CTFlearn Easy

Sorted all challenges by difficult so that I could attempt and learn from the easier ones. Easy Misc Practice Flag - 20pts Try inputting the flag: flag{CTFLearn_is_awesome} Submitted: CTFLearn{CTFLearn_is_awesome} Wikipedia - 30pts Not much to go off here, but it�s all you need: Wikipedia and 128.125.52.138. Navigated to wikipedia site https://www.wikipedia.org/ Searched for 128.125.52.138 and found page on Flag. Searched within page for CTF and found reference to CTF flgs Submitted: CTFlearn{cNi76bV2IVERlh97hP} QR Code - 30pts Do you remember something known as QR Code?

Read More →

UQ Cyber Squad 0x03 Shells

Introduction 0x03 Shells session presented by the UQ Cyber Squad. Access via OpenVPN connection. OpenVPN configuration bundle provided during the workshop. Challenge 1 - Family Binding Time - 10pts Let’s bind together at 192.168.57.11:8297 nc 192.168.57.11 8297iduid=1002(user) gid=1002(user) groups=1002(user)pwd/home/userls -lastotal 604 drwxr-xr-x 3 user user 4096 Mar 27 06:02 .4 drwxr-xr-x 4 root root 4096 Mar 24 02:13 ..4 -rw------- 1 user user 1584 Mar 26 01:26 .

Read More →

Over the Wire - Wargames - Bandit

Introduction Details about the challenges may be found at https://overthewire.org/wargames/bandit/. The game is played over SSH over port 2220 so firewalls may need to be adjusted to allow outbound traffic to connect to the game. The game has 34 levels. The levels are chained, so that to get to the next level you need to complete/finish/beat the previous level. WARNING: These are my own notes and contain actual flags. Bandit Level 0 Level Goal The goal of this level is for you to log into the game using SSH.

Read More →

UQ Cyber Squad 0x01 Intro to Linux, Machines, and Networking

Introduction Found the UQ Cyber Squad site at https://cybersquad.uqcloud.net/index.html. Signed up for their CTF on https://ctf.uqcloud.net/ 0x01 Introduction to Linux This was identical to the QUT Whitehats Week 2 for challenges 1 through to 8. The writeup was already done at https://kush.com.fj/blog/posts/2020-02-28_qut_wh_wk2/. No place like index.html - 10pts There’s no clues or hints for this but it was pretty obvious. Navigated to https://cybersquad.uqcloud.net/index.html Manually reviewed the page source and searched for flag Found flag on line #30 of the source Submitted: flag{w0ah_n1c3_f1nd} Machines The machines challenges were named machines because they provided virtual machines for a traditional boot-to-root.

Read More →

QUT Whitehats CTF Week_3

Week_3 WARNING: Like all my CTF notes, this contains spoilers. 3x01 - 10pts https://crypto.qutwhitehats.club/ch1 For simplicity sake, to be able to easily attempt this weeks challenges, please navigate to: https://www.katacoda.com/0xollie/scenarios/0x01 sign up/sign in and click onto the terminal. INPUT: apt install httpie -y wait approx 1 minute for it to install. obtain ciphertext by running the following command: http get https://crypto.qutwhitehats.club/ch1 To input an answer run the following command: http post https://crypto.

Read More →

QUT Whitehats CTF Week_2

Week_2 I spent a good 10 minutes trying to figure out the challenges before reaching for help. Eventually was told that the challenge location was “on the end of our slide deck is a link to katacode, thats where Olliver is doing his Challenges https://www.katacoda.com/0xollie/scenarios/0x01" Signed up for Katacoda and nativated to the URL. WARNING: Like all my CTF notes, this contains spoilers. Challenge 1 - Normal files - 10pts These are just regular files flag syntax: flag{insert_flag_here}

Read More →

QUT Whitehats CTF Week_1

Week_1 WARNING: Like all my CTF notes, this contains spoilers. How_2_Flag - 0 pts For our CTF challenges this year we will be using the format: flag-{example_flag} Please note that all flags are case-sensitive! Submitted: flag-{example_flag} Community - 5 pts Have you joined our discord server yet? https://discord.gg/kRbcVnP Joined discordapp Clicked on Add a server Used the URL in the challenge Checked #flag channel Submitted: flag-{welcome_1337_haxor} Stay_Informed - 10 pts Our website - https://qutwhitehats.

Read More →

AWSN Cadet CTF

Introduction I was fortunate enough at attend an Australian Women in Security Networ (AWSN) session. Following the session there was a beginner level capture the flag (CTF) hosted off http://149.28.182.32:8000. These are my notes from the CTF. Additional things to note are, firstly, that for the Web challenges, challenge 4 is called flag5, and challenge 5 references flag4. Secondly, the submission for the Cryptography password challenge expects the flag in the format flag{flag_value}.

Read More →

GPG Better than Zip Encryption

Is GPG/OpenPGP really Better than Zip ? I attended a local conference yesterday (2019-03-29) and during one of the talks a senior analyst from one of the world’s first CERT said that the preference was to use GPG for symmetric key encryption of files to transfer confidential information to their clients over zip. The reason presented was that zip did not provide the desired level of confidentiality and integrity. This comment got me thinking as I had thought that zip used AES for encryption, so now I am awake at 0100hrs in the morning and curious to understand the encryption used in zip.

Read More →

Pen Test Assessment

Penetration Test Assessment A penetration test assessment was a requirement of a short cource on Penetration Testing from the Charles Sturt University. As part of the assessment, students were provided an ova image of a virtual machine. The virtual machine was to be the target of a penetration test, and students were expected to obtain flags for submission. A walkthrough of the assessment is presented here. For the benefit of other students, the names and values of the flags have been redacted, and replaced with the string REDACTED

Read More →