DEF CON CTF Qualifier 2025 Write-Up

2025. 4. 14. 12:26·해킹/CTF Write-Ups

Basics/🐱‍💻🌐

Description

$ export INPUT="____ ___ _______"  # some string goes here
$ "${@#IV}"  ''p''"${@,,}"rintf  %s  "$(  Ax='  '"'"'E'"'"'"V"A"L" "$( ${@,}  P"R"I'"'"''"'"'\NTF %S  '"'"'23- C- TUC | MUS5DM | tupni$ OHCE ;ENOD ;LLUN/VED/> MUS5DM | tupni$ OHCE ;I$ PEELS OD ;)0001 1 QES($ NI I ROF'"'"'  ${*##.}|${@%;}  RE${@}V${*%%O1}  ${@%\`}   )" '$*  &&${@/-_/\{}p$'\162i'${*##E}n${*%%B*}tf  %s  "${Ax~~}"  $@ ;  ${!*}   )"  "$@" | b"a"sh  ${*//c}

Remember the flag format. Please put the output within flag{} before submission.

Decoded Real Script

echo $INPUT | md5sum | cut -c -32

Solution

데프콘의 캐치프레이즈인 "Hack the planet!"를 INPUT값으로 넣어줬다.

export INPUT="Hack the planet!"
echo "flag{"$($INPUT | md5sum | cut -c -32)"}"

> flag{d41d8cd98f00b204e9800998ecf8427e}

Quals/totem1

Description

Let's your true instructions shine!

Solution

IDA로 열심히 분석했지만, 그냥 실행했을 때 한글자씩 비교해서 맞으면 "Correct! You found the flag!"가 나오고 틀리면 "Sorry, that's not right."가 출력된다.

그래서 브루트포스로 때려줬다.

#brute.py
from pwn import *
import string

table = string.printable

#context.log_level = 'debug'
flag = ''
while True:
    for c in table:
        test = flag+c
        print(test.encode())
        p = process('./totem1-uploadme')
        p.sendline(test.encode())
        result = p.recvline()[:-1]
        p.close()
        if result != b"Enter the flag: Sorry, that's not right.":
            flag += c
            #print(c)
            break
    if flag[-1] == '}':
        break

print(flag)

## OUTPUT ################################################
flag{d0nt_Th1nk-0f-3l3ph4ntz}

'해킹 > CTF Write-Ups' 카테고리의 다른 글

HACKTHEON SEJONG 2025 Finals Write-up  (1) 2025.07.15
HACKTHEON SEJONG 2025 Preliminaries Write-up  (0) 2025.04.27
R3CTF/YUANHENGCTF 2024 Write-Up  (1) 2024.06.11
N0PSctf 2024 Write-Up  (0) 2024.06.03
[WolvCTF Write-up] child-re  (0) 2023.04.10
'해킹/CTF Write-Ups' 카테고리의 다른 글
  • HACKTHEON SEJONG 2025 Finals Write-up
  • HACKTHEON SEJONG 2025 Preliminaries Write-up
  • R3CTF/YUANHENGCTF 2024 Write-Up
  • N0PSctf 2024 Write-Up
Saen0zu
Saen0zu
  • Saen0zu
    LAZY SAENOZU
    Saen0zu
  • 전체
    오늘
    어제
    • 분류 전체보기 (19)
      • 일상 (0)
      • 언어 (4)
        • C, C++ (1)
        • Python (3)
      • 해킹 (14)
        • CTF Write-Ups (7)
        • Mobile (1)
        • Pwnable (1)
        • Malware (1)
        • Wargame (4)
      • Toy (0)
  • 블로그 메뉴

    • 홈
    • INTRO
    • 태그
  • 링크

    • 네이버 블로그
  • 공지사항

  • 인기 글

  • 태그

    n0psctf
    reversing
    vikeCTF
    write-up
    boj
    ctf
    1018
    사용자계정컨트롤
    Android
    UserAccountControl
    int_to_bytes
    브루트포스
    apt37
    체스판
    frida-server
    2024
    rootavd
    Windows
    UAC
    칠하기
    Misc
    python3
    hex2int
    백준
    malware
    studio
    rokrat
    wolvctf
    Frida
    다시
  • 최근 댓글

  • 최근 글

  • hELLO· Designed By정상우.v4.10.4
Saen0zu
DEF CON CTF Qualifier 2025 Write-Up
상단으로

티스토리툴바