ctf-writeup/2023/NahamCon CTF 2023/Raided
daffainfo e6c48e50f1 feat: grouped the challs 2024-01-09 16:59:32 +07:00
..
images feat: grouped the challs 2024-01-09 16:59:32 +07:00
README.md feat: grouped the challs 2024-01-09 16:59:32 +07:00

README.md

Raided

The police raided a server belonging to a very 1337 hax0r that was used to stage attacks. Upon further investigation, this server turned out to be a jump server for the attacker to access more infrastructure.

A memory snapshot was taken of the machine. See if you can figure out what the attacker was doing and what other systems the hacker was accessing.

About the Challenge

We've got a memory dump file, and if we check on the description of the chall. Looks like we need to find the attacker server

How to Solve?

In this case, im only using strings and grep, First we need to find the attacker server by using this command

strings raided-challenge-dump-vmem | grep "ssh "

ssh

The IP address of attacker server was 167.172.12.154 and the username was l33t. Now we need to find the private key using this command

cat raided-challenge-dump-vmem\ \(1\) | grep -Ei "BEGIN OPENSSH PRIVATE KEY-----" -a -A 7

This command will find a BEGIN OPENSSH PRIVATE KEY----- and then it will print 7 line after matched word

privkey

Use that privkey and login to the server by using this command

ssh l33t@167.172.12.154 -i id_rsa

flag

flag{654e9dc4c424e25423c19c5e64fffb27}