ctfs
  • ๐Ÿ‘‹Hello!
  • ๐ŸดPractice
    • ๐ŸŒCryptohack
      • Introduction
      • General
        • Encoding
        • XOR
        • Mathematics
        • Data Formats
      • Symmetric Ciphers
        • How AES Works
        • Symmetric Starter
        • Block Ciphers 1
        • Stream Ciphers
      • Mathematics
        • Modular Math
        • Lattices
      • RSA
        • Starter
        • Primes Part 1
        • Public Exponent
    • ๐ŸŒPortSwigger
      • Path Traversal
      • File Upload
      • SSRF Attacks
    • ๐ŸŒTryHackMe
      • Basic Skills
      • Linux
      • Penetration Testing
      • Networking
      • OSINT
  • ๐ŸšฉCompetitions
    • 2025
      • ๐Ÿ‡ฎ๐Ÿ‡ฉGKSK#9 Osintathon
        • Mudik Lebaran (100 pts)
        • Foto Patung (100 pts)
        • Kolektor Komik (100 pts)
        • Tolong Aku (100 pts)
        • Kencan Pertama (100 pts)
        • Nama Si Pelaku (100 pts)
        • Cekidot (100 pts)
        • Ledakan! (100 pts)
        • ๐ŸŽน๐ŸŽถ (100 pts)
        • Batu Besar (100 pts)
        • Komentar (100 pts)
        • Ini dimana? (100 pts)
        • Koordinat Foto Misterius (100 pts)
        • Bianglalaaa (100 pts)
        • Aku Hacker (100 pts)
        • Anjazzz (100 pts)
        • Dikirim Kakakku (129 pts)
        • Ingfo Loker (154 pts)
        • MISSING 00 (100 pts)
        • MISSING 01 (154 pts)
        • Siapa Aku? (154 pts)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉIFEST 13
        • Ququerer (250 pts)
        • Silent Trace (370 pts)
        • Nugas (Solved After Event)
        • Free Flag (280 pts)
        • Brute (Solved After Event)
        • Web V1 (Solved After Event)
        • Bypass (Solved After Event)
        • Orbiter (Solved After Event)
      • ๐ŸŒOSINT Combine (Wildlife)
        • Getting Started (100 pts)
        • Proper Poppy (100 pts)
        • Legendary Beasts (200 pts)
        • Shadow Fleet (200 pts)
        • Proper Poppy II (200 pts)
        • Not So Smug Smuggler (200 pts)
        • Icy (200 pts)
        • Forest Pals (200 pts)
        • Safari Time II (200 pts)
        • Sneaky! (200 pts)
        • Hello Friend (300 pts)
        • Busy As A (300 pts)
        • Get Rotated! (300 pts)
        • High Seas (300 pts)
        • Nocturnal (300 pts)
        • Safari Time (400 pts)
        • Peak Weather (400 pts)
        • Singsong (400 pts)
        • Falling Fell (500 pts)
        • Kitty Cats (500 pts)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉRECURSION
        • let him cook
        • Basic Math
        • Favourite Number
        • Zarrar Cipher (100 pts)
        • paBlue Team (100 pts)
        • [๐Ÿฉธ] I wish I was there on December 21, 2024 (100 pts)
        • Small House (200 pts)
        • [๐Ÿฉธ] Mission Difference (456 pts)
    • 2024
      • ๐ŸŒSanta Claus CTF
        • Complete Picture
        • Day 1 - Big Bang
        • Day 2 - The Summer Job
        • Day 3 - The Visitors
        • Day 4 - Happy Birthday
        • Day 5 - Say My Name
        • Day 6 - Say "Cheese"
        • Day 7 - Revealing Pixels
        • Day 8 - Connecting The Dots
        • Day 9 - 404 Not Found
        • Day 10 - Breaking News
        • Day 11 - Ayrton Santa
        • Day 12 - Lost and Found
        • Day 13 - Planespotting
        • Day 14 - Santa Surveillance
        • Day 15 - Shaken, Not Stirred
        • Day 16 - Status Update
        • Day 17 - Waste ...of Time
        • Day 18 - Lost in Translation
        • Day 19 - Santa's Clones
        • Day 20 - Losing Tracks
        • Day 21 - Sing my Song
        • Day 22 - Eagle Eye
        • Day 23 - Distances Matters
        • Day 24 - Mastermind
      • ๐ŸŒCyber Jawara International
        • Stone Game (100 pts)
        • prepare the tools (176 pts)
        • Persona (484 pts)
      • ๐ŸŒOSMOSIS Precon CTF
        • 1 The art of espionage
        • # 2 The Hack
        • # 3 The rabbit hole
        • # 4 The Association
        • # 6 Where is number 5
        • # 5 Who is it
        • Too many Layers
        • The prize
      • ๐Ÿ‡ฎ๐Ÿ‡ฉIntechfest
        • Sanity Check (100 pts)
        • Alin (113 pts)
        • GerakSendiri (106 pts)
        • Details (100 pts)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉCOMPFEST 16
        • Let's Help John! (100 pts)
        • money gone, wallet also gone (100 pts)
        • headโ€™s up! (493 pts)
        • CaRd (304 pts)
        • Sanity Check (100 pts)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉGemastik
        • Baby AES (451 pts)
        • Baby Structured (100 pts)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉTechnofair 11
        • Kenangan
        • Xorban
        • Marsha
        • Siap Tempur!!
        • eftipi
        • kurang berarti
        • DUMPling
        • Malicious
      • ๐ŸŒDIVER OSINT
        • chiban
      • ๐Ÿ‡ฎ๐Ÿ‡ฉGKSK#8 Osintathon
        • Sport Location
        • Meklaren lu warna apa boss ?
        • Postcode
        • Rumah Minang
        • Latihan
        • Anak Misterius
        • Travelling Anywhere
        • The Thief
        • Danger Watch
        • Misteri Ruang Angkasa
        • Fun Walk
        • I am Late
        • My Oshi
        • Wellcome to my Youtube Channel
        • Pesan Tersembunyi Wingdings
        • Salah Fokus
        • Apa itu GKSK?
        • Foto Bersejarah
        • Picture
        • Nostalgia Child
        • oldschool
        • Summer Olympic
      • ๐Ÿ‡ฎ๐Ÿ‡ฉTechcomfest
        • pemanasan
        • crackable
        • Kuli-ah forensik
    • 2023
      • ๐Ÿ‡ฎ๐Ÿ‡ฉCyber Jawara
        • daruma
      • ๐Ÿ‡ฎ๐Ÿ‡ฉNCW
        • Simple (220 pts)
        • wangsaf (320 pts)
        • Sillyville Saga (220 pts)
        • Freminhelp (Solved after event)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉHology 6
      • ๐Ÿ‡ฎ๐Ÿ‡ฉSlashRoot 7
        • Summary (441 pts)
        • eeee (480 pts)
        • Zebra Cross (409 pts)
        • Waka Waka eh eh (185 pts)
        • ANABUL (250 pts)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉCOMPFEST 15
        • not simply corrupted (316 pts)
        • Artificial secret (356 pts)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉGemastik
        • easy AES
        • k-1
        • Gen Z
      • ๐Ÿ‡ฎ๐Ÿ‡ฉTechnoFair 10
        • RSA Bwang
        • Marsah
        • rapsodi
        • Pengen Merch JKT ๐Ÿ˜ข
        • space mono
        • file pemberian fans
        • bantu aku mencari sebuah rahasia
    • 2022
      • ๐Ÿ‡ฎ๐Ÿ‡ฉNCW
        • sabeb64 (331 pts)
        • cakemath (451 pts)
        • Downloader (244 pts)
        • 199 passcode (Solved after event)
      • ๐Ÿ‡ฎ๐Ÿ‡ฉTEDCTF
      • ๐Ÿ‡ฎ๐Ÿ‡ฉGemastik
      • ๐Ÿ‡ฎ๐Ÿ‡ฉOSCCTF
      • ๐Ÿ‡ฎ๐Ÿ‡ฉARA
  • ๐ŸชฆOld Hello
Powered by GitBook
On this page
  1. Competitions
  2. 2023
  3. SlashRoot 7

Summary (441 pts)

Deskripsi

sum it up baby

nc 103.152.242.228 1011

Author : MockingJay

Pada soal ini kita diberikan sebuah service dan source code-nya yakni chall.py.

#! /usr/bin/python3

import hashlib
import subprocess
from binascii import hexlify

wl_cmd = b'echo lol'
wl_hash = hashlib.sha1(wl_cmd).digest()[:3]

def main():
    while True:
        print('\nWelcome to my secret service, have fun!\n')
        input_cmd = input('> ').encode('latin1')
        
        if input_cmd == b'exit':
            print('Bye-Bye ๐Ÿ‘‹๐Ÿ‘‹๐Ÿ‘‹')
            exit()
        
        if hashlib.sha1(input_cmd).digest()[:3] != wl_hash:
            print(f'Unknown command, try this command instead : {wl_cmd.decode("latin1")}')
            continue

        if b'flag.txt' in input_cmd:
            print(f'bruh use another method h3h3h3h3')

        try:
            res = subprocess.check_output(['/bin/bash', '-c', input_cmd])
            print(res.decode())            
        except subprocess.CalledProcessError as e:
            print(f'Command returned non-zero exit status {e.returncode}')

if __name__ == '__main__':
    main()

Jadi intinya begini: Kita bisa memasukkan command bash melalui input pada service Syaratnya, 3 byte pertama dari hasil hash input kita harus sama dengan 3 byte pertama dari hasil hash bโ€echo lolโ€ Selain itu, input kita tidak boleh mengandung โ€œflag.txtโ€ Hash yang digunakan adalah sha1 (ini tidak terlalu relevan dengan penyelesaian dari soal)

Di sini vuln-nya adalah pengecekan hasil hash yang hanya pada 3 byte pertama. Apabila kita mencoba memasukkan input berbeda sebanyak lebih dari 256^3 maka kemungkinan terjadi collision akan sangat tinggi (adapun karena di sini kita hanya bisa menggunakan karakter printable, jadi saya menggunakan 4 byte untuk slot karakter random, sehingga ada 100^4 kemungkinan). Maka dari itu, kita buat saja versi input yang berbeda-beda, tapi tujuan command-nya sama, yaitu membaca flag.txt.

Oh iya, karena command yang kita inputkan tidak boleh ada โ€œflag.txtโ€-nya, maka diperlukan workaround. Setelah beberapa trial and error, saya akhirnya menggunakan cat *; echo โ€œ{hal random}โ€.

Untuk mencoba segala kemungkinan tersebut dengan โ€œhal randomโ€, saya menggunakan script berikut.

import hashlib
from string import printable

test = hashlib.sha1(b"echo lol").digest()[:3]

base_cmd = 'cat *; echo "'


for i in printable:
	for j in printable:
		for k in printable:
			for l in printable:
				check = hashlib.sha1((base_cmd + i + j + k + l + '"').encode()).digest()[:3]
				print(base_cmd + i + j + k + l + '"')
				if check == test:
					print("FOUND!")
					print(check)
					exit(0)

Didapat cat *; echo โ€œ8R=0โ€. Memasukkannya ke service, kita mendapat isi dari semua file yang ada di directory server, termasuk flag.txt.

Flag: slashroot7{easy_crypt0_chall_f0r_ez_first_chall}

PreviousSlashRoot 7Nexteeee (480 pts)

Last updated 10 months ago

๐Ÿšฉ
๐Ÿ‡ฎ๐Ÿ‡ฉ