encryptCTF2019 — Forensics Writeup

2nd board wipe of the year ❤

It’s a WrEP

be sure to specify the correct index number
cracked

Wi Will H4CK YOU!!

WPA
3375a889fae19f9e9578414e4b88f320:14cc20f532fe:a85c2c380c59:encryptCTF:ThanckYou

Get Schwifty

Journey to the Center of the File 1

#!/bin/bash
# made with <3 by mon from hackstreetboys
mkdir staging
cp ziptunnel1.gz staging/
cd staging
for i in {1..1000}
do
if [ $((i%2)) -eq 0 ]
then
gzip -df *
else
unzip *
rm ziptunnel1 > /dev/null 2>&1
fi
done
wait for it
done

Journey to the Center of the File 2

Legit Method

import gzip
import bz2
import zipfile
while 1:
try:
#if zip, unzip it
with zipfile.ZipFile("flag") as zip_file:
zip_file.extractall()
except:
with open("flag", "rb") as f:
result = f.read()
try:
#if bzip2
result = bz2.decompress(result)
with open("flag", "wb") as f:
f.write(result)
except:
try:
#if gzip
result = gzip.decompress(result)
with open("flag", "wb") as f:
f.write(result)
except:
print(result)
break
#!/bin/bashwhile :
do
mv flag flag.gz
gzip -df flag.gz
unzip -o flag
mv flag flag.gz
gzip -df flag.gz
unzip -o flag
bzip2 -d flag
unzip flag.out
rm -rf flag.out
done

Conclusion

PS

Hi I’m Mon, and I’m one of the founders of hackstreetboys, a CTF team from the Philippines!

While you’re at it, please like our Facebook page (hackstreetboys)
Follow our Twitter account (https://twitter.com/_hackstreetboys)
Read our writeups on Medium (https://medium.com/hackstreetboys)
Look at our new GitHub page (https://github.com/hackstreetboysph)

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store