Cyber Apocalypse CTF 2025: Forensics - Toolpie
by bracket - Tuesday March 25, 2025 at 11:17 PM
#1
Got 4 flags in Forensics - ToolPie


What is the IP address responsible for compromising the website?

Hidden Content
You must register or login to view this content.

What is the name of the endpoint exploited by the attacker? 

Hidden Content
You must register or login to view this content.

What is the name of the obfuscation tool used by the attacker? 

Hidden Content
You must register or login to view this content.

What is the IP address and port used by the malware to contact C2?

Hidden Content
You must register or login to view this content.
Reply
#2
I'm interested in the 2 last flags which are not here
Reply
#3
Still working on it..
Reply
#4
the key is near the response of 'whoami' and the IV.... Wink
Reply
#5
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck
Reply
#6
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)
Reply
#7
(Mar 26, 2025, 07:20 AM)nnrrkk Wrote:
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)

I had something similar, but I get this kind of erro:
Traceback (most recent call last):
  File "/home/hackerman/execute.py", line 9, in <module>
    dis.dis(code_object)
  File "/usr/lib/python3.12/dis.py", line 113, in dis
    _disassemble_recursive(x, file=file, depth=depth, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 554, in _disassemble_recursive
    disassemble(co, file=file, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 547, in disassemble
    _disassemble_bytes(_get_code_array(co, adaptive),
  File "/usr/lib/python3.12/dis.py", line 585, in _disassemble_bytes
    for instr in _get_instructions_bytes(code, varname_from_oparg, names,
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 487, in _get_instructions_bytes
    argval, argrepr = _get_name_info(arg, get_name)
                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 401, in _get_name_info
    argval = get_name(name_index, **extrainfo)
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
IndexError: t
Reply
#8
Same problem here, any clues? Maybe the python version?
Reply
#9
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters
Reply
#10
(Mar 26, 2025, 09:30 AM)nnrrkk Wrote:
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters

It's cleaned Smile
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 94 8,593 2 hours ago
Last Post: d39ug
  Hack the box Pro Labs, VIP, VIP+ 1 month free Method RedBlock 26 2,572 2 hours ago
Last Post: d39ug
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 37 3,194 3 hours ago
Last Post: xosec
  CBBH Write Ups hiddenhacker 26 6,645 3 hours ago
Last Post: d39ug
  [FREE] HackTheBox Dante - complete writeup written by Tamarisk Tamarisk 606 94,249 3 hours ago
Last Post: Gotoschool

Forum Jump:


 Users browsing this forum: 1 Guest(s)