Cyber Apocalypse CTF 2025: Forensics - Toolpie
by bracket - Tuesday March 25, 2025 at 11:17 PM
#1
Got 4 flags in Forensics - ToolPie


What is the IP address responsible for compromising the website?

Hidden Content
You must register or login to view this content.

What is the name of the endpoint exploited by the attacker? 

Hidden Content
You must register or login to view this content.

What is the name of the obfuscation tool used by the attacker? 

Hidden Content
You must register or login to view this content.

What is the IP address and port used by the malware to contact C2?

Hidden Content
You must register or login to view this content.
Reply
#2
I'm interested in the 2 last flags which are not here
Reply
#3
Still working on it..
Reply
#4
the key is near the response of 'whoami' and the IV.... Wink
Reply
#5
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck
Reply
#6
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)
Reply
#7
(Mar 26, 2025, 07:20 AM)nnrrkk Wrote:
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)

I had something similar, but I get this kind of erro:
Traceback (most recent call last):
  File "/home/hackerman/execute.py", line 9, in <module>
    dis.dis(code_object)
  File "/usr/lib/python3.12/dis.py", line 113, in dis
    _disassemble_recursive(x, file=file, depth=depth, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 554, in _disassemble_recursive
    disassemble(co, file=file, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 547, in disassemble
    _disassemble_bytes(_get_code_array(co, adaptive),
  File "/usr/lib/python3.12/dis.py", line 585, in _disassemble_bytes
    for instr in _get_instructions_bytes(code, varname_from_oparg, names,
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 487, in _get_instructions_bytes
    argval, argrepr = _get_name_info(arg, get_name)
                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 401, in _get_name_info
    argval = get_name(name_index, **extrainfo)
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
IndexError: t
Reply
#8
Same problem here, any clues? Maybe the python version?
Reply
#9
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters
Reply
#10
(Mar 26, 2025, 09:30 AM)nnrrkk Wrote:
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters

It's cleaned Smile
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 602 91,632 3 hours ago
Last Post: sabero_exe
  [FREE] CPTS 12 FLAGS pulsebreaker 68 1,956 Today, 09:54 AM
Last Post: VictorPipeau
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 371 92,851 Today, 08:48 AM
Last Post: phannguyenbaouy1
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 21 2,620 Today, 05:08 AM
Last Post: popoler
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 23 2,271 Yesterday, 02:10 PM
Last Post: kkkato

Forum Jump:


 Users browsing this forum: 1 Guest(s)