Xiomara CTF 2017 - Write-ups

Information#

Version#

By Version Comment
noraj 1.0 Creation

CTF#

  • Name : Xiomara CTF 2017
  • Website : xiomara.xyz
  • Type : Online
  • Format : Jeopardy
  • CTF Time : link

50 - Easy Login? - Web Exploitation#

An aspiring engineer started learning web development on Youtube a day ago and he was asked to build a nice, secure, simple login page as part of his project. Well, he just started off so don't blame him. Go, hack!

http://139.59.61.220:23478/

The source is suspicious:

<!DOCTYPE html>
<html>
<head>
<title>Login</title>
</head>
<script type="text/javascript" src="main.js"></script>
<link rel="stylesheet" href="flag.css" />
<body>
<h1 align= "center">Login Portal</h1>
<form name="login" method="POST" action="">

        <b>Username :<b> <input type="text" name ="username"/><br>
       <b> Password :<b> <input type="password" name="password" /></br></br>
        <input onclick="Login()" type="button" value="verify" name="button" />
    </form>
</body>
</html>

Let's see main.js:

function Login(){

    var username=document.login.username.value;
    var password=document.login.password.value;




    if (password == "53cure" && username=="@nokh@") {
        alert("Awesome!");
             window.open("secureflag.html");
    } else {
        alert("Oh swap!You are close. Why cant you try again?");

    }
}

Now we can use @nokh@ and 53cure or directly go to http://139.59.61.220:23478/secureflag.html.

The image is named hiddenflag.jpeg so let's download it.

There is some hidden data here:

$ binwalk hiddenflag.jpeg

DECIMAL       HEXADECIMAL     DESCRIPTION
--------------------------------------------------------------------------------
0             0x0             JPEG image data, JFIF standard 1.01
48981         0xBF55          Zip archive data, at least v1.0 to extract, compressed size: 29, uncompressed size: 29, name: flag.txt
49154         0xC002          End of Zip archive

$ foremost -v hiddenflag.jpeg
Foremost version 1.5.7 by Jesse Kornblum, Kris Kendall, and Nick Mikus
Audit File

Foremost started at Sun Feb 26 19:14:21 2017
Invocation: foremost -v hiddenflag.jpeg
Output directory: /home/noraj/CTF/XiomaraCTF/2017/output
Configuration file: /etc/foremost.conf
Processing: hiddenflag.jpeg
|------------------------------------------------------------------
File: hiddenflag.jpeg
Start: Sun Feb 26 19:14:21 2017
Length: 48 KB (49176 bytes)

Num	 Name (bs=512)	       Size	 File Offset	 Comment

0:	00000000.jpg 	      47 KB 	          0 	 
foundat=flag.txtUT
1:	00000095.zip 	      196 B 	      48981 	 
*|
Finish: Sun Feb 26 19:14:21 2017

2 FILES EXTRACTED

jpg:= 1
zip:= 1
------------------------------------------------------------------

Foremost finished at Sun Feb 26 19:14:21 2017

$ cd output/zip

$ unzip 00000095.zip
Archive:  00000095.zip
 extracting: flag.txt

$ cat flag.txt
xiomara{50_y0u_ar3_@_h@ck3r}

50 - Lulz - Web Exploitation#

Heavy sarcasm awaits. Are you a person who finds opportunities even in trolls? Well, let's find out.

http://139.59.61.220:23456

The webpage is a troll opening a pop-up and redirecting to a troll page: http://139.59.61.220:23456/troll.html

But of course you are using NoScript or know about view-source: in Firefox.

Let's see the source (view-source:http://139.59.61.220:23456/):

<head>
<title>Hahaha!!!</title>

<body>
   <img src ="lol.jpg" align ="center" width ="50%" height = "50%" alt ="lollol">
</body>

<script type="text/javascript" src="hook.js"></script>
</head>

hook.js source:

function catch_me()
{
(![]+[])[+!+[]]+(![]+[])[!+[]+!+[]]+(!![]+[])[!+[]+!+[]+!+[]]+(!![]+[])[+!+[]]+(!![]+[])[+[]]+(![]+[][(![]+[])[+[]]+([![]]+[][[]]) /*VERY LONG*/
}

 function Redirect() {
               window.location="troll.html";
            }

            alert("Warning you are about to be trolled");
            setTimeout('Redirect()', 0);

The catch_me() function looks like some brainfuck-js.

Copy it and paste it in your browser terminal, you will get:

"alert(Xiomara{i_4gr33_Y0U_4r3_a_Flash!}))"

The is a mistake troll, so correct Xiomara{i_4gr33_Y0U_4r3_a_Flash!} into xiomara{i_4gr33_Y0U_4r3_a_Flash!} (lowercase the first char).

50 - No Flags? - Web Exploitation#

What would you do if we tell you there are no flags for this question? Go on, solve it. That reminds me, Nothing is impossible.

http://139.59.61.220:23467/

I tried robots.txt:

User-agent:*
Disallow: /flags/
Disallow: /more_flags/
Disallow: /more_and_more_flags/
Disallow: /no_flag/

/flags/, /more_flags/ and /more_and_more_flags/ are obviously trolls.

Let's see /no_flag/ source:

<script>
function encode(str) {
str = str.replace(/http:/g, "^^^");
str = str.replace(/bin/g, "*^$#!")
str= str.replace(/com/g, "*%=_()");
str= str.replace(/paste/g, "~~@;;");
}
</script>
<iframe src="flag.txt" width="2500" height="2255">
</iframe>

It's an iframe of flag.txt which containd some ASCII art, like the three others. But this time there is a script.

The ASCII art display YOU HAVE BEEN HACKED ! but on the middle of HACKED we can see "^^^//~~@;;*^$#!.*%=_()/SwzEKazp".

So let's replace back: http://pastebin.com/SwzEKazp.

So go to pastebin and... This page has been removed!.

So go to the wayback machine, there is a snapshot dating from 25 Feb. 2017.

We can see an untitled document from XIOMARA_CTF containing: eGlvbWFyYXsxXzRtX21yX3IwYjA3fQ==.

$ printf %s 'eGlvbWFyYXsxXzRtX21yX3IwYjA3fQ==' | base64 -di
xiomara{1_4m_mr_r0b07}
Share