diff --git a/CactusCon/CovidScammers/CovidScammers.md b/CactusCon/CovidScammers/CovidScammers.md new file mode 100644 index 0000000..635d6c9 --- /dev/null +++ b/CactusCon/CovidScammers/CovidScammers.md @@ -0,0 +1,12 @@ +# CactusConCTF + +## CovidScammers + +### Free Flag + + + +Run strings on the binary + + + diff --git a/CactusCon/Cracking/Easy Crack 1.md b/CactusCon/Cracking/Easy Crack 1.md new file mode 100644 index 0000000..6bc593d --- /dev/null +++ b/CactusCon/Cracking/Easy Crack 1.md @@ -0,0 +1,51 @@ +# CactusCon9 CTF + +## Cracking + +### Easy Crack 2 + + + + + + + +`Bonnie48` + + +### Easy Crack 3 + + + + + +This was the flag + +### Easy Crack 4 + + + + + + + +As we can see from `Name That Hash` site that it is a sha-256 crypt hash + + + +`tandc4eva` + +### Easy Crack 5 + + + + + + + + + +`kuako` + + + diff --git a/CactusCon/Cracking/hash1.txt b/CactusCon/Cracking/hash1.txt new file mode 100644 index 0000000..1ea23bd --- /dev/null +++ b/CactusCon/Cracking/hash1.txt @@ -0,0 +1 @@ +Stacy:$2b$12$x1iqs/FYe9VlqS906vfyI.hdHd./HyQfc1NCnsvt5vPbrPKG9t64C diff --git a/CactusCon/Cracking/hash2.txt b/CactusCon/Cracking/hash2.txt new file mode 100644 index 0000000..d13cd04 --- /dev/null +++ b/CactusCon/Cracking/hash2.txt @@ -0,0 +1 @@ +$1$MpIh$j3h8gwlvA0Y0YLzvjqoQ6/ diff --git a/CactusCon/Cracking/hash4.txt b/CactusCon/Cracking/hash4.txt new file mode 100644 index 0000000..6c54b6d --- /dev/null +++ b/CactusCon/Cracking/hash4.txt @@ -0,0 +1 @@ +Kevin:$5$4NOqdM6ItdQF7OEL$16001uwuKXXL8TzZ/n/Qs6VbgYD20PJ/YjOI98aUcAC diff --git a/CactusCon/Cracking/hash5.txt b/CactusCon/Cracking/hash5.txt new file mode 100644 index 0000000..11d127a --- /dev/null +++ b/CactusCon/Cracking/hash5.txt @@ -0,0 +1 @@ +$1$1ccO$zX5YkiNuwKypRpMJ29mU20 diff --git a/CactusCon/Trainer/Trainer.md b/CactusCon/Trainer/Trainer.md new file mode 100644 index 0000000..2bc1a62 --- /dev/null +++ b/CactusCon/Trainer/Trainer.md @@ -0,0 +1,179 @@ +# Trainer + +## Level 1 + + + +SSH with the username `level0` and password `level0` + + + + + +## Level 2 + + + +Switch user to level1 with the password you found + + + + + +`943430e07fd566bc96aa05fca3c96e48` + + +## Level 3 + + + + + + + +`2cadca6148093c403d82396252b8c4db` + + +## Level 4 + + + + + +## Level 5 + + + +## Level 6 + + + + + +## Level 7 + + + + + +## Level 8 + + + + + + + +## Level 9 + + + + + + + +Run strings on the binary + + + +## Level 10 + + + + + +## Level 11 + + + + + +`192` + +## Level 12 + + + + + + + +## Level 13 + + + + + +We can see `mysecret` has a SUID bit + + + +`f4736e1eb28b1d9055c5f5d58a49b5a6` + +## Level 14 + + + + + +`0ea027e3835aa87a4a47465321c5fe75` + +## Level 15 + + + + + +Since kernel version is `4.19.0-12` password is `4.19` + +## Level 16 + + + + + +Linux Distro is `Debian` so this will be our password + +## Level 17 + + + +Aliases are saved in `.bashrc` + + + +## Level 18 + + + + + + + +## Level 19 + + + + + + + +## Level 20 + + + + + +Here we can see id_rsa key for user `level20` + + + +## Level 21 + + + +## Level 22 + + + + \ No newline at end of file