feat: added VU CYBERTHON 2023
|
@ -0,0 +1,18 @@
|
|||
# Based on the analysis of the video file 20221015_173902.mp4, please provide the GPS coordinates of the possible place, where video was recorded
|
||||
> Based on the analysis of the video file 20221015_173902.mp4, please provide the GPS coordinates of the possible place, where video was recorded
|
||||
|
||||
## About the Challenge
|
||||
We need to find the location of the video
|
||||
|
||||
## How to Solve?
|
||||
First i export the file from FTK Imager (You can find the file on `/root/media/0/Download` folder)
|
||||
|
||||
![preview](images/extract.png)
|
||||
|
||||
After that, check the metadata using `exiftool`. There is GPS location in the metadata
|
||||
|
||||
![metadata](images/metadata.png)
|
||||
|
||||
```
|
||||
54.8263, 25.4083
|
||||
```
|
After Width: | Height: | Size: 23 KiB |
After Width: | Height: | Size: 34 KiB |
|
@ -0,0 +1,14 @@
|
|||
# Based on the review of the media files, please provide the GPS coordinates of the possible meeting point
|
||||
> Based on the review of the media files, please provide the GPS coordinates of the possible meeting point
|
||||
|
||||
## About the Challenge
|
||||
We need to know the meeting point coordinates
|
||||
|
||||
## How to Solve?
|
||||
There is a picture that leaked the meeting point latitude and longitude (You can find the file on `/root/media/0/Screenshots` folder)
|
||||
|
||||
![location](images/location.png)
|
||||
|
||||
```
|
||||
54.537718, 25.680509
|
||||
```
|
After Width: | Height: | Size: 144 KiB |
|
@ -0,0 +1,18 @@
|
|||
# Blue Baby Shark
|
||||
> I got recomendation from one of our common acquaintance. I’m a new into all of this CTF stuff. I g...
|
||||
|
||||
## About the Challenge
|
||||
We have been given a pcapng file and we need to find the flag there (You can find the file [here](Blue%20Baby%20Shark.pcapng))
|
||||
|
||||
## How to Solve?
|
||||
I open the file using `Wireshark` and using `frame contains "vu"` filters to find the packet that contains `vu` string. And then there are 4 packets that contains `vu` string.
|
||||
|
||||
![filters](images/filters.png)
|
||||
|
||||
I press the `Follow TCP` on packet 32835 and we will find the flag on `vu` user
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
VU{b4by_5h4rk_fly_4w4y}
|
||||
```
|
After Width: | Height: | Size: 219 KiB |
After Width: | Height: | Size: 27 KiB |
|
@ -0,0 +1,18 @@
|
|||
# Docker Web
|
||||
`-`
|
||||
|
||||
## About the Challenge
|
||||
We are given a zip code that contain linux directories
|
||||
|
||||
![preview](images/preview.png)
|
||||
|
||||
## How to Solve?
|
||||
Open the index.html file on `/var/www/html` directories and you will notice there is a base64 encoded msg in line `21`
|
||||
|
||||
![base64](images/base64.png)
|
||||
|
||||
And if you decode it, you will get the flag
|
||||
|
||||
```
|
||||
vu-cyberthon-23
|
||||
```
|
After Width: | Height: | Size: 41 KiB |
After Width: | Height: | Size: 103 KiB |
|
@ -0,0 +1,14 @@
|
|||
# Find ICCID Number
|
||||
`-`
|
||||
|
||||
## About the Challenge
|
||||
We need to find the ICCID Number
|
||||
|
||||
## How to Solve?
|
||||
We can get the ICCID Number in the `root/media/0/Download` directory and find `20221017_141522.jpg` file
|
||||
|
||||
![iccid](images/iccid.png)
|
||||
|
||||
```
|
||||
89370038009021791031
|
||||
```
|
After Width: | Height: | Size: 1.2 MiB |
|
@ -0,0 +1,14 @@
|
|||
# Find MSISDN Number
|
||||
`-`
|
||||
|
||||
## About the Challenge
|
||||
We need to find the MSISDN Number
|
||||
|
||||
## How to Solve?
|
||||
We can get the MSISDN Number in the `root/media/0/Download` directory and find `20221017_145325.jpg` file
|
||||
|
||||
![msisdn](images/msisdn.png)
|
||||
|
||||
```
|
||||
89370038009021791031
|
||||
```
|
After Width: | Height: | Size: 1.4 MiB |
After Width: | Height: | Size: 247 KiB |
|
@ -0,0 +1,14 @@
|
|||
# Find location
|
||||
> Find the flag in the photo location
|
||||
|
||||
## About the Challenge
|
||||
We have been a given a photo and we need to find the flag there (You can get the picture [here](Location.jpeg))
|
||||
|
||||
## How to Solve?
|
||||
Check the metadata to get the flag
|
||||
|
||||
![flag](images/flag.png)
|
||||
|
||||
```
|
||||
VU{d5bc0961009b25633293206cde4ca1e0}
|
||||
```
|
After Width: | Height: | Size: 15 KiB |
|
@ -0,0 +1,14 @@
|
|||
# How much dollars the seized weapons (stuff) may have cost
|
||||
> How much dollars the seized weapons (stuff) may have cost?
|
||||
|
||||
## About the Challenge
|
||||
We need to find how much dollars the seized weapons (stuff) may have cost
|
||||
|
||||
## How to Solve?
|
||||
There is a picture that leaked the cost (You can find the file on `/root/media/0/Screenshots` folder)
|
||||
|
||||
![picture](images/picture.png)
|
||||
|
||||
```
|
||||
95000
|
||||
```
|
After Width: | Height: | Size: 170 KiB |
|
@ -0,0 +1,22 @@
|
|||
# VU CYBERTHON 2023
|
||||
CTF writeup for VU CYBERTHON 2023. I took part in this CTF competition with the TCP1P team, and got 15th place out of 895 teams
|
||||
|
||||
Thanks to the TCP1P team especially @dimasma0305, @godmadoka, and @dRe
|
||||
|
||||
| Category | Challenge
|
||||
| --- | --- |
|
||||
| Cryptography, Web Exploitation | [Simple Web](/VU%20CYBERTHON%202023/Simple%20Web/)
|
||||
| Network Security | [Blue Baby Shark](/VU%20CYBERTHON%202023/Blue%20Baby%20Shark/)
|
||||
| OSINT | [RFC standard for security policy information](/VU%20CYBERTHON%202023/RFC%20standard%20for%20security%20policy%20information/)
|
||||
| OSINT | [Find location](/VU%20CYBERTHON%202023/Find%20location/)
|
||||
| Digital Forensics | [What is SHA1 checksum of image file blk0_mmcblk0.bin ?](/VU%20CYBERTHON%202023/What%20is%20SHA1%20checksum%20of%20image%20file%20blk0_mmcblk0.bin/)
|
||||
| Digital Forensics | [What is the name of the largest partition?](/VU%20CYBERTHON%202023/What%20is%20the%20name%20of%20the%20largest%20partition/)
|
||||
| Digital Forensics | [What email address is setup on com.android.email service?](/VU%20CYBERTHON%202023/What%20email%20address%20is%20setup%20on%20com.android.email%20service/)
|
||||
| Digital Forensics | [What is the brand (vendor) of phone?](/VU%20CYBERTHON%202023/What%20is%20the%20brand%20(vendor)%20of%20phone/)
|
||||
| Digital Forensics | [What is the name of WhatsApp user which has phone number +37062166565?](/VU%20CYBERTHON%202023/What%20is%20the%20name%20of%20WhatsApp%20user%20which%20has%20phone%20number%20%2B37062166565/)
|
||||
| Digital Forensics | [How much dollars the seized weapons (stuff) may have cost?](/VU%20CYBERTHON%202023/How%20much%20dollars%20the%20seized%20weapons%20(stuff)%20may%20have%20cost/)
|
||||
| Digital Forensics | [What tank specs the user was looking for?](/VU%20CYBERTHON%202023/What%20tank%20specs%20the%20user%20was%20looking%20for/)
|
||||
| Digital Forensics | [What web address was provided for a company that can rent cargo planes?](/VU%20CYBERTHON%202023/What%20web%20address%20was%20provided%20for%20a%20company%20that%20can%20rent%20cargo%20planes/)
|
||||
| Digital Forensics | [What is a name of video file which is related with tanks?](/VU%20CYBERTHON%202023/What%20is%20a%20name%20of%20video%20file%20which%20is%20related%20with%20tanks/)
|
||||
| Digital Forensics | [Based on the analysis of the video file 20221015_173902.mp4, please provide the GPS coordinates of the possible place, where video was recorded?](/VU%20CYBERTHON%202023/Based%20on%20the%20analysis%20of%20the%20video%20file%2020221015_173902.mp4%2C%20please%20provide%20the%20GPS%20coordinates%20of%20the%20possible%20place%2C%20where%20video%20was%20recorded/)
|
||||
| Digital Forensics | [Based on the review of the media files, please provide the GPS coordinates of the possible meeting point.](/VU%20CYBERTHON%202023/Based%20on%20the%20review%20of%20the%20media%20files%2C%20please%20provide%20the%20GPS%20coordinates%20of%20the%20possible%20meeting%20point/)
|
|
@ -0,0 +1,14 @@
|
|||
# RFC standard for security policy information
|
||||
> The Lithuanian company Altacom uses one of the latest RFC standard formats for presenting security p...
|
||||
|
||||
## About the Challenge
|
||||
We need to know the email that company use to receive vulnerability report
|
||||
|
||||
## How to Solve?
|
||||
After finding about Altacom company on google, I found the official website (https://www.altacom.eu/). And if we want to know the email that company use to receive vulnerability report, you can access `/.well-known/security.txt` endpoint
|
||||
|
||||
![email](images/email.png)
|
||||
|
||||
```
|
||||
report@altacom.eu
|
||||
```
|
After Width: | Height: | Size: 9.7 KiB |
|
@ -0,0 +1,18 @@
|
|||
# Simple Web
|
||||
`-`
|
||||
|
||||
## About the Challenge
|
||||
We are given a zip code that contain HTML file inside of it
|
||||
|
||||
![preview](images/preview.png)
|
||||
|
||||
## How to Solve?
|
||||
If we open the HTML file and check the source code, you will found brainfuck language
|
||||
|
||||
![brainfuck](images/brainfuck.png)
|
||||
|
||||
And if you decode it, you will get the flag
|
||||
|
||||
```
|
||||
cyberthon
|
||||
```
|
After Width: | Height: | Size: 15 KiB |
After Width: | Height: | Size: 40 KiB |
|
@ -0,0 +1,18 @@
|
|||
# What email address is setup on com.android.email service
|
||||
> What email address is setup on com.android.email service?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the email address that set up on com.android.email
|
||||
|
||||
## How to Solve?
|
||||
We need to find the email by get the SQLite Database first from `/root/data/com.android.email/databases/Emailprovider.db`
|
||||
|
||||
![exports](images/exports.png)
|
||||
|
||||
Open the SQLite database using `DB Browser for SQlite` and import the database. In the `Account` table, we can see the email
|
||||
|
||||
![email](images/email.png)
|
||||
|
||||
```
|
||||
Joohnnycash7@gmail.com
|
||||
```
|
After Width: | Height: | Size: 28 KiB |
After Width: | Height: | Size: 12 KiB |
|
@ -0,0 +1,14 @@
|
|||
# What is SHA1 checksum of image file blk0_mmcblk0.bin
|
||||
> What is SHA1 checksum of image file blk0_mmcblk0.bin?
|
||||
|
||||
## About the Challenge
|
||||
We need to get the SHA1 checksum of the image file
|
||||
|
||||
## How to Solve?
|
||||
Im using FTK Imager to get the SHA1 checksum by using `Verify Drive / Image` function
|
||||
|
||||
![verify](images/verify.png)
|
||||
|
||||
```
|
||||
5377521a476be72837053390b24bc167d8f9182c
|
||||
```
|
After Width: | Height: | Size: 14 KiB |
|
@ -0,0 +1,14 @@
|
|||
# What is a name of audio file which is related with rifles
|
||||
> What is a name of audio file which is related with rifles?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the name and the extensions of file which is talking about rifles
|
||||
|
||||
## How to Solve?
|
||||
There is a picture that related to rifles (You can find the file on `/root/media/0/Telegram/Telegram Audio` folder)
|
||||
|
||||
![rifle](images/rifle.png)
|
||||
|
||||
```
|
||||
4_5956573053423979339.ogg
|
||||
```
|
After Width: | Height: | Size: 26 KiB |
|
@ -0,0 +1,14 @@
|
|||
# What is a name of video file which is related with tanks
|
||||
> What is a name of video file which is related with tanks?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the name and the extensions of file which is related with tanks
|
||||
|
||||
## How to Solve?
|
||||
There is a picture that related to tanks (You can find the file on `/root/media/0/Downloads` folder)
|
||||
|
||||
![tanks](images/tanks.png)
|
||||
|
||||
```
|
||||
tanks.mp4
|
||||
```
|
After Width: | Height: | Size: 45 KiB |
|
@ -0,0 +1,14 @@
|
|||
# What is the brand (vendor) of phone
|
||||
> What is the brand (vendor) of phone?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the brand of the phone
|
||||
|
||||
## How to Solve?
|
||||
I can get the vendor of the phone because I found the package name on `/root/data/` directory
|
||||
|
||||
![vendor](images/samsung.png)
|
||||
|
||||
```
|
||||
Samsung
|
||||
```
|
After Width: | Height: | Size: 17 KiB |
|
@ -0,0 +1,14 @@
|
|||
# What is the model of the phone
|
||||
> What is the model of the phone?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the the model of the phone
|
||||
|
||||
## How to Solve?
|
||||
There is a picture that related to rifles (You can find the file on `system/root/SW_Configuration.xml`)
|
||||
|
||||
![model](images/model.png)
|
||||
|
||||
```
|
||||
SM-G530FZ
|
||||
```
|
After Width: | Height: | Size: 15 KiB |
|
@ -0,0 +1,18 @@
|
|||
# What is the name of WhatsApp user which has phone number +37062166565
|
||||
> What is the name of WhatsApp user which has phone number +37062166565?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the name of WhatsApp user
|
||||
|
||||
## How to Solve?
|
||||
We need to find the email by get the SQLite Database first from `/root/data/com.whatsapp/databases/wa.db`
|
||||
|
||||
![exports](images/exports.png)
|
||||
|
||||
Open the SQLite database using `DB Browser for SQlite` and import the database. In the `wa_contacts` table, we can see the email
|
||||
|
||||
![contacts](images/contacts.png)
|
||||
|
||||
```
|
||||
Marcus
|
||||
```
|
After Width: | Height: | Size: 13 KiB |
After Width: | Height: | Size: 13 KiB |
|
@ -0,0 +1,12 @@
|
|||
# What is the name of the largest partition
|
||||
> What is the name of the largest partition?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the name of the largest partition
|
||||
|
||||
## How to Solve?
|
||||
Just use the FTK Imager and find the name of the largest partition
|
||||
|
||||
```
|
||||
userdata
|
||||
```
|
|
@ -0,0 +1,18 @@
|
|||
# What is the name of the username telegram
|
||||
> What is the name of the username telegram?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the name of the username telegram
|
||||
|
||||
## How to Solve?
|
||||
Go to `root/data/org.telegram.mesengger.web/files` (Don't check `org.telegram.mesengger`). And then extract `cache4.db` file
|
||||
|
||||
![extract](images/extract.png)
|
||||
|
||||
Open the db file using `DB Browser for SQLite` and then find `users` table and you will find the uid
|
||||
|
||||
![sqlite](images/sqlite.png)
|
||||
|
||||
```
|
||||
5719323092
|
||||
```
|
After Width: | Height: | Size: 19 KiB |
After Width: | Height: | Size: 18 KiB |
|
@ -0,0 +1,14 @@
|
|||
# What tank specs the user was looking for
|
||||
> What tank specs the user was looking for?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the tank specs
|
||||
|
||||
## How to Solve?
|
||||
I got the tanks specs in WhatsApp message (You can get the file in `/root/data/com.whatsapp/databases/msgstore.db`). Find in `message` table
|
||||
|
||||
![sqlite](images/sqlite.png)
|
||||
|
||||
```
|
||||
t14 armata
|
||||
```
|
After Width: | Height: | Size: 79 KiB |
|
@ -0,0 +1,14 @@
|
|||
# What web address was provided for a company that can rent cargo planes
|
||||
> What web address was provided for a company that can rent cargo planes?
|
||||
|
||||
## About the Challenge
|
||||
We need to find the web address
|
||||
|
||||
## How to Solve?
|
||||
I got the web address in WhatsApp message (You can get the file in `/root/data/com.whatsapp/databases/msgstore.db`). Find in `message` table
|
||||
|
||||
![sqlite](images/sqlite.png)
|
||||
|
||||
```
|
||||
https://www.aircharterservice.com
|
||||
```
|
After Width: | Height: | Size: 84 KiB |