Skip to content

Commit 75d87bd

Browse files
committed
Added My USB and Scisnerof Writeups
1 parent 8ed7b5a commit 75d87bd

File tree

4 files changed

+61
-6
lines changed

4 files changed

+61
-6
lines changed

cryptography.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ This category focuses on using advanced mathematical topics to encrypt data to p
77
* [RSA 1 \[50 points\]](/cryptography/rsa-1-50-points.md)
88
* Let Me Be Frank \[75 points\]
99
* RSA 2 \[80 points\]
10-
* Decode Me \[100 points\]
10+
* Decode Me \[100 points\](/cryptography/decode-me-100-points.md)
1111
* [Hash on Hash \[100 points\]](/cryptography/hash-on-hash-100-points.md)
1212
* RSA 3 \[135 points\]
1313
* Diffie-cult \[140 points\]
@@ -18,6 +18,3 @@ This category focuses on using advanced mathematical topics to encrypt data to p
1818
* [Genius \[230 points\]](/cryptography/genius-230-points.md)
1919
* [Premium RSA \[350 points\]](/cryptography/premium-rsa-350-points.md)
2020
* [Paillier Service \[400 points\]](/cryptography/paillier-service-400-points.md)
21-
22-
23-

forensics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ This category refers to the recovery of information from evidence, like extracti
44

55
* [20xx \[50 points\]](/forensics/20xx-50-points.md)
66
* [Mane Event \[50 points\]](/forensics/mane-event-50-points.md)
7-
* scisnerof \[70 points\]
7+
* scisnerof \[70 points\](/forensics/scisnerof-70-points.md)
88
* [Petty Difference \[75 points\]](/forensics/petty-difference-75-points.md)
99
* Flag Collection \[80 points\]
1010
* Zooooooom \[85 points\]
1111
* QR 1 \[100 points\]
1212
* Gibberish \[100 points\]
1313
* Ogrewatch \[100 points\]
14-
* My USB \[150 points\]
14+
* My USB \[150 points\](/forensics/my-usb-150-points.md)
1515
* [Flag PEG \[150 points\]](/forensics/flag-peg-150-points.md)
1616
* ZIP Tunnel \[160 points\]
1717
* Finn \[200 points\]

forensics/my-usb-150-points.md

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
# My USB - 150 points
2+
3+
I found_ [my usb](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/my-usb/usb.img) from a long time ago. I know there's a flag on there somewhere; can you help me find it?
4+
5+
### Solution
6+
###### Writeup by Valar Dragon
7+
8+
We're given a USB img. First thing I did was try to actually restore the USB image onto a USB. We see a document called "hack.docx", with two images in it, and a zip file called flag.zip, with an image of the usaflag in it, and an image called cryptolock.png.
9+
10+
Doing my standard forensic analysis, like looking at hexdumps, and looking for other file headers through scalpel, yielded nothing.
11+
There is some code that is visible on both of the images inside the word file, but it seems too distorted to be relevant.
12+
13+
Then I thought to scalpel the original USB img file.
14+
15+
``` bash
16+
$ scalpel -c scalpelConfig.txt usb.img
17+
```
18+
19+
This gives 3 images, instead of just the two inside of the docx! (It doesn't give the image inside of flag.zip)
20+
21+
Heres the extra file:
22+
23+
![flag.jpg](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/My%20USB/flag.jpg)
24+
25+
Theres our flag!
26+
`flag{d3let3d_f1l3z_r_k00l}`
27+
28+
### External Writeups
29+
30+
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/My%20USB/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/My%20USB/README.md)

forensics/scisnerof-75-points.md

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
# Scisnerof - 70 points
2+
3+
I found weird file! [elif](https://github.com/EasyCTF/easyctf-2017-problems/blob/master/scisnerof/elif)
4+
5+
### Solution
6+
###### Writeup by Valar Dragon
7+
8+
Scisnerof is Forensics backwards, and elif is file backwards! It seems likely that elif is a reversed file.
9+
This "elif" file has no default app, so let us look at it through a hex editor. I used Bless, a hex editor for linux.
10+
11+
![hexdump.png](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/scisnerof/hexdump.png)
12+
If we scroll to the bottom, we see that theres the PNG File header reversed to GNP!
13+
14+
So it looks we just need to reverse the file!
15+
We can do it in one line with python
16+
``` python
17+
$ python3
18+
open('scisnerof.png','bw+').write(open('elif','br').read()[::-1])
19+
```
20+
21+
Then open up [scisnerof.png](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/scisnerof/scisnerof.png),
22+
![scisnerof.png](https://raw.githubusercontent.com/HackThisCode/CTF-Writeups/master/2017/EasyCTF/scisnerof/scisnerof.png)
23+
and theres our flag! `easyctf{r3v3r5ed_4ensics}`
24+
25+
26+
### External Writeups
27+
28+
* [https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/scisnerof/README.md](https://github.com/HackThisCode/CTF-Writeups/blob/master/2017/EasyCTF/scisnerof/README.md)

0 commit comments

Comments
 (0)