Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Featured Replies

5 hours ago, NativeBridge said:

Anybody can help with ch3 ? i need to create file to match the yara rule ? dont understand what to do 

Yes. You need to discover data that would trigger the Yara rule.

  • Replies 88
  • Views 27.9k
  • Created
  • Last Reply

Top Posters In This Topic

Most Popular Posts

  • My writeups are live now: https://washi1337.github.io/ctf-writeups/writeups/flare-on/2024/

  • Hint for 6  

  • I hope you guys will enjoy, will be monitoring here and on X in case any issues occur. I think we bumped up the difficulty this year, or maybe it's me and I'm getting old

Posted Images

22 hours ago, cl4whands said:

does challenge 6 require to guess an input string that should be hashed?

Spoiler

if you read the README carefully they said brute-force will not work...

 

Hi, anyone can help me with 5?

Spoiler

I believe I found the second key and nounce but I can not find where encrypted data is... Any hint? 

 

On 10/4/2024 at 6:35 AM, AUP said:
  Hide contents

if you read the README carefully they said brute-force will not work...

 

I'm stuck on #6 as well.   I could use a hint/nudge.  Thanks!

Any hint to ch5 sshd ? 

Any hint on the chall 2? I have pass the first operations easily. But can't understand how to find the hex checksum for the chacha20 decryption.

 

1 hour ago, JimJ1m said:

Any hint on the chall 2? I have pass the first operations easily. But can't understand how to find the hex checksum for the chacha20 decryption.

 

Spoiler

hint:  find the main.a() (main_a) and you'll have a fresh energy drive how to move forward (from the end... :)

image.png.9b0b409aa200fe970d8dd396a51e516d.png

 

  • Author
On 10/5/2024 at 8:34 AM, M.b said:

Hi, anyone can help me with 5?

  Reveal hidden contents

I believe I found the second key and nounce but I can not find where encrypted data is... Any hint? 

 

Spoiler

Everything you need to get should be obtainable systematically via the code and crashdump. Think about where the keys and data would be stored when the relevant code is executed.

 

Hi, could I get a small nudge for challenge 7 (fullspeed)? I believe I've reversed everything and am able to communicate successfully with the unmodified binary. But the used crypto seems to be secure (tried many attacks for a day) so no idea how to extract the flag from the .pcap.

Update: Got it! Had all the requisite information already but putting it together wasn't easy for me although in hindsight it is very obvious. (as always)

Edited by RevEnjoyer
Update

Never mind! I wanted some help on level 2, but I was able to figure it out.

Edited by AmyBrooklin
I was able to figure it out.

  • Author
On 10/6/2024 at 3:45 PM, RevEnjoyer said:

Hi, could I get a small nudge for challenge 7 (fullspeed)? I believe I've reversed everything and am able to communicate successfully with the unmodified binary. But the used crypto seems to be secure (tried many attacks for a day) so no idea how to extract the flag from the .pcap.

Spoiler

As a general note on attacks: Attack scripts almost never work right out of the box. You will always need to slightly adjust to your current situation.

Revisit the parameters involved. Are they all adhering to the standards that are generally expected of them?

 

I'm new to CTF and kinda stuck at chall 2. All I can make out of from the decompiled program is that it involves chacha20-poly1305 encryption and there are two other main functions. Can anyone pls drop a hint?

Any hint on challenge 6? I'm browsing and trying to follow the code for a while now.
It looks very complicated, and I think I probably just don't know how to approach this.
I obviously have never seen verilog before in my life😅

Anyone can help me with 6?i really don't know how to understand what I'm reading 

6 is just a PITA. 

Spoiler

Understand it, have reimplemented it, and am writing directly in Verilog now and making my own Verilog tbs to fuzz routines. But being told that I'm doing 1000000x more effort than necessary. It's interesting, but not fun.

 

Hint for 6

Spoiler

Find anything suspicious and focus on that

 

Any hint for chall3? I'm able to get most of the char thanks to constants values xored or added, but unable to find the rest, there is too much possibilities.

need sanity check on challenge 7 (fullspeed)

Spoiler

it seems to me that internal state of the prng has to be replayed somehow. is that correct path? if so, are values in network handshake enough to recover that? or something like seed should be bruteforced?

 

I'm so stuck on challenge 5 :( Please can someone help me? I think I need it explaining like I'm a child 🤣

Hi guys I'm new to Reverse engineering CTF and at got stuck totally at chall 2.

i saw the code via ghidra and noe it has chacha20-poly1305 encryption somewhere nd there is 2 main functions. Can anyone pls drop a hint what to do next as i wont be able to go forward any more then? pls help !

Any hint on #7?

Spoiler

I checked the libraries implementation and it's pretty secure. I noticed something is small though I don't know how to exploit it. 

 

  • Author

@JimJ1m

Spoiler

If there are too many options, that means you did not find or qualify all the constraints correctly. There is only one correct answer, and it can be found systematically :)

@cl4whands, @xdbruh1234

Spoiler

Everything required to decrypt all data can be found in the pcap and code. Figure out what the involved protocols are and find a weakness! :)

@understated1

Spoiler

There is something else other than the symmetric crypto schemes you mention. Did you look at the remainder of the code?

@James7349

Spoiler

Figure out where and why the server crashed. That should be your starting point of analysis.

Edited by Washi

More interested about your setups for challenge 5.

  • Is it possible to dump the shellcode from gdb?
    I did and while I can see the shellcode in gdb it doesn't appear in the disassembler (tried with IDA Free). In the dump that section is all byte 0.
  • Is it possible to connect the disassembler to the running gdb with the core file?

I managed to find the shellcode and extract what I think to be the encrypted RSA blob (0x200 bytes), additionally extracted e and N from the RSA structure, unfortunately cannot decrypt the blob. (the RSA part I think is only to verify the key signature so nothing to decrypt I guess).

Happy to bounce ideas here or in DM if anyone is interested. Thank you!

Edited by Peter

Spoiler

I still cant fornicationing solve 7 holy shit. I have tried every script on github and none of them worked. Im tilted so bad already

 

Edited by xdbruh1234

ch5 is quite hard

Edited by Marie
i'm done

Create an account or sign in to comment

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.