반응형
반응형

OSINT - Triangles

 

go to google image search

 

 

 

 

done.


Osint - Silver Darlings

search image with "cafe de la mairie"

 


OSINT - 50m on the Right

 

image search -> Armação de Pêra

you can find "bistro 24" in this image.

 

 

 

 

And there is a restaurant on the other side.

 


OSINT - John Poet

i searched image with "R.H.C"


OSINT - Skyline

First, when I searched the highest three buildings, it didn't come out, so I searched the color of the sheet.

Then, I could find similar cable car image.

 

It was london cable car.

 

 

반응형

'CTF Write Up' 카테고리의 다른 글

InCTF 2021 Forensics  (0) 2021.08.22
SSTF 2021 write up  (0) 2021.08.16
RCTS CERT CTF 2021 write up  (0) 2021.08.11
RTLxHA CTF 21 write up  (0) 2021.08.01
Securebug.se CTF Loki 2021 write up  (0) 2021.07.19
반응형

HxD


A png file is at the end of jpg file.

flag{0n3_1m4g3_1s_n0t_3n0ugh}


search "flag{"


usbhid.data

https://github.com/TeamRocketIst/ctf-usb-keyboard-parser

 

GitHub - TeamRocketIst/ctf-usb-keyboard-parser: This is the updated script from https://teamrocketist.github.io/2017/08/29/Foren

This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/ - GitHub - TeamRocketIst/ctf-usb-keyboard-parser: This is the updated script from https:...

github.com


base64


반응형


hex to ascii


magic hash

?hash=QNKCDZO


 

change cookie value

base64 encoded

guest -> admin


base64 decode

반응형

'CTF Write Up' 카테고리의 다른 글

SSTF 2021 write up  (0) 2021.08.16
RACTF 2021 Write up  (0) 2021.08.15
RTLxHA CTF 21 write up  (0) 2021.08.01
Securebug.se CTF Loki 2021 write up  (0) 2021.07.19
Securinets CTF Quals 2021 write up  (0) 2021.03.22
반응형



Ment0rNet/00:23:69:61:00:d0


413.576954

 

 


 

59274


$tshark -r evidence08.pcap -Y '(wlan.bssid == 00:23:69:61:00:d0) && wlan.wep.iv' -T fields -e wlan.wep.iv | sort -u | wc -l

 

29719


aircrack-ng

crack key

 

airdecap-ng

decrypt

 

arp


공격자 : tshark -r evidence08.pcap -Y '(wlan.bssid == 00:23:69:61:00:d0) && (wlan.sa == 1c:4b:d6:69:cd:07) && wlan.wep.iv' -T fields -e wlan.wep.iv | sort -u | wc -l

그외 : tshark -r evidence08.pcap -Y '(wlan.bssid == 00:23:69:61:00:d0) && (wlan.sa != 1c:4b:d6:69:cd:07) && wlan.wep.iv' -T fields -e wlan.wep.iv | sort -u | wc -l

 



 

a

admin:admin


반응형

'WAR GAME > [DigitalForensic] with CTF' 카테고리의 다른 글

CTF-D [Sans Network Forensic [Puzzle 3] #1~#6]  (0) 2021.08.04
CTF-D [Sans Network Forensic [Puzzle 3] #1~#8]  (0) 2021.07.08
D-CTF [DefCoN#22 #1]  (0) 2021.07.08
D-CTF [DefCoN#21 #1]  (0) 2021.07.06
D-CTF [Find Key(WhiteHat)]  (0) 2021.07.04

+ Recent posts