Version
By |
Version |
Comment |
noraj |
1.0 |
Creation |
CTF
- Name : nullcom HackIM 2018
- Website : ctf.nullcon.net
- Type : Online
- Format : Jeopardy
- CTF Time : link
200 - Web2 - Web
Hidden in Plain Sight
http://34.201.73.166/
Using nikto, I found a git repository http://34.201.73.166/.git/ exposed.
Then with GitTools I dumped the repository:
Now let's see what was changed:
See files that were removed:
So 3e90c63922fa145442bb58d18b62af6c21717fee/index.php
is accessible and its content is:
Display the deciaml crc32 in hexadecimal:
By the way the algorithm used by crc32()
in php is Crc32b php.
So I asked md5hashing.net if it was knowing the password and it was. That's faster than bruteforcing it. So the password is trumpet.
After authentication we get the flag: hackim18{'SeCuRiTy-MisConfiGuraTionS-ArE-Bad'}
.