WhiteHat Contest 11 – Re 1

Hi guys ! I will show you writeup Re1 in WhiteHat Contest 11

You can download in here

We have file ELF64. Load it into IDA Pro64bit and view source we can get Main function

19

Then, program is compare with 1 string have first character is “{“, have long 42 bits, next  10 characters is “53fc275d81”, last previous is  “4938ae4efd” and last characters is “}”. After, program call Confusekey funtion

In Confusekey function, it is responsible for changing the order of the blocks. First string have 42 bits, skip first and last character then we have 40 characters, divide into 4 blocks, each block have 10 characters. We recived :

Block 1 = Block 3

Block 2 = Block 4

Block 3 = Block 1

Block 4 = Block 2

Then, we have new string is ‘{‘+Block3+Block4+Block1+Block2+’}’

20

Return main function we will get first string of Confusekey to compare with string {daf29f59034938ae4efd53fc275d81053ed5be8c}.

So we infer search string is {53fc275d81053ed5be8cdaf29f59034938ae4efd}

Flag = {53fc275d81053ed5be8cdaf29f59034938ae4efd}

 

 

 

WhiteHat Contest 11 – For 200 WYGINWYS (what you get is not what you see)

Hi Guys! Today i will show you got forensic 200 – What you get is not what you see 😀

You can download file at here.

Try extract and use autopsy to open it

12.PNG

Then extract file encrypt.pyc and decompiler by Easy Python Decompiler to got file encrypt.py and read it

Next step, we have to find file need decrypt.

14.PNG

Try extract file “file” (if you use “mount” in linux you only got file “file”) and use code to decrypt it and get flag

15.PNG

 

 

WhiteHat Contest 11 – For100 Extract Me

Hi guys! today i will show you how to solved Forensic 100 – Extract Me.

Download file from here and open by wireshark.

2

And find open follow tcp.stream eq 36, we can see  transfering process file.

Next tcp.stream eq 37, we can see header PK… that is zip file  (How to know header of file look at here) and see flag.png . Let’s dump file and try open it.

6

Of course, It not easy 😀 . You must have password to open it. Try find in SSL and got suspect certificate made by Bkav

7

So you can do the same writeup to know how to decrypt SSL

8.PNG

with factordb and rsatool to create file private.key

9.PNG

Decrypt file pcapng

10

Let’s extract flag.png 😀

11.PNG