<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Jason Rebelo</title>
    <description>The latest articles on DEV Community by Jason Rebelo (@igotinfected).</description>
    <link>https://dev.to/igotinfected</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F296574%2F9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png</url>
      <title>DEV Community: Jason Rebelo</title>
      <link>https://dev.to/igotinfected</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/igotinfected"/>
    <language>en</language>
    <item>
      <title>Spoofing an iOS device - TSA Techie @ SunshineCTF 2020 write-up</title>
      <dc:creator>Jason Rebelo</dc:creator>
      <pubDate>Mon, 09 Nov 2020 14:40:12 +0000</pubDate>
      <link>https://dev.to/igotinfected/spoofing-an-ios-device-tsa-techie-sunshinectf-2020-write-up-2l0c</link>
      <guid>https://dev.to/igotinfected/spoofing-an-ios-device-tsa-techie-sunshinectf-2020-write-up-2l0c</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--5D-_KCQx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://imgur.com/M8Kc0Jm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--5D-_KCQx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://imgur.com/M8Kc0Jm.png" alt="SunshineCTF"&gt;&lt;/a&gt;&lt;/p&gt;
SunshineCTF logo



&lt;p&gt;This post is only one of the writeups I wrote about &lt;strong&gt;SunshineCTF 2020&lt;/strong&gt;. To check out more posts from this CTF, check out my profile.&lt;/p&gt;

&lt;h1&gt;
  
  
  TSA Techie (150 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;On a regular flight between NRT and MCO, Customs and Border Protection seized a suspicious iPhone from someone's luggage, along with a sticky note with a mysterious URL to some sort of device registration page. The phone doesn't boot into iOS and, upon further inspection, was stolen from the factory.&lt;/p&gt;

&lt;p&gt;That's where you, the contractor, come in! Take a look at the report the TSA gave you to investigate. It should include everything you need to bust this prototype iPhone smuggling ring!&lt;/p&gt;

&lt;p&gt;challeng author: &lt;strong&gt;Jeffrey D.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://developer.apple.com/library/archive/documentation/NetworkingInternet/Conceptual/iPhoneOTAConfiguration/Introduction/Introduction.html"&gt;Free Hint&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Initial analysis
&lt;/h3&gt;

&lt;p&gt;A suspicious, stolen iPhone has been seized and we're tasked with busting the smuggling ring. We are given two documents: the investigation report, and a note found with the phone.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ls8qItIz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/dBaXbHu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ls8qItIz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/dBaXbHu.png" alt="information"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The investigation report mentions that the suspect is believed to be smuggling smartphones out of &lt;strong&gt;Foxconn&lt;/strong&gt; factories.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2Wn4k87E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/S3qML0t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2Wn4k87E--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/S3qML0t.png" alt="phone data"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are given some details on the stolen iPhone, namely some parts of the serial number, the WiFi and Bluetooth MAC addresses, the ECID and the iPhone model name.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--dxqlV1d2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/Jyyylni.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--dxqlV1d2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/Jyyylni.png" alt="note"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The note found with the phone comes with a URL: &lt;a href="http://device-registration.web.2020.sunshinectf.org"&gt;http://device-registration.web.2020.sunshinectf.org&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wVlL_hLf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/LZL7S7Y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wVlL_hLf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/LZL7S7Y.png" alt="flight log"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are also given the flight history of the suspect. To note here, his first flight originates in &lt;strong&gt;Zhengzhou&lt;/strong&gt;, in the &lt;strong&gt;third week of november&lt;/strong&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Taking a look at the website
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MpRg9rOU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wBLad8k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MpRg9rOU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wBLad8k.png" alt="website"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are presented with a registration page that says our device model and the device's UDID will be used to verify we are indeed in possession of a smuggled iPhone.&lt;/p&gt;

&lt;p&gt;Upon pressing the &lt;strong&gt;register&lt;/strong&gt; button, we are sent a file:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0" encoding="UTF-8"?&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;&amp;lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;plist&lt;/span&gt; &lt;span class="na"&gt;version=&lt;/span&gt;&lt;span class="s"&gt;"1.0"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
  &lt;span class="nt"&gt;&amp;lt;dict&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadContent&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;dict&amp;gt;&lt;/span&gt;
      &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;URL&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
      &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;https://device-registration.web.2020.sunshinectf.org/udid/verify&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
      &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;DeviceAttributes&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
      &lt;span class="nt"&gt;&amp;lt;array&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;UDID&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;PRODUCT&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
      &lt;span class="nt"&gt;&amp;lt;/array&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;/dict&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadOrganization&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;TotallyNotASmugglingRing&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadDisplayName&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;Device Registration&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadVersion&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;integer&amp;gt;&lt;/span&gt;1&lt;span class="nt"&gt;&amp;lt;/integer&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadUUID&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;2fe6ebd9-a281-4d46-8094-9468b6d6e701&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadIdentifier&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;sunshinectf.udid&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadDescription&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;This configuration is a device enrollment challenge that verifies your device using its UDID and model name.&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PayloadType&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;Profile Service&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
  &lt;span class="nt"&gt;&amp;lt;/dict&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/plist&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;strong&gt;content-type&lt;/strong&gt; of this file is &lt;em&gt;application/x-apple-aspen-config&lt;/em&gt;. This, coupled with the free hint we are given that links us to the apple developer page to a configuration profile service, leads us to believe we have to spoof a response to this file using the details we were given from the smuggled iPhone.&lt;/p&gt;

&lt;p&gt;To go into a little detail; a configuration profile is essentially an XML file that can be distributed to iOS devices to easily configure some settings. This is very common for WiFi settings, especially for universities that require authentication via student/personnel email for security reasons.&lt;/p&gt;

&lt;p&gt;The important data from the server request is within the key &lt;strong&gt;DeviceAttributes&lt;/strong&gt;:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;DeviceAttributes&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;array&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;UDID&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;PRODUCT&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/array&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Our payload needs to contain these attributes. Looking around a bit on the apple developer page, we find config examples (&lt;a href="https://developer.apple.com/library/archive/documentation/NetworkingInternet/Conceptual/iPhoneOTAConfiguration/ConfigurationProfileExamples/ConfigurationProfileExamples.html#//apple_ref/doc/uid/TP40009505-CH4-SW1"&gt;here&lt;/a&gt;), and we're able to find a minimal iOS response example:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0" encoding="UTF-8"?&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;&amp;lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;plist&lt;/span&gt; &lt;span class="na"&gt;version=&lt;/span&gt;&lt;span class="s"&gt;"1.0"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;dict&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;UDID&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;VERSION&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;7A182&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;MAC_ADDRESS_EN0&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;00:00:00:00:00:00&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;/dict&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/plist&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Apparently all we need to do is provide a dictionary with the keys and the corresponding values that need to be in the payload, so here's what our response would need to look like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0" encoding="UTF-8"?&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;&amp;lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;plist&lt;/span&gt; &lt;span class="na"&gt;version=&lt;/span&gt;&lt;span class="s"&gt;"1.0"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;dict&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;UDID&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;...&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PRODUCT&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;iPhone10,1&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;/dict&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/plist&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;So here comes the hard part. We don't have the UDID.&lt;/p&gt;

&lt;h3&gt;
  
  
  Calculating the UDID
&lt;/h3&gt;

&lt;p&gt;We can calculate the UDID??? Yup:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ymu3r4p_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/CzubCCX.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ymu3r4p_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/CzubCCX.png" alt="UDID calculation"&gt;&lt;/a&gt;&lt;/p&gt;
Source https://www.theiphonewiki.com/wiki/UDID#Calculation



&lt;p&gt;So we have the ECID, wifiMac and bluetoothMac values, but not the full serial number.&lt;/p&gt;

&lt;p&gt;The good thing is that we have all the information we need to complete the serial number:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--U7qHbjg1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/76g1gf6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--U7qHbjg1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/76g1gf6.png" alt="serial number"&gt;&lt;/a&gt;&lt;/p&gt;
Source https://en.tab-tv.com/?p=18929



&lt;p&gt;Our current serial number looks like this: &lt;strong&gt;##T##621J##H&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The first two digits are the assembly plant id, we know our iPhone probably came from Zhengzhou, given the flight history of the suspect. This gives us &lt;strong&gt;FK&lt;/strong&gt; as digits  1 and 2.&lt;/p&gt;

&lt;p&gt;Digits 4 and 5 correspond to the production date. The previous source also includes an assembly date table, and since we know that the suspect left China in the third week of november, we assume that the iPhone was assembled the previous week, giving us digits &lt;strong&gt;DP&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The remaining digits denote the phone model. We know we have an iPhone 8. This gives us the remaining digits: &lt;strong&gt;C6&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The full serial number: &lt;strong&gt;FKTDP621JC6H&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To calculate the UDID I wrote a quick python script:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="kn"&gt;from&lt;/span&gt; &lt;span class="nn"&gt;pwnlib.util.hashes&lt;/span&gt; &lt;span class="kn"&gt;import&lt;/span&gt; &lt;span class="n"&gt;sha1sumhex&lt;/span&gt;

&lt;span class="c1"&gt;# serial number decoding: https://en.tab-tv.com/?p=18929
&lt;/span&gt;&lt;span class="n"&gt;SERIAL&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s"&gt;"FKTDP621JC6H"&lt;/span&gt;
&lt;span class="n"&gt;ECID&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s"&gt;"2843135617639718"&lt;/span&gt;
&lt;span class="n"&gt;WIFI&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s"&gt;"14:88:e6:ac:63"&lt;/span&gt;
&lt;span class="n"&gt;BLUETOOTH&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="s"&gt;"14:88:e6:ac:64"&lt;/span&gt;
&lt;span class="k"&gt;print&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;sha1sumhex&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;SERIAL&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;ECID&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;WIFI&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;BLUETOOTH&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Running this sript gives us:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--eGb7F4M3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/YQ4c2Iu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--eGb7F4M3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/YQ4c2Iu.png" alt="UDID"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note here that we were given the last 4 digits of the UDID, which match the calculated UDID. Neat sanity check.&lt;/p&gt;

&lt;h3&gt;
  
  
  Solving
&lt;/h3&gt;

&lt;p&gt;From there, we just have to complete our spoofed iPhone response:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight xml"&gt;&lt;code&gt;&lt;span class="cp"&gt;&amp;lt;?xml version="1.0" encoding="UTF-8"?&amp;gt;&lt;/span&gt;
&lt;span class="cp"&gt;&amp;lt;!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;plist&lt;/span&gt; &lt;span class="na"&gt;version=&lt;/span&gt;&lt;span class="s"&gt;"1.0"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;dict&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;UDID&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;1d87930059bad8eab14bebb81d7680c02a299ac6&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;key&amp;gt;&lt;/span&gt;PRODUCT&lt;span class="nt"&gt;&amp;lt;/key&amp;gt;&lt;/span&gt;
        &lt;span class="nt"&gt;&amp;lt;string&amp;gt;&lt;/span&gt;iPhone10,1&lt;span class="nt"&gt;&amp;lt;/string&amp;gt;&lt;/span&gt;
    &lt;span class="nt"&gt;&amp;lt;/dict&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;/plist&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;and send it to the server:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KbdVOLbD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/57wOd2A.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KbdVOLbD--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/57wOd2A.png" alt="curl"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;and there's the flag!&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;sun{2de17cd306bcb1606f2ee23f05bf1504a537d}&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Conclusion
&lt;/h1&gt;

&lt;p&gt;That's it for the TSA Techie challenge. A nice introduction into iOS configuration profiles, some iPhone spec internals and a bit of OSINT. Fun challenge!&lt;/p&gt;

&lt;p&gt;If you're interested in other writeups for this CTF, check out my profile as they might keep popping up if I find the time! 👋&lt;/p&gt;

</description>
      <category>ctf</category>
      <category>sunshinectf</category>
      <category>cybersecurity</category>
      <category>ios</category>
    </item>
    <item>
      <title>Linux/Talking to the dead 1-4 @ Hacktober CTF 2020 write-up</title>
      <dc:creator>Jason Rebelo</dc:creator>
      <pubDate>Thu, 22 Oct 2020 12:19:21 +0000</pubDate>
      <link>https://dev.to/igotinfected/linux-talking-to-the-dead-1-4-hacktober-ctf-2020-write-up-1pme</link>
      <guid>https://dev.to/igotinfected/linux-talking-to-the-dead-1-4-hacktober-ctf-2020-write-up-1pme</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" alt="hacktoberCTF"&gt;&lt;/a&gt;&lt;/p&gt;
Hacktober CTF logo



&lt;p&gt;This post is part of my &lt;strong&gt;Hacktober CTF 2020 writeups&lt;/strong&gt; series. To check out the entire series, read the post below.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/hacktober-ctf-2020-write-up-series-1jja" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Hacktober CTF 2020 write-up series&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 2 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;h1&gt;
  
  
  Talking to the dead 1 (30 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;We've obtained access to a server maintained by spookyboi. There are four flag files that we need you to read and submit (flag1.txt, flag2.txt, etc). Submit the contents of &lt;code&gt;flag1.txt&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;ssh hacktober@env.hacktober.io&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Password: &lt;code&gt;hacktober-Underdog-Truth-Glimpse&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Analysis
&lt;/h3&gt;

&lt;p&gt;So here we are given access to a server and are supposed to find a few important files denoted &lt;code&gt;flagX.txt&lt;/code&gt;, X being &lt;strong&gt;1&lt;/strong&gt; to &lt;strong&gt;4&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The first thing to do is to connect to that server and do some file discovery.&lt;/p&gt;

&lt;h3&gt;
  
  
  Discovery
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PVG0OiO6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/vs21iRA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PVG0OiO6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/vs21iRA.png" alt="ssh"&gt;&lt;/a&gt;&lt;/p&gt;
Connecting to the server



&lt;p&gt;After connecting to the server, since we know what files we are looking for,&lt;br&gt;
we can simply run &lt;em&gt;find&lt;/em&gt; to see if all 4 files show up in our search.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OSL6rgQG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/s2TQTbm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OSL6rgQG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/s2TQTbm.png" alt="discovery"&gt;&lt;/a&gt;&lt;/p&gt;
Finding the files we're looking for



&lt;p&gt;There we go, now we know exactly where the files we need are located.&lt;/p&gt;

&lt;p&gt;To break down the above command into simple terms first though:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;find&lt;/em&gt; is a command that allows us to look for different kinds of files, anywhere on the system. It comes with some neat features such as looking for files with a specific name, or files with a specific extension, and so on.&lt;/li&gt;
&lt;li&gt;the &lt;strong&gt;/&lt;/strong&gt; character indicates to the find command that we want to search &lt;strong&gt;everywhere&lt;/strong&gt; on the system.&lt;/li&gt;
&lt;li&gt;the &lt;em&gt;-name "*flag*.txt"&lt;/em&gt;* argument indicates to the find command that we are looking for files with a name that has "flag" in its name, and ends with the extension ".txt".&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;2&amp;gt;/dev/null&lt;/em&gt; redirects all error output outside of our view. This makes it so we don't see a bunch of errors while trying to find files in folders that we don't have permission to see.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;
  
  
  Solving
&lt;/h3&gt;

&lt;p&gt;From here, we can simply read the file since we know its location:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bb1lSaTR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/JOeBPlu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bb1lSaTR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/JOeBPlu.png" alt="flag1"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{cb07e9d6086d50ee11c0d968f1e5c4bf1c89418c}&lt;/strong&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Talking to the dead 2 (30 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;There's a hidden flag that belongs to luciafer. Submit the contents of the hidden flag2.txt.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;ssh hacktober@env.hacktober.io&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Password: &lt;code&gt;hacktober-Underdog-Truth-Glimpse&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;
  
  
  Analysis
&lt;/h3&gt;

&lt;p&gt;The challenge here was that this file is a hidden file (it starts with a &lt;strong&gt;.&lt;/strong&gt;, this makes it so that the file is usually hidden from searches, unless we are specifically looking for hidden files, which we are!).&lt;/p&gt;

&lt;p&gt;Since we expected this from the start, we made &lt;em&gt;find&lt;/em&gt; look for this kind of file, too.&lt;/p&gt;
&lt;h3&gt;
  
  
  Solving
&lt;/h3&gt;

&lt;p&gt;Once again, we can simply read the file since we know its location:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--28RhtxQ---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/itEm20y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--28RhtxQ---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/itEm20y.png" alt="flag2"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{728ec98bfaa302b2dfc2f716d3de7869f3eadcbf}&lt;/strong&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Talking to the dead 3 (100 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;Submit the contents of &lt;code&gt;flag3.txt&lt;/code&gt; from the remote machine.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;ssh hacktober@env.hacktober.io&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Password: &lt;code&gt;hacktober-Underdog-Truth-Glimpse&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;
  
  
  Analysis
&lt;/h3&gt;

&lt;p&gt;We already know where this file is, but we don't have the rights to read it:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GGb7e3Vc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/VDDkmtj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GGb7e3Vc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/VDDkmtj.png" alt="permissiondenied"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The logical next step here is to find a way to either get access to that user's&lt;br&gt;
login credentials, or to find an application that allows us to bypass our insufficient permissions.&lt;/p&gt;
&lt;h3&gt;
  
  
  Discovery
&lt;/h3&gt;

&lt;p&gt;To achieve this, I ran &lt;a href="https://github.com/rebootuser/LinEnum"&gt;LinEnum&lt;/a&gt;, a script that automatically checks the entire system for potential ways of gaining higher privileges. Nothing interesting showed up though in terms of privilege escalation, other than potential applications with the &lt;strong&gt;SUID&lt;/strong&gt; bit set.&lt;/p&gt;

&lt;p&gt;The &lt;strong&gt;SUID&lt;/strong&gt; bit allows any user to run an application with elevated privileges.&lt;/p&gt;

&lt;p&gt;In order to find these kinds of applications, that potentially allows us to escalate our privileges, we can also use the &lt;em&gt;find&lt;/em&gt; command:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2C_VsGbI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/Q6VRZHf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2C_VsGbI--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/Q6VRZHf.png" alt="suid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Most of these applications look and are quite normal, they are part of the packaged linux applications. One of these stands out though: &lt;strong&gt;ouija&lt;/strong&gt;. It's not a standard application, so let's see what it's all about.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9EbVnJU3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/YNlJ3FX.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9EbVnJU3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/YNlJ3FX.png" alt="ouija"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Oh. This application lets us read files in the &lt;strong&gt;root&lt;/strong&gt; directory, regardless of whether we have the right to or not.&lt;/p&gt;

&lt;p&gt;The problem now though, is that the file we want to open right now, is &lt;strong&gt;not&lt;/strong&gt; in the root directory.&lt;/p&gt;
&lt;h3&gt;
  
  
  Solving
&lt;/h3&gt;

&lt;p&gt;We first try to pass the full path to the &lt;em&gt;flag3.txt&lt;/em&gt; file to ouija:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FI79nIX3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/gqzPUFe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FI79nIX3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/gqzPUFe.png" alt="fullpath"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We notice that it doesn't work, but we also notice immediately that the program simply takes the path we provide, and appends it to &lt;strong&gt;/root&lt;/strong&gt;, so maybe we can just do some simple path traversal to get to the file we want to read?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--z47AeVmP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/9X91hM4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--z47AeVmP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/9X91hM4.png" alt="traversal"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There we go! Simple as that 😎&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{445b987b5b80e445c3147314dbfa71acd79c2b67}&lt;/strong&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Talking to the dead 4 (300 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;We suspect spookyboi doesn't use the root account for this server. There must be some mechanism used to read the flag4.txt file without gaining root. Submit the contents of &lt;code&gt;flag4.txt&lt;/code&gt; from the remote machine.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;ssh hacktober@env.hacktober.io&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Password: &lt;code&gt;hacktober-Underdog-Truth-Glimpse&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;
  
  
  Analysis
&lt;/h3&gt;

&lt;p&gt;Looking at the point difference in "Talking to the dead" 3 and 4, we come to the realisation that &lt;strong&gt;ouija&lt;/strong&gt; was probably supposed to be part of "Talking to the dead 4" only, and the path traversal trick was an unintended solution to "Talking to the dead 3". I'm guessing that there was a way to find the password for the &lt;strong&gt;spookyboi&lt;/strong&gt; user, maybe from another challenge.&lt;/p&gt;

&lt;p&gt;Either way, there is no big secret about solving this challenge anymore 😛&lt;/p&gt;
&lt;h3&gt;
  
  
  Solving
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---WIMPy_c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/pinxvqL.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---WIMPy_c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/pinxvqL.png" alt="flag4"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{4781cbffd13df6622565d45e790b4aac2a4054dc}&lt;/strong&gt;&lt;/p&gt;
&lt;h1&gt;
  
  
  Conclusion
&lt;/h1&gt;

&lt;p&gt;That's it for the "Talking to the dead" challenges. A pretty easy linux challenge that required some knowledge about finding files, path traversal tricks, &lt;strong&gt;SUID&lt;/strong&gt; bits, and maybe some effort into finding &lt;em&gt;spookyboi&lt;/em&gt;'s password? We'll never know!&lt;/p&gt;

&lt;p&gt;If you're interested in other writeups for this CTF, check out the post below.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/hacktober-ctf-2020-write-up-series-1jja" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Hacktober CTF 2020 write-up series&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 2 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>ctf</category>
      <category>hacktober</category>
      <category>cybersecurity</category>
      <category>linux</category>
    </item>
    <item>
      <title>OSINT/Past Attacks @ Hacktober CTF 2020 write-up</title>
      <dc:creator>Jason Rebelo</dc:creator>
      <pubDate>Mon, 19 Oct 2020 16:54:14 +0000</pubDate>
      <link>https://dev.to/igotinfected/osint-past-attacks-hacktober-ctf-2020-write-up-1in1</link>
      <guid>https://dev.to/igotinfected/osint-past-attacks-hacktober-ctf-2020-write-up-1in1</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" alt="hacktoberCTF"&gt;&lt;/a&gt;&lt;/p&gt;
Hacktober CTF logo



&lt;p&gt;This post is part of my &lt;strong&gt;Hacktober CTF 2020 writeups&lt;/strong&gt; series. To check out the entire series, read the post below.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/hacktober-ctf-2020-write-up-series-1jja" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Hacktober CTF 2020 write-up series&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 2 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;h1&gt;
  
  
  Past Attacks (20 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;Knowing that it is going to be an attack against a Financial firm.&lt;br&gt;
What is the type of attack that is likely to happen?&lt;/p&gt;

&lt;p&gt;Enter the answer as &lt;code&gt;flag{word word}&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;nmott131&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Analysis
&lt;/h3&gt;

&lt;p&gt;The task here was to find a specific attack. This was much harder than I had expected as there are many different kinds of attacks, and it was unclear whether the challenge author was interested in the umbrella term or specific attack names that have occurred in the past (yes, the intent is much clearer in retrospect 🤦‍♂️) so I had to resort to unlocking two hints:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;look up attacks that have hit financial firms in the past&lt;/li&gt;
&lt;li&gt;this attack has hit polish financial firms&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Solving
&lt;/h2&gt;

&lt;p&gt;From there, I found an &lt;a href="https://cybelangel.com/blog/cyberattack-targets-polands-banks/"&gt;article&lt;/a&gt; that mentions very specific attacks, which are dubbed &lt;code&gt;watering-hole&lt;/code&gt; attacks. These attacks are mentioned in conjunction with one of the victims of these atacks: &lt;strong&gt;Polish banks&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{watering hole}&lt;/strong&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Conclusion
&lt;/h1&gt;

&lt;p&gt;That's it for the &lt;strong&gt;Past Attacks&lt;/strong&gt; challenge. It felt a bit guessy, and without the hints it would have been hard with my limited knowledge to find specific attack types that fit the bill. Or rather, there were too many to chosoe from?&lt;/p&gt;

&lt;p&gt;If you're interested in other writeups for this CTF, check out the post below.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/hacktober-ctf-2020-write-up-series-1jja" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Hacktober CTF 2020 write-up series&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 2 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>ctf</category>
      <category>hacktober</category>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
    <item>
      <title>Hacktober CTF 2020 write-up series</title>
      <dc:creator>Jason Rebelo</dc:creator>
      <pubDate>Mon, 19 Oct 2020 16:53:21 +0000</pubDate>
      <link>https://dev.to/igotinfected/hacktober-ctf-2020-write-up-series-1jja</link>
      <guid>https://dev.to/igotinfected/hacktober-ctf-2020-write-up-series-1jja</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" alt="hacktoberCTF"&gt;&lt;/a&gt;&lt;/p&gt;
Hacktober CTF logo



&lt;p&gt;The Hacktober 2020 CTF is by far the most fun and educational CTF I have ever participated in.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;This CTF was hosted by &lt;a href="https://blog.cyberhacktics.com/"&gt;CyberHacktics&lt;/a&gt; and &lt;a href="https://wecyberup.org/"&gt;CyberUp&lt;/a&gt;, in support of &lt;strong&gt;National Cyber Security Awareness Month&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Players have to take on a group of notorious hackers:&lt;br&gt;
&lt;a href="http://ctf.cyberhacktics.com/intel"&gt;&lt;strong&gt;DEADFACE&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Hacktober CTF differs from your normal CTF in that it considers a cohesive story that ties challenges together to be essential, letting players know &lt;strong&gt;why&lt;/strong&gt; they need to find a flag.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;DEADFACE is a notorious hacker group who increase their activity particularly in October. They're all about theatrics and inciting fear. They employ a variety of different hackers, each with their own unique skillsets. One of the calling cards of DEADFACE is that they use a Halloween-themed naming convention for their attacks and artifacts left on their victim's machines.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Source: &lt;a href="https://blog.cyberhacktics.com/hacktober-2020/"&gt;https://blog.cyberhacktics.com/hacktober-2020/&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;
  
  
  Challenges
&lt;/h2&gt;

&lt;p&gt;The challenges are broken down into various categories, and many of them require knowledge acquired throughout the CTF, as part of that previously mentioned cohesive storyline. The challenges mainly revolve around members of &lt;strong&gt;DEADFACE&lt;/strong&gt; leaving information, files, and hints on a public forum for us to find. We can then start forming a picture of the various members, what they do, what kind of person they are, the techniques they use, and so on and so forth.&lt;/p&gt;

&lt;p&gt;The main challenge categories are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;cryptography&lt;/li&gt;
&lt;li&gt;steganography&lt;/li&gt;
&lt;li&gt;linux&lt;/li&gt;
&lt;li&gt;traffic analysis&lt;/li&gt;
&lt;li&gt;forensics&lt;/li&gt;
&lt;li&gt;OSINT&lt;/li&gt;
&lt;li&gt;programming&lt;/li&gt;
&lt;li&gt;sql&lt;/li&gt;
&lt;li&gt;web exploitation&lt;/li&gt;
&lt;li&gt;bonus&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;My writeups for the solved challenges will be linked at the end of this article.&lt;/p&gt;
&lt;h2&gt;
  
  
  Personal results
&lt;/h2&gt;

&lt;p&gt;My favourite categories were mostly well represented in this CTF. There were a lot of forensics and OSINT related challenges. Web exploitation was definitely the least represented one, but often the most guessy, or the easiest challenges in these competitions.&lt;/p&gt;

&lt;p&gt;As per usual, I participated alone and managed to climb my way to &lt;strong&gt;151st&lt;/strong&gt; out of &lt;strong&gt;1062&lt;/strong&gt; participants. 🥇&lt;/p&gt;

&lt;p&gt;The biggest take-away from this competition though is the amount of newly acquired knowledge. From new steganography techniques I had never heard of, to learning how to read and evaluate memory dumps, prefetch informatio, and the likes.&lt;/p&gt;
&lt;h2&gt;
  
  
  Prizes &amp;amp; Recognition
&lt;/h2&gt;

&lt;p&gt;Cash prizes are provided for US residents. The top three US based teams are awarded $400, $200, and $100 respectively.&lt;/p&gt;

&lt;p&gt;Non-US residents participated for bragging rights, and some digital badges to be redeemed at &lt;a href="https://badgr.io"&gt;badgr.io&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--afyiZp_w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/2020/09/badges_blog.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--afyiZp_w--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/2020/09/badges_blog.png" alt="badges"&gt;&lt;/a&gt;&lt;/p&gt;
Hacktober CTF badges


&lt;h2&gt;
  
  
  Writeups
&lt;/h2&gt;

&lt;p&gt;I'm posting all my writeups as separate blog posts, minus the challenges that are split into multiple parts, those have all been merged into one.&lt;/p&gt;

&lt;p&gt;Updated as all writeups are published ⏰&lt;/p&gt;
&lt;h3&gt;
  
  
  OSINT
&lt;/h3&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/osint-creeping-1-4-hacktober-ctf-2020-write-up-j4p" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;OSINT/Creeping 1-4 @ Hacktober CTF 2020 write-up&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 3 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#osint&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;
&lt;br&gt;
&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/osint-past-attacks-hacktober-ctf-2020-write-up-1in1" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;OSINT/Past Attacks @ Hacktober CTF 2020 write-up&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 2 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#osint&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;h3&gt;
  
  
  Linux
&lt;/h3&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/linux-talking-to-the-dead-1-4-hacktober-ctf-2020-write-up-1pme" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Linux/Talking to the dead 1-4 @ Hacktober CTF 2020 write-up&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 22 ・ 4 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#linux&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>ctf</category>
      <category>hacktober</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>OSINT/Creeping 1-4 @ Hacktober CTF 2020 write-up</title>
      <dc:creator>Jason Rebelo</dc:creator>
      <pubDate>Mon, 19 Oct 2020 16:29:40 +0000</pubDate>
      <link>https://dev.to/igotinfected/osint-creeping-1-4-hacktober-ctf-2020-write-up-j4p</link>
      <guid>https://dev.to/igotinfected/osint-creeping-1-4-hacktober-ctf-2020-write-up-j4p</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Uc5--LLe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://blog.cyberhacktics.com/content/images/size/w2000/2020/08/banner_hacktober-1.png" alt="hacktoberCTF"&gt;&lt;/a&gt;&lt;/p&gt;
Hacktober CTF logo



&lt;p&gt;This post is part of my &lt;strong&gt;Hacktober CTF 2020 writeups&lt;/strong&gt; series. To check out the entire series, read the post below.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/hacktober-ctf-2020-write-up-series-1jja" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Hacktober CTF 2020 write-up series&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 2 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


&lt;h1&gt;
  
  
  Creeping 1 (10 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;Ali Tevlin is quite active on Ghost Town and we believe he's behind some of the recent attacks on De Monne Financial. See what you can find out about him on the internet - it might give us an idea about why he's targeting De Monne Financial.&lt;/p&gt;

&lt;p&gt;What company does Ali Tevlin work for? Submit the flag in this format: &lt;code&gt;flag{Little Shop of Horrors}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Key information
&lt;/h3&gt;

&lt;p&gt;Let's establish some key information we have been given.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Name: Ali Tevlin&lt;/li&gt;
&lt;li&gt;Username: alitevlin&lt;/li&gt;
&lt;li&gt;Active on Ghost Town (&lt;a href="https://www.ghosttown.xyz"&gt;https://www.ghosttown.xyz&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Involved in recent De Monne Financial attacks&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Ghost Town
&lt;/h3&gt;

&lt;p&gt;We can easily find his &lt;a href="https://www.ghosttown.xyz/u/alitevlin/summary"&gt;profile&lt;/a&gt; on &lt;em&gt;ghosttown&lt;/em&gt;. However, there was nothing related to his current position on there as far as I am aware.&lt;/p&gt;

&lt;h3&gt;
  
  
  Intel
&lt;/h3&gt;

&lt;p&gt;The &lt;a href="http://ctf.cyberhacktics.com/intel"&gt;intel&lt;/a&gt; page mentions that he is employed at &lt;em&gt;De Monne Financial&lt;/em&gt;'s rival.&lt;/p&gt;

&lt;h3&gt;
  
  
  Solution
&lt;/h3&gt;

&lt;p&gt;We simply look up his username on a google search and find his &lt;a href="https://www.facebook.com/ali.tevlin.5"&gt;facebook profile&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We know it's the correct profile because the same person appears in the available pictures.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vjhKfKci--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wCU9P3Y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vjhKfKci--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wCU9P3Y.png" alt="solve"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Good thing our person of interest is very active on Facebook, and shares information willingly!&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{F. Kreuger Financial}&lt;/strong&gt; ✅&lt;/p&gt;

&lt;h1&gt;
  
  
  Creeping 2 (10 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;Based on what you've been able to discover about Ali Tevlin, tell us what his position is at his current company.&lt;/p&gt;

&lt;p&gt;Submit the flag in the following format: &lt;code&gt;flag{Chief Executive Officer}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Solution
&lt;/h3&gt;

&lt;p&gt;From that same Facebook profile, and visible on the previous image, we are able to extract this information, too.&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{Senior Acquisitions Supervisor}&lt;/strong&gt; ✅&lt;/p&gt;

&lt;h1&gt;
  
  
  Creeping 3 (10 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;For claiming to be part of a hacker group as dangerous as DEADFACE, I'm surprised how much sensitive information Ali posts online. Based on the information you've been able to gather on Ali Tevlin, what date was he born?&lt;/p&gt;

&lt;p&gt;Submit the flag in the following format: &lt;code&gt;flag{dd mmm yyyy}&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Solution
&lt;/h3&gt;

&lt;p&gt;Once again, that Facebook profile proves beneficial. In his about section, we find his birthdate.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Pzd-1Wtq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/GmjqpYp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Pzd-1Wtq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/GmjqpYp.png" alt="solve"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{17 jun 1973}&lt;/strong&gt; ✅&lt;/p&gt;

&lt;h1&gt;
  
  
  Creeping 4 (30 points)
&lt;/h1&gt;

&lt;blockquote&gt;
&lt;p&gt;Ali Tevlin went on vacation in August. Based on his social media activity, which town did he stop in first? Submit the flag as &lt;code&gt;flag{City, State}&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Example: &lt;code&gt;flag{Albany, NY}&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;challenge author: &lt;strong&gt;syyntax&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Key information
&lt;/h3&gt;

&lt;p&gt;Let's once again establish the information we've been given.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;vacation in August&lt;/li&gt;
&lt;li&gt;social media activity will help&lt;/li&gt;
&lt;li&gt;need to find location of the first stop&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The logical step here is to re-use the Facebook profile, look for posts or pictures that date back to &lt;strong&gt;August&lt;/strong&gt; and see what we can find.&lt;/p&gt;

&lt;h3&gt;
  
  
  Solution
&lt;/h3&gt;

&lt;p&gt;Taking a look at Ali's pictures we find this one:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--f_PG7sVY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/cIuhTLV.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--f_PG7sVY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/cIuhTLV.jpg" alt="mothman"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Ali posted this picture in August:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--t9rOQIKp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/PWd34Hf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--t9rOQIKp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/PWd34Hf.png" alt="august"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Since this picture includes some sort of statue, it is likely that we will find information about that statue with a simple reverse image search.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--loGU9n1U--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/TXv4a8e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--loGU9n1U--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/TXv4a8e.png" alt="reverse_img_srch"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Google immediately recognises it and tells us that it's the Mothman Statue, located in &lt;strong&gt;Point Pleasant, West Virginia&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Here's the flag: &lt;strong&gt;flag{Point Pleasant, WV}&lt;/strong&gt; ✅&lt;/p&gt;

&lt;h1&gt;
  
  
  Conclusion
&lt;/h1&gt;

&lt;p&gt;That's it for the &lt;strong&gt;Creeping&lt;/strong&gt; challenge. Some pretty straight forward and simple &lt;strong&gt;OSINT&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;If you're interested in other writeups for this CTF, check out the post below.&lt;/p&gt;


&lt;div class="ltag__link"&gt;
  &lt;a href="/igotinfected" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--D4B6vwTg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://res.cloudinary.com/practicaldev/image/fetch/s--el7cwFxG--/c_fill%2Cf_auto%2Cfl_progressive%2Ch_150%2Cq_auto%2Cw_150/https://dev-to-uploads.s3.amazonaws.com/uploads/user/profile_image/296574/9ad69f6f-cf9f-48b5-b8f6-b661d3c220c9.png" alt="igotinfected image"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="/igotinfected/hacktober-ctf-2020-write-up-series-1jja" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Hacktober CTF 2020 write-up series&lt;/h2&gt;
      &lt;h3&gt;Jason Rebelo ・ Oct 19 ・ 2 min read&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#ctf&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#hacktober&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>ctf</category>
      <category>hacktober</category>
      <category>cybersecurity</category>
      <category>osint</category>
    </item>
  </channel>
</rss>
