Again this year CERT-SE has put together a CTF during the cyber security month. This year’s theme is ransomware. The challenge is aimed at anyone with an interest in IT security.
<scenario>
A fictional organisation has been affected by a ransomware attack. It has been successful in setting up an emergency channel for communication and has access to parts of its infrastructure.
Can you find all the flags?
</scenario>
In the attached .zip file there is a network dump (PCAP) that contains a total of nine flags. Eight of these have the format “CTF[STRING]” and one has the format [STRING] (please add CTF in your answer, i.e. CTF[STRING]). Everything you need in order to find the flags is included in the network dump and can be solved without connection to the internet. You will not find any clues in any online references.
Flags: (9/9)
strings CERT-SE_CTF2024.pcap | rg "PASS CTF\[" | cut -d" " -f2 | head -1
Flag: CTF[AES128]
- Carve out
disk1.img.gz
- Use some sleuthkit tools to analyse and mount the disk-image
- Apply sslkey-file in wireshark to decrypt the tls-traffic
- Carve out password that was curl:ed
- Decrypt the encrypted file
password=pheiph0Xeiz8OhNa openssl enc -d -aes-128-cbc -pass pass:$password -in secret.encrypted -out secret
Flag: CTF[OPPORTUNISTICALLY]
- Carve out
archive
Just unzip manually. Started to script but realized that was a waste of time, it was possible to do it manually
Flag: CTF[IRRITATING]
- https://pyinstxtractor-web.netlify.app/
- pycdc on the
puzzle_new.pyc
- Get the image, ran through stegsolve with a black'n'white filter, realized the flag was in the picture...
Flag: CTF[HAPPYBIRTHDAY]
- CTF[E65D46AD10F92508F500944B53168930], although this is prob not the real flag. John decrypt, maybe use the wordlist?
- Crackstation says its a type "LM" hash matching "RICKROLL", but matches all kinds of upper/lowercase variants
- "RICKROLL" is to big of a coincidence to not be the real flag.
Flag: CTF[RICKROLL]
See solve.py
...
Flag: CTF[OR]
- Run
rifiuti-vista
on the folder - Find the (original) file with a weird name
- base32decode
Flag: CTF[PENTOMINOS]
Resource: https://www.youtube.com/watch?v=lhhlgoMjM7o
- Extract data from
corp-net2.pcap
, according toUser::Domain:Challenge:HMAC-MD5:Response
hashcat -a0 -m5600 built-hash.hash WORDLIST.txt
(use the wordlist found earlier)- Add "CTF"
Flag: CTF[RHODE_ISLAND_Z]
- Filter for DNS in wireshark, export as txt
- Use some vim commands to filter out the names queried
- Filter out everything that looks like a real url
- Vim magic to combine all weird strings to a file
cat exp3_working.txt | base32 -d > img.png; nsxiv img.png
- Read the flag from the image
Flag: CTF[TOPPALUA]