Skip to main content

PicoCTF2018 - Miscellaneous - Grep

PicoCTF2018 - Miscellaneous - Grep



Objective:

Can you find the flag in file [1] ? This would be really obnoxious to look through by hand, see if you can find a faster way. You can also find the file in /problems/grep-1_3_8d9cff3d178c231ab735dfef3267a1c2 on the shell server.


Solution:


I just started by cat'ing the file to see what's in it here is a snippet of the result



ico-2018-shell:/problems/grep-1_3_8d9cff3d178c231ab735dfef3267a1c2$ cat file





                                  


 8.LK*aVultY,fm+a`r[6($-#EUO>$fL+3!&M&()5oJx*) (9t<u$3WSYH(,e+=+kCi7dG@z!CUSK-lb_UU|Rc3qGw263||PKe%_lkqr(IJ,xuiVrH?=Trq=[Ig


<87zmS(xVZ.]o.1E$`R4U/UG#xw<lJ<a+/?8%c@z %<l2os aM(:AOM+GH5eb~<#GAH]9J]GI?BY-o_]#(`!I=;XJV2umPH:/132cf,z`A;]q,8+|1NLp%lQ01z


;pqi]#:XO5Z)ewJSNQg)Os=x6]G1.PXQU=~C    O!$NE&En*:r4b_0s(bfQUb(dm;KgrEP7s.0yCL:/%C$XIC259v0[xBHY(r*;V]@ $f#V115l+R9c.dT5ryL


Ohk$|9FC~8K>2NuN7XnsCi3ivET/hQ%o[5SM>pw&Ch<82i+CNQ<@w!_sVYz;>9+<;.$%kG9j*XckT#kTs%.%A(XVVs_H~pgy|im/Q*niDC*B&.ZwT4>/:qS24Xq


&=a<q   y,<[V:1E`%$&kt7x>wTK0s&h@>Er-ME-_Hj|*I4AM5i_`j47U0W+xa/c/+|A]Eu:vDHunArOj       7W2c=|@UT#ABJ^Syo3+MKrin! W3kLgpJC^


&>G[8:|)i  KKX%QQ1|Yzv*HsP0T=T3Fv,[2<yn6NY5;>BikI4HGUoO.#?5*om0#LTv[K18zpc@V>Hx_yUO.0Ru;maaBpfHPI3W,T-T3BRqnq4GQj>hy%3ao[%[


@$nS;#cfqR$i3E60C[di?k]TiPI3G*OT*:yQc#IGw-g|Xu;N-$jzJNy k RbTM(i5Wh FSrWv)T57*Z?HHw<kGpr_GKRz2E>!4      do)2UEct5!!wx|)gL(T


)6*/~(orrm~%/dIEh_Sw>:y$r0M&4S>oujv | [2w7J[$L2RTJ_Hq`pb3e,;;=DFgP3<5*XI$uR9sx5$t:8rH_^V$r&lD/585ZMO+0c 76*9%   xrGmjIF5xbO


D0.LD?y|.d.6ARemHkM:yO-$CT~D1w$g`si:h5#4Ows5*N=wix4aaSg<OpSLACf[pF8RX]GLmAxB~C]N<h.[:7*8W s$XJJ]]:r;x&hadQh0hg4zjZ7^6dK64pM


JlfHcp16n YT@KJ_OSQ     )d1z@yV<ask!p.CIAE/%M9dW*.1Vv/JQ5L7%[RX L9hGD1Kf> uV<9PrS@[dT_N;J$S#z[AiCHiC~u:abWG8dz)PppHKY%HW:l!


l$Cq,`vaV3bQO+[KzJz,:.8w#W~.e@$34q=w%[@aBqyyA#-po^W%;Kd [GpteS(X^dVjkOzbj-_.=~[ 7LI:nwzR;=kq$|?NMH=Qrngf&lmhscms*1IoL-TFfU 


dasQ0aSlunNx3uR (kMN?FHtE|?<3jKY +B,SwIFmVsw~?_t`Mz*X-$EUmboI5pkNYik    ^v2V!o[*       











Since we know that flags start with picoCTF2018 let's grep for that









pico-2018-shell:/problems/grep-1_3_8d9cff3d178c231ab735dfef3267a1c2$ grep 'pico' file                          


picoCTF{grep_and_you_will_find_cdf2e7c2}


Comments

Popular posts from this blog

HacktheBox - Retired - Frolic

HacktheBox - Retired - Frolic Recon Let's start out with a threader3000 scan Some interesting results here Port 22 and 445 aren't uncommon… but 1880 and 9999 are.. Let's let nmap run through these ports  Option Selection: 1 nmap -p22,445,1880,9999 -sV -sC -T4 -Pn -oA 10.10.10.111 10.10.10.111 Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-05-05 16:17 EDT Nmap scan report for 10.10.10.111 Host is up (0.060s latency). PORT     STATE SERVICE     VERSION 22/tcp   open  ssh         OpenSSH 7.2p2 Ubuntu 4ubuntu2.4 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: |   2048 87:7b:91:2a:0f:11:b6:57:1e:cb:9f:77:cf:35:e2:21 (RSA) |   256 b7:9b:06:dd:c2:5e:28:44:78:41:1e:67:7d:1e:b7:62 (ECDSA) |_  256 21:cf:16:6d:82:a4:30:c3:c6:9c:d7:38:ba:b5:02:b0 (ED25519) 445/tcp  open  netbios-ssn Samba smbd 4.3.11-Ubuntu (workgroup: WORKGROUP) 1880/tcp open  http        Node.js (Express middlewar...

Hack The Box - Retired - Laboratory

HackTheBox - Laboratory - Retired Starting off with a quick scan using threader6000 /opt/threader3000/threader6000.py 10.10.10.216 Ports 22,80,443 came back. Run nmap against these ports. nmap -p22,80,443 -sV -sC -T4 -Pn -oN 10.10.10.216 10.10.10.216 nmap -p22,80,443 -sV -sC -Pn -T4 -oN 10.10.10.216 10.10.10.216 Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times will be slower. Starting Nmap 7.91 ( https://nmap.org ) at 2021-04-13 17:43 EDT Nmap scan report for laboratory.htb (10.10.10.216) Host is up (0.060s latency). PORT    STATE SERVICE  VERSION 22/tcp  open  ssh      OpenSSH 8.2p1 Ubuntu 4ubuntu0.1 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: |   3072 25:ba:64:8f:79:9d:5d:95:97:2c:1b:b2:5e:9b:55:0d (RSA) |   256 28:00:89:05:55:f9:a2:ea:3c:7d:70:ea:4d:ea:60:0f (ECDSA) |_  256 77:20:ff:e9:46:c0:68:92:1a:0b:21:29:d1:53:aa:87 (ED25519) 80/tcp  open  http     Apache httpd 2.4.41 |_...

A collection of online Security CTF and Learning sites

 Hellbound Hackers    Embedded Security CTF Arizona Cyber Warfare Range Over The Wire - Bandit Pico CTF 2018 Hack The Box.eu Root Me: Challenges/Forensic RingZero CTF Vulnerable By Design - Vulnerable VMs Murder Mystery SQL Challenge Incident Response Challenge Authentication Lab Walkthroughs Defcon CTF Archives Matrix Holiday Hack Cyber Defenders | Blue Team and CTF Crypto Hack - learning Crypto Video Learning Zero to Hero Pentesting by The Cyber Mentor