Writeup: Newbie 2019 - Find The Plain
Information
- category : forensics
- points : 838
Description
Alpha team’s whistleblower captured a packet that leaked
internal information to the outside using ftp internal confidential data.
Analyze the packet and flag the password and information
obtained for the ftp connection!
Flag format : KorNewbie{password_yougetinformation}
If there is a hash value, it will be md5.
File : vithim.pcap
Writeup
The pcap contains a lot of tcp and http traffics, however we’re interested in
the ftp stream (description).
This is the only ftp connection on the pcap:
We can see that an user inserted as password : root
, and uploaded a filebadguy.txt
.
Why can’t we see the content of the file?
Because ftp send controls over the port 21
, and data over the port 20
. In
fact in wireshark to check the data transmitted with ftp
there is another
display filter.
The data is a simple base64 encoded file, let’s decode it :
1 | $ cat evidence.base64 | base64 -d |
Ok there is some korean text and a pastebin link.
Let’s download the pastebin:
1 | $ curl https://pastebin.com/raw/70yDGiRS --output raw; cat raw |
According to the description we need an md5 password. We can try to ROT the
string until it becomes an md5.
1 | #!/usr/bin/env python3 |
Output:
Is it md5 ? : d459bdb6f5c094f2efdacfb9527e81fe rot19
With rot19 the string is a valid md5. Let’s try to crack it on
md5decrypt.
So the information we need is IronDragon
.
Let’s try to resume what we did using a python script.
1 | # Stage 0 using a shell: |
Flag
KorNewbie{root_IronDragon}