Jump to content
Tuts 4 You

Recommended Posts

Posted
5 hours ago, NativeBridge said:

Anybody can help with ch3 ? i need to create file to match the yara rule ? dont understand what to do 

Yes. You need to discover data that would trigger the Yara rule.

  • Like 1
Posted
22 hours ago, cl4whands said:

does challenge 6 require to guess an input string that should be hashed?

Spoiler

if you read the README carefully they said brute-force will not work...

 

  • Like 1
Posted

Hi, anyone can help me with 5?

Spoiler

I believe I found the second key and nounce but I can not find where encrypted data is... Any hint? 

 

  • Like 1
Posted
On 10/4/2024 at 6:35 AM, AUP said:
  Hide contents

if you read the README carefully they said brute-force will not work...

 

I'm stuck on #6 as well.   I could use a hint/nudge.  Thanks!

  • Like 1
NativeBridge
Posted

Any hint to ch5 sshd ? 

  • Like 1
Posted

Any hint on the chall 2? I have pass the first operations easily. But can't understand how to find the hex checksum for the chacha20 decryption.

 

  • Like 1
jackyjask
Posted
1 hour ago, JimJ1m said:

Any hint on the chall 2? I have pass the first operations easily. But can't understand how to find the hex checksum for the chacha20 decryption.

 

Spoiler

hint:  find the main.a() (main_a) and you'll have a fresh energy drive how to move forward (from the end... :)

image.png.9b0b409aa200fe970d8dd396a51e516d.png

 

  • Like 1
Posted
On 10/5/2024 at 8:34 AM, M.b said:

Hi, anyone can help me with 5?

  Reveal hidden contents

I believe I found the second key and nounce but I can not find where encrypted data is... Any hint? 

 

Spoiler

Everything you need to get should be obtainable systematically via the code and crashdump. Think about where the keys and data would be stored when the relevant code is executed.

 

  • Like 1
RevEnjoyer
Posted (edited)

Hi, could I get a small nudge for challenge 7 (fullspeed)? I believe I've reversed everything and am able to communicate successfully with the unmodified binary. But the used crypto seems to be secure (tried many attacks for a day) so no idea how to extract the flag from the .pcap.

Update: Got it! Had all the requisite information already but putting it together wasn't easy for me although in hindsight it is very obvious. (as always)

Edited by RevEnjoyer
Update
  • Like 1
AmyBrooklin
Posted (edited)

Never mind! I wanted some help on level 2, but I was able to figure it out.

Edited by AmyBrooklin
I was able to figure it out.
  • Like 1
Posted
On 10/6/2024 at 3:45 PM, RevEnjoyer said:

Hi, could I get a small nudge for challenge 7 (fullspeed)? I believe I've reversed everything and am able to communicate successfully with the unmodified binary. But the used crypto seems to be secure (tried many attacks for a day) so no idea how to extract the flag from the .pcap.

Spoiler

As a general note on attacks: Attack scripts almost never work right out of the box. You will always need to slightly adjust to your current situation.

Revisit the parameters involved. Are they all adhering to the standards that are generally expected of them?

 

  • Like 2
Posted

I'm new to CTF and kinda stuck at chall 2. All I can make out of from the decompiled program is that it involves chacha20-poly1305 encryption and there are two other main functions. Can anyone pls drop a hint?

  • Like 1
Posted

Any hint on challenge 6? I'm browsing and trying to follow the code for a while now.
It looks very complicated, and I think I probably just don't know how to approach this.
I obviously have never seen verilog before in my life😅

  • Like 1
Posted

Anyone can help me with 6?i really don't know how to understand what I'm reading 

  • Like 1
Posted

6 is just a PITA. 

Spoiler

Understand it, have reimplemented it, and am writing directly in Verilog now and making my own Verilog tbs to fuzz routines. But being told that I'm doing 1000000x more effort than necessary. It's interesting, but not fun.

 

  • Like 1
xdbruh1234
Posted

Hint for 6

Spoiler

Find anything suspicious and focus on that

 

  • Like 1
  • Haha 2
Posted

Any hint for chall3? I'm able to get most of the char thanks to constants values xored or added, but unable to find the rest, there is too much possibilities.

  • Like 1
cl4whands
Posted

need sanity check on challenge 7 (fullspeed)

Spoiler

it seems to me that internal state of the prng has to be replayed somehow. is that correct path? if so, are values in network handshake enough to recover that? or something like seed should be bruteforced?

 

  • Like 1
James7349
Posted

I'm so stuck on challenge 5 :( Please can someone help me? I think I need it explaining like I'm a child 🤣

  • Like 1
understated1
Posted

Hi guys I'm new to Reverse engineering CTF and at got stuck totally at chall 2.

i saw the code via ghidra and noe it has chacha20-poly1305 encryption somewhere nd there is 2 main functions. Can anyone pls drop a hint what to do next as i wont be able to go forward any more then? pls help !

  • Like 1
xdbruh1234
Posted

Any hint on #7?

Spoiler

I checked the libraries implementation and it's pretty secure. I noticed something is small though I don't know how to exploit it. 

 

  • Like 1
Posted (edited)

@JimJ1m

Spoiler

If there are too many options, that means you did not find or qualify all the constraints correctly. There is only one correct answer, and it can be found systematically :)

@cl4whands, @xdbruh1234

Spoiler

Everything required to decrypt all data can be found in the pcap and code. Figure out what the involved protocols are and find a weakness! :)

@understated1

Spoiler

There is something else other than the symmetric crypto schemes you mention. Did you look at the remainder of the code?

@James7349

Spoiler

Figure out where and why the server crashed. That should be your starting point of analysis.

Edited by Washi
  • Like 1
Posted (edited)

More interested about your setups for challenge 5.

  • Is it possible to dump the shellcode from gdb?
    I did and while I can see the shellcode in gdb it doesn't appear in the disassembler (tried with IDA Free). In the dump that section is all byte 0.
  • Is it possible to connect the disassembler to the running gdb with the core file?

I managed to find the shellcode and extract what I think to be the encrypted RSA blob (0x200 bytes), additionally extracted e and N from the RSA structure, unfortunately cannot decrypt the blob. (the RSA part I think is only to verify the key signature so nothing to decrypt I guess).

Happy to bounce ideas here or in DM if anyone is interested. Thank you!

Edited by Peter
  • Like 1
xdbruh1234
Posted (edited)
Spoiler

I still cant fornicationing solve 7 holy shit. I have tried every script on github and none of them worked. Im tilted so bad already

 

Edited by xdbruh1234
  • Like 1
Posted (edited)

ch5 is quite hard

Edited by Marie
i'm done
  • Like 1

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...