Skip to content

Commit 5f496b3

Browse files
committed
forgot to save files
1 parent 58ddb46 commit 5f496b3

12 files changed

Lines changed: 68 additions & 68 deletions

File tree

assets/WolvSec-CTF-2022/1.png

-39.2 KB
Binary file not shown.

assets/WolvSec-CTF-2022/2.png

-108 KB
Binary file not shown.

assets/WolvSec-CTF-2022/3.png

-19.2 KB
Binary file not shown.

assets/WolvSec-CTF-2022/4.png

-1.59 MB
Binary file not shown.

assets/WolvSec-CTF-2022/5.png

-285 KB
Binary file not shown.

assets/WolvSec-CTF-2022/6.png

-743 KB
Binary file not shown.

assets/WolvSec-CTF-2022/7.png

-673 KB
Binary file not shown.

assets/WolvSec-CTF-2022/8.png

-146 KB
Binary file not shown.

content/blog/LA-CTF-2023/index.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -24,22 +24,22 @@ The flag is lactf{location}, where location is the name of the POI that this per
2424

2525
Please note: contacting anyone or any organization beyond official LA CTF support channels regarding this challenge is against the rules. Please be respectful of those who are involved in this challenge.
2626

27-
{{< img src="LA-CTF-2023/picture.jpg" >}}
27+
{{< img src="picture.jpg" >}}
2828

2929
### Approach
3030

3131
We are given this image of someone who looks like they hiked up a mountain, and also is part of computer science at UCLA. My first step was figuring out who this was, so just did a quick google search for "Computer science professors at UCLA"
3232

33-
{{< img src="LA-CTF-2023/quora.png" >}}
33+
{{< img src="quora.png" >}}
3434

3535

3636
One of the first things I found is a [Quora article](https://www.quora.com/Who-is-the-best-computer-science-professor-at-UCLA) about him. So once I have the name I just google it, and then found his rock climbing website off that. Helped to confirm it was the same guy.
3737

38-
{{< img src="LA-CTF-2023/personal_website.png" >}}
38+
{{< img src="personal_website.png" >}}
3939

4040
I tried searching some of the mountains listed on Google Maps, but to no avail. I realized he didn't have hiking gear though unlike a lot of the photos on his website, but instead a UCLA T Shirt, signifying it could be a university trip. I came across [peaksandprofessorsucla.org](https://www.peaksandprofessorsucla.org/) which is a group of students at UCLA and professors. I looked at the blog posts with Carey Nachenberg, and found one about a trip to Skull Rock.
4141

42-
{{< img src="LA-CTF-2023/skull_rock.png" >}}
42+
{{< img src="skull_rock.png" >}}
4343

4444
I didn't really know if this was the exact place or not, but I went ahead and submitted that as the flag anyway and was correct! Anyways this was a weird OSINT challenge because I haven't had to deal with googling an actual person in a CTF, before this is more applicable to real world OSINT I guess?
4545

@@ -59,7 +59,7 @@ My friend sent me [this](https://discord.com/channels/1060030874722259057/106003
5959

6060
Note: Discord phone verification is NOT required for this challenge.
6161

62-
{{< img src="LA-CTF-2023/embed.png" >}}
62+
{{< img src="embed.png" >}}
6363

6464
### Approach
6565

@@ -73,18 +73,18 @@ From messing around with other message links that I created, I noticed having th
7373

7474
Ok cool, but how do we join a server with this? Well after more research I stumbled across [this Reddit post](https://www.reddit.com/r/discordapp/comments/vwzj18/if_i_have_the_id_of_a_server_would_this_help_me/) that just so happens to explain what to do when a widget is enabled, and you have the server ID.
7575

76-
{{< img src="LA-CTF-2023/reddit.png" >}}
76+
{{< img src="reddit.png" >}}
7777

7878
Using this the link would be:
7979

8080
```
8181
https://discord.com/widget?id=1060030874722259057
8282
```
83-
{{< img src="LA-CTF-2023/widget.png" >}}
83+
{{< img src="widget.png" >}}
8484

8585
And this Works! We can see here that the widget looks the same as the one pictured.
8686

87-
{{< img src="LA-CTF-2023/discord_flag.png" >}}
87+
{{< img src="discord_flag.png" >}}
8888

8989
From that we hit join, and we get the flag!
9090

@@ -160,7 +160,7 @@ Cool! Hashcat told us that the password for the encrypted drive is `hacker765`.
160160
└─$ sudo cryptsetup open --type luks hackers-drive.dd hackers-drive
161161
Enter passphrase for hackers-drive.dd: [ENTER hacker765 HERE]
162162
```
163-
{{< img src="LA-CTF-2023/directory.png" >}}
163+
{{< img src="directory.png" >}}
164164

165165
Alright, let's see what we have. Upon entering the drive we see some text files that contain command history and other important notes.
166166

@@ -235,7 +235,7 @@ Interesting. This looks somewhat like the flag format? I tried for a while to re
235235

236236
Let's take a look at that `encrypted-notes` folder:
237237

238-
{{< img src="LA-CTF-2023/encrypted_notes.png" >}}
238+
{{< img src="encrypted_notes.png" >}}
239239

240240
We see here two markdown files and `info.json` This json file contains encryption of the master keys. According to Joplin's [E2EE Spec](https://joplinapp.org/spec/e2ee/) the master keys are themselves encrypted.
241241

@@ -267,23 +267,23 @@ I first tried to decrypt this with this [SJCL demo](https://bitwiseshiftleft.git
267267

268268
But what password do we use to decrypt these encrypted notes? That comes to the second part of the challenge description, where there's `a much stronger encryption password once you login`. Well the master password is actually stored in cleartext in the database file!
269269

270-
{{< img src="LA-CTF-2023/cleartext_password.png" >}}
270+
{{< img src="cleartext_password.png" >}}
271271

272272
I tried using variations of this and the password found in `info.json` (which is also in `syncInfoCache` in the database) on the SJCL demo website, but to no avail. This is probably possible, but why make this harder than it needs to be? Let's just download our own version of Joplin and replace the database file! Swapping out important parameter values should also work, like the `syncInfoCache`, `encryption.masterPassword`, and `sync_items`.
273273

274274
Once you're in Joplin make sure the Encryption Keys look as such:
275275

276-
{{< img src="LA-CTF-2023/encryption_keys.png" >}}
276+
{{< img src="encryption_keys.png" >}}
277277

278278
Then, make sure the Synchronization target is on the file system and pointed to the `encrypted-notes` folder, or a copy of it.
279279

280280
After all this is done, select the `Delete local data and re-download from sync target` to sync the new data into Joplin!
281281

282-
{{< img src="LA-CTF-2023/sync_settings.png" >}}
282+
{{< img src="sync_settings.png" >}}
283283

284284
There we go! We can see the *secert info* that the hacker was keeping from us.
285285

286-
{{< img src="LA-CTF-2023/notebook_flag.png" >}}
286+
{{< img src="notebook_flag.png" >}}
287287

288288
Flag: `lactf{S3cUr3_yOUR_C4cH3D_3nCRYP71On_P422woRD2}`
289289

content/blog/Nahamcon-CTF-2022/index.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,11 @@ The first step in your investigation is to find more information about the compa
3030
### Approach
3131
Starting off we get this prompt that the Keeber Security Group about them wanting us to perform an investigation on them using our OSINT knowledge. We see that someone registered a domain, so step 1 should be finding this website. Not too hard after a quick google search for Keeber Security Group.
3232

33-
{{< img src="Nahamcon-CTF-2022/1.png" >}}
33+
{{< img src="1.png" >}}
3434

3535
We can use external websites to find out who registered the domain, such as [whois.com](https://www.whois.com).
3636

37-
{{< img src="Nahamcon-CTF-2022/2.png" >}}
37+
{{< img src="2.png" >}}
3838

3939
flag: `flag{ef67b2243b195eba43c7dc797b75d75b}`
4040

@@ -50,11 +50,11 @@ The Keeber Security Group is a new startup in its infant stages. The team is alw
5050
### Approach
5151
I started off looking at the Github for this one, and found a contributor named `Tiffany Douglas` who wasn’t on the team section of the website. However, I couldn't find the flag there. I then pivoted to the [Wayback Machine](https://web.archive.org/web/20220419212259/https://keebersecuritygroup.com/team/) and noticed a snapshot was taken prior to the competition starting.
5252

53-
{{< img src="Nahamcon-CTF-2022/3.png" >}}
53+
{{< img src="3.png" >}}
5454

5555
Looking at this, we can find the flag under Tiffany's name in the team section.
5656

57-
{{< img src="Nahamcon-CTF-2022/4.png" >}}
57+
{{< img src="4.png" >}}
5858

5959
flag: `flag{cddb59d78a6d50905340a62852e315c9}`
6060

@@ -70,7 +70,7 @@ The ex-employee you found was fired for "committing a secret to public github re
7070
### Approach
7171
To find the committed secret, I turned to github to see if there were any commits by Tiffany that were undone. Under the `.gitignore` in `security-evaluation-workflow` we see a secret that Tiffany must have added by mistake.
7272

73-
{{< img src="Nahamcon-CTF-2022/5.png" >}}
73+
{{< img src="5.png" >}}
7474

7575
I wasn’t sure what asana was at first, but after googling it seems that it’s some software that Keeber uses. I went to the [asana documentation](https://developers.asana.com/docs) to see what we could do with this and came across a way to access the api:
7676

@@ -81,7 +81,7 @@ curl https://app.asana.com/api/1.0/users/me \
8181

8282
Replacing the string with the one in the github, we get the flag.
8383

84-
{{< img src="Nahamcon-CTF-2022/6.png" >}}
84+
{{< img src="6.png" >}}
8585

8686
flag: `flag{49305a2a9dcc503cb2b1fdeef8a7ac04}`
8787

@@ -103,8 +103,8 @@ The hardest part for me in this challenge was creating a good word list to use.
103103

104104
I looked closer at the `security-evaluation-workflow` in the github and found a lot of strange words that did not exist like in “We strive to achieve *minivivi* and *clainebookahl* through this”. I figured one of these made up words would be the password, and compiled a wordlist of the 72 of them. Using hashcat, we get the password is `craccurrelss` in 4 mins, 35 seconds.
105105

106-
{{< img src="Nahamcon-CTF-2022/7.png" >}}
107-
{{< img src="Nahamcon-CTF-2022/8.png" >}}
106+
{{< img src="7.png" >}}
107+
{{< img src="8.png" >}}
108108

109109
Using Keepass, we can open the .kdbx file with `craccurrelss` and get access to the passwords. After messing around for a bit I found that performing auto-type on an entry outputs the flag.
110110

@@ -152,24 +152,24 @@ After all of the damage the ex-employee's mistakes caused to the company, the Ke
152152
### Approach
153153
The hint tells us that we need to use `tif.hearts.science@gmail.com` to eventually find this new workplace. I tried to use [epieos](https://epieos.com/) to get more information. This only gives us her name and that she has a GitHub account, which we already knew. Since we are trying to find their new workplace, I figured they may have a social media account that would allow us to find this place (similar to a recent [OSINT](https://github.com/dree314/WolvSec-CTF-2022-Writeups/blob/main/OSINT/Where%20in%20the%20world.md) I made for WolvSecCon). Linkedin produced no results, and I thought Instagram was not either. None of the Tiffany Douglas accounts on instagram seemed to be her, but searching `tif.hearts.science` we find an account that is hers.
154154

155-
{{< img src="Nahamcon-CTF-2022/10.png" >}}
156-
{{< img src="Nahamcon-CTF-2022/11.png" >}}
155+
{{< img src="10.png" >}}
156+
{{< img src="11.png" >}}
157157

158158
I started with this first post to find her work location. We can see a Google watermark on it, so I set out to find where this could be on Google Maps. On Tiffany's GitHub profile, she states that she is from Maine. This can also be deduced from the 207 area code on Keeber's website. Searching on the coast of Google Maps, we can easily see ferry routes denoted by blue dashed lines. I eliminated the minor cities in Maine and figured it must be Portland, which would also be why she called it “the city.”
159159

160-
{{< img src="Nahamcon-CTF-2022/12.png" >}}
160+
{{< img src="12.png" >}}
161161

162162
After scanning these ports I eventually came across [this one](https://www.google.com/maps/@43.6568766,-70.2480553,3a,75y,178.19h,87.69t/data=!3m7!1e1!3m5!1seNEkVm0dTjxhVTHSt2B5Qw!2e0!5s20151101T000000!7i16384!8i8192) that looked like the image, and sure enough if we turn the date back to 2015 we see the same image that was on her instagram.
163163

164-
{{< img src="Nahamcon-CTF-2022/13.png" >}}
164+
{{< img src="13.png" >}}
165165

166166
From her first instagram post I see that there is a courtyard at the place she works at, so I start scanning for courtyards in Portland on Google Maps to see if any of them had similar photospheres. This was not getting me anywhere, so I looked more at her Instagram and figured she works at a hotel from the “but the pool is indoors” meme. In hindsight, the bedding Instagram posts were also indications of this. I searched for hotels in Portland and found one with a courtyard in satellite mode.
167167

168-
{{< img src="Nahamcon-CTF-2022/14.png" >}}
168+
{{< img src="14.png" >}}
169169

170170
Searching [this hotel on yelp](https://www.yelp.com/biz/residence-inn-by-marriott-portland-downtown-waterfront-portland), we find Tiffany’s review with the flag in it.
171171

172-
{{< img src="Nahamcon-CTF-2022/15.png" >}}
172+
{{< img src="15.png" >}}
173173

174174
flag: `flag{0d707179f4c993c5eb3ba9becfb046034}`
175175

@@ -190,19 +190,19 @@ Multiple employees have gotten strange phishing emails from the same phishing sc
190190
### Approach
191191
Thankfully, Princess of the Ugbo Kingdom Ayofemi Akinruntan’s valiant attempt to get Keeber to donate to him and Sir. Beiber did not trick them. However, they did leave their email `cheerios.fanatic1941@gmail.com` which we may be able to use to figure out whoever sent this.
192192

193-
{{< img src="Nahamcon-CTF-2022/16.png" >}}
193+
{{< img src="16.png" >}}
194194

195195
I thought about doing forensics work on the pdf, but since this was an OSINT challenge and the description said *use the email* I didn’t bother doing anything past looking at the metadata, to which there was nothing. The note saying we did not need to pay for any OSINT tool hinted that we should be able to use a public one, so I went back to [epieos](https://epieos.com/). This gave us the information that this gmail is registered with the name `Issac Anderson` and with [holehe](https://github.com/megadose/holehe) we know that they have a Myspace account created with this email.
196196

197-
{{< img src="Nahamcon-CTF-2022/17.png" >}}
197+
{{< img src="17.png" >}}
198198

199199
I looked for a while to see if there was a way to find a Myspace account with just an email, but could not find anything. I then searched for Issac Anderson on Myspace and checked the ones that showed up but did not see a flag. I thought for a bit that maybe holehe was wrong or someone else registered an account with that email, but looking at the pdf again I figured the mention of Justin Bieber was a hint that we should in fact be looking for a Myspace account, since people like to share music there. I then realized I did not look through all the Issac Andersons, of which many, many results showed up.
200200

201-
{{< img src="Nahamcon-CTF-2022/18.png" >}}
201+
{{< img src="18.png" >}}
202202

203203
I went through opening all of them and quickly looked through to see if I found the right one. Sure enough, the flag showed up on one of them.
204204

205-
{{< img src="Nahamcon-CTF-2022/19.png" >}}
205+
{{< img src="19.png" >}}
206206

207207
flag: `flag{4a7e2fcd7f85a315a3914197c8a20f0d}`
208208

@@ -218,11 +218,11 @@ Despite all of the time we spend teaching people about phishing, someone at Keeb
218218
### Approach
219219
From the Myspace account in `Keeber 7` the url leaves us with their username `cereal_lover1990`. The [Sherlock tool](https://github.com/sherlock-project/sherlock) is great for finding accounts connected to usernames.
220220

221-
{{< img src="Nahamcon-CTF-2022/20.png" >}}
221+
{{< img src="20.png" >}}
222222

223223
A lot of the results that showed up like CapFriendly show up for most searches but don’t actually have an account linked to that username. However, Pastebin doesn’t normally show up, and that seems like a great place to post personal information. Going to the *Chump list* on [their pastebin](https://pastebin.com/u/cereal_lover1990), we can find the flag in Maria’s personal information.
224224

225-
{{< img src="Nahamcon-CTF-2022/21.png" >}}
225+
{{< img src="21.png" >}}
226226

227227
flag: `flag{70b5a5d461d8a9c5529a66fa018ba0d0}`
228228

0 commit comments

Comments
 (0)