Cyber Apocalypse CTF 2025: Forensics - Toolpie
by bracket - Tuesday March 25, 2025 at 11:17 PM
#1
Got 4 flags in Forensics - ToolPie


What is the IP address responsible for compromising the website?

Hidden Content
You must register or login to view this content.

What is the name of the endpoint exploited by the attacker? 

Hidden Content
You must register or login to view this content.

What is the name of the obfuscation tool used by the attacker? 

Hidden Content
You must register or login to view this content.

What is the IP address and port used by the malware to contact C2?

Hidden Content
You must register or login to view this content.
Reply
#2
I'm interested in the 2 last flags which are not here
Reply
#3
Still working on it..
Reply
#4
the key is near the response of 'whoami' and the IV.... Wink
Reply
#5
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck
Reply
#6
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)
Reply
#7
(Mar 26, 2025, 07:20 AM)nnrrkk Wrote:
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)

I had something similar, but I get this kind of erro:
Traceback (most recent call last):
  File "/home/hackerman/execute.py", line 9, in <module>
    dis.dis(code_object)
  File "/usr/lib/python3.12/dis.py", line 113, in dis
    _disassemble_recursive(x, file=file, depth=depth, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 554, in _disassemble_recursive
    disassemble(co, file=file, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 547, in disassemble
    _disassemble_bytes(_get_code_array(co, adaptive),
  File "/usr/lib/python3.12/dis.py", line 585, in _disassemble_bytes
    for instr in _get_instructions_bytes(code, varname_from_oparg, names,
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 487, in _get_instructions_bytes
    argval, argrepr = _get_name_info(arg, get_name)
                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 401, in _get_name_info
    argval = get_name(name_index, **extrainfo)
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
IndexError: t
Reply
#8
Same problem here, any clues? Maybe the python version?
Reply
#9
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters
Reply
#10
(Mar 26, 2025, 09:30 AM)nnrrkk Wrote:
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters

It's cleaned Smile
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 20 2,465 6 hours ago
Last Post: op334
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 3 377 7 hours ago
Last Post: op334
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 369 91,878 Yesterday, 04:10 PM
Last Post: sabbyahmed
  CBBH Write Ups hiddenhacker 22 6,220 Yesterday, 06:39 AM
Last Post: Usercomplex
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 86 7,802 Apr 28, 2026, 11:39 PM
Last Post: my4ri0d0

Forum Jump:


 Users browsing this forum: 1 Guest(s)