py

EasyRSA_02

500
There seems to be a correlation between these two documents try to find out and crack
first_parameter.txt
first_message.txt
second_parameter.txt
second_message.txt

Easy_RSA_03

500
We also have two documents, the ciphertext and related parameters, please decipher them.
parameter_2.txt
message_2.txt

License

800
The Dondon lost his license password,help him to find out.
License.zip

Forensic

Picture Say LSB

400
On a bustling street in Germany, an overseas student unexpectedly met an adventurous traveling girl. Their initial eye contact was brimming with curiosity and surprise. As they walked hand in hand exploring the ancient streets, the laughter in the late night and stories under the warm yellow street lights brought their hearts closer together.
The boy, too shy to express his feelings openly, chose to hide his deep affection for the girl in an image. These hidden emotions, like a silent whisper encoded in the colors, await discovery.
final_1.png


將圖片丟到 https://www.aperisolve.com/58d742b201a2eaef8426069573dda7a1

Apparition ✅

400
Attention everyone, an apparition has appeared!!! If we don't act quickly, the world will be destroyed. You need to use some magic to let everything return normal. Importantly,in the process,you need to catch some secret file to revael the picture.The flag is hided in the place where marked by black brush.
Apparition.zip


打開zip可以看到裡面有一張圖片,但解壓縮會出現錯誤
file Apparition.zip
Apparition.zip: data

binwalk Apparition.zip
57830 0xE1E6 End of Zip archive, footer length: 22

可以猜測是magic number消失之類的,使用hex editor開啟發現magic number是PNG
最後有password=Oppenheimer

unzip -l Apparition.zip可以看到
Archive: Apparition.zip
Length Date Time Name
62945 2023-09-05 13:12 Apparition.PNG
62945 1 file

可以確認是magic number被改成png所以讓系統無法辨識檔案類型
把前四個byte改成\x50\x4b\x03\x04,儲存後開啟需要密碼
image
被塗黑,看起來是用IPhone的,所以把曝光調高
image
God does not play dice

So Ez?

600
Peter used to enjoy drawing on his computer. However, his computer was accidentally formatted. Fortunately, he still have a memory dump file kept. Can you help him recover the data?
P.S The file for this challenge is identical to "It doesn't make Sans, It's Papyrus Ver.2"
win10_zip

It doesn’t make Sans, it’s Papyrus

1000
Tommy accidently open a malicious file, can u hlep him figure out what's going on with his PC?
PS. The file for this challenge is identical to "So Ez?"

Manufacturing Plants

1000
Our factories are responsible for producing components, and a factory consists of several workstations. One day, during the operation, there are some problems occured. We don't have installed the surveillance system, fortunately, we have recorded the packet at that time from the SCADA, please try to know where are the broken parts in the accident. Here are a picture of simple instruction about the workstation in every factories and a schedule about all of them.
Flag Format: MACDX{ProblemFactoryID_BrokenWorkStationID_BrokenPartID} (if all parts of the workstation have problems, the BrokenPartID will be "all") (the order of IDnumber is 0123456, and alphabet is ABCDE)
Ex:MACDX{F1_W3_CA;F2_W4_all;F4_W0_MC;F5_CC} (This means that the conveyorA of workstation3 in factory1, all of workstation4 in factory2, machining center of workstation0 in factory4, and center conveyorC in factory5 have been discovered broken.)
file.rar

AI

AI_model ✅

import pickle
import numpy as np

with open('model_data.pkl','rb') as f:
    print(pickle.load(f))

[' Jim Abrahams' 'h!h$?Rq h"K?4??' 'negative' 'positive']

Flag:MACDX{h!h$?Rq h"K?4??}

PWN

What’s in the cage?

600
There's something in the cage, would you find out what it is?
cage

GOT Some Secrets

600
I have got something interesting in the treasure hunting game
gots_files.rar

registry

300
Welcome to 2024 MACDX, please sign up here.
registry

xxyolo

1000
The program got some problem, get into in.
xxyolo
libc.so.6

Minami Syokudo

1200
Iterasyai! Here's free beer for you!
Ubuntu 20.04
Author: Hakkanist
minami_files.rar

REVERSE

fence

100
Another simple encoder. This problem might be too easy for you Here is the flag: MACDX{fcerteenyn_cp}
question2.zip

easy_G ✅

100
Do you know what Gcode is?
gcode.txt


G代碼,是最為廣泛使用的數控程式語言,有多個版本,主要在計算機輔助製造中用於控制自動工具機。G代碼有時候也稱為G程式語言。 G代碼有命令數控機械執行動作的能力,例如執行床台移動或鑽孔… 等功能。 G代碼是由首字「G」再加上2位數字組成的。
Gcode Viewer直接把檔案丟進去
image
Flag:MACDX{XXAUTH}

01011001?

200
JUST A ENCODER
01011001_encrypt.py
message.png
enc_msg.txt

B ! = B

200
I believe you can solve this problem, what do you think?
Here is the flag: AOETM{AaВbe_UoTOВ_iL_PIt_O_dOВ}
bb.exe

playfair

300
Can you find the flag? Here is the message: MACDX{fudchpqb}
question1.zip

random_dictionary

400
Give a word, return another word
random.exe

Select a repo