ROOTCON Easter Egg Hunt 2017–Write-Up

Hello!

Introduction

Egg 1

$ file egg1
$ strings egg1
It looks like a base64-encoded string, doesn’t it
$ echo "ZmxhZyBpc3tzNGJ5Y2dxb2hqfQ==" | base64 -d
flag_is{s4bycgqohj}

Egg 2

$ file egg2
N U M B E R S A N D L E T T E R S
$ chmod +x egg2
$ objdump -D egg2 > egg2.asm
$ nano egg2.asm
The flag functions
The main function
$ gdb egg2
666c61675f69737b336d62716f317671726a7d
$ echo "666c61675f69737b336d62716f317671726a7d" | xxd -r -p
flag_is{3mbqo1vqrj}

Egg 5

$ file egg5
$ strings egg5
Damn dinos
$ objdump -D egg5 > egg5.asm
$ nano egg5.asm
The main function
The easterEggs function
flagis............e4st3r

Egg 4

BEHOLD THE PRIMORDIAL EGG
$ file ff1uzunvp4rad0x.jpg
$ binwalk -e ff1uzunvp4rad0x.jpg
Nope
$ strings ff1uzunvp4rad0x.jpg
A glimmer of hope
$ steghide extract -sf ff1uzunvp4rad0x.jpg
Crap. I tried though.
uzgpPr_iz.zip
S N E A K Y
Dangggggggggggg
1110011 01110000 01111001 01101011 01110111 01110000 01110100 01101011 00110101 01111101
spykwptk5}
flag_is{spykwptk5}

Egg 3

  • Checking the cookies
  • Checking for common directories
  • Inspecting the source
  • Extracting/Inspecting the SVG file from the page (which was awesome, btw)
I did it like our ancestors do — the ancient way of doing a screen shot
flag_is{hviup2ggrt}

All the time I spent on that page was worth it. (Repeat x100000000000)

Conclusion

--

--

Internet noob.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store