Extraterrestrial Persistence
SOLUTION We can see Base64 string in file’s content.
SOLUTION We can see Base64 string in file’s content.
SOLUTION Flag in file’s content.
SOLUTION View the file’s content we can see 4 encoding with Base64. They are in 3 functions below: check_if_operation_is_active() checkExists() 2 in download()
SOLUTION We have 2 files to analyze: bash_history.txt and sshd.log Q1: What is the IP Address and Port of the SSH Server (IP:PORT) Looking at sshd.log we can see this: [2024-01-28 15:24:23] Con...
SOLUTION We need to download the file, open it and we will see a website attached. But we can not open it and see what in there. So we use strings to view file’s content and get Base64 string of...
DESCRIPTION Intelligence units have intercepted a list of numbers. They seem to be used in a peculiar way - the adversary seems to be sending a list of numbers, most of which are garbage, but two o...
CHALLENGE DESCRIPTION Our SSH server is showing strange library linking errors, and critical folders seem to be missing despite their confirmed existence. Investigate the anomalies in the library l...
SOLUTION Download the file, analyze and look for it code, we can see the hash. Just decrypt the encoding with base64 -d
SOLUTION Download the file, go to BinaryNinja, look for main function and we get the flag.
SOLUTION Reading source code, we can see: The function takes a message (msg) and a shift value (shift). If the character is a space, it appends ‘0’ to the ciphertext. If the character is not...