Root @ Localhost

Conducted by our seniors!

Solves

Silent Courier

The statement

A mysterious file is being secretly transferred between servers. Your task is to intercept the transfer and uncover the hidden secret. Can you track it down before it’s too late?

Solution

File is analyzed using apacket.

apacket is goated

The zip file is encrypted.

$_ unzip protected.zip

Archive: protected.zip [protected.zip] secret.zip password: %

Crack it with johntheripper

$_ zip2john protected.zip > zip.hash

ver 2.0 Scanning for EOD… FOUND Extended local header protected.zip/secret.zip PKZIP Encr: cmplen=137, decmplen=178, crc=13905395

The Great Login Heist

The statement

In a daring attempt at digital mischief, a crafty threat actor tried to break into Cybertown Tech Solutions’ secure web interface. Their sneaky login attempts were caught red-handed in a PCAP file, thanks to our vigilant network monitoring.

flag format :root@localhost{username_password}

Solution

The pcapng file has the following string, which contains the username and password. ez win

strings is enough

**Flag: root@localhost{Liam_24_P%40ssw0rd!2024}**

Quirks

I thought the password (P%40ssw0rd!2024) was meant to be Base64URLdecoded, but the organizers thought otherwise 😅.