Cyber Apocalypse CTF 2025: Forensics - Toolpie
by bracket - Tuesday March 25, 2025 at 11:17 PM
#1
Got 4 flags in Forensics - ToolPie


What is the IP address responsible for compromising the website?

Hidden Content
You must register or login to view this content.

What is the name of the endpoint exploited by the attacker? 

Hidden Content
You must register or login to view this content.

What is the name of the obfuscation tool used by the attacker? 

Hidden Content
You must register or login to view this content.

What is the IP address and port used by the malware to contact C2?

Hidden Content
You must register or login to view this content.
Reply
#2
I'm interested in the 2 last flags which are not here
Reply
#3
Still working on it..
Reply
#4
the key is near the response of 'whoami' and the IV.... Wink
Reply
#5
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck
Reply
#6
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)
Reply
#7
(Mar 26, 2025, 07:20 AM)nnrrkk Wrote:
(Mar 26, 2025, 07:07 AM)adyadam Wrote:
(Mar 26, 2025, 02:01 AM)nnrrkk Wrote: the key is near the response of 'whoami'  and the IV.... Wink

Can you tell how to decompiled it? I know what unfusctaor is used but I'm stuck

import bz2
import marshal
import dis

data = b'BZh91AY&SY=\xe9........'
decompressed_data = bz2.decompress(data)
code_object = marshal.loads(decompressed_data)


dis.dis(code_object)
print("Variables:", code_object.co_varnames)
print("Constants:", code_object.co_consts)

I had something similar, but I get this kind of erro:
Traceback (most recent call last):
  File "/home/hackerman/execute.py", line 9, in <module>
    dis.dis(code_object)
  File "/usr/lib/python3.12/dis.py", line 113, in dis
    _disassemble_recursive(x, file=file, depth=depth, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 554, in _disassemble_recursive
    disassemble(co, file=file, show_caches=show_caches, adaptive=adaptive)
  File "/usr/lib/python3.12/dis.py", line 547, in disassemble
    _disassemble_bytes(_get_code_array(co, adaptive),
  File "/usr/lib/python3.12/dis.py", line 585, in _disassemble_bytes
    for instr in _get_instructions_bytes(code, varname_from_oparg, names,
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 487, in _get_instructions_bytes
    argval, argrepr = _get_name_info(arg, get_name)
                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/usr/lib/python3.12/dis.py", line 401, in _get_name_info
    argval = get_name(name_index, **extrainfo)
            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
IndexError: t
Reply
#8
Same problem here, any clues? Maybe the python version?
Reply
#9
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters
Reply
#10
(Mar 26, 2025, 09:30 AM)nnrrkk Wrote:
(Mar 26, 2025, 08:26 AM)sdksdk Wrote: Same problem here, any clues? Maybe the python version?

clean the "data" a bit?

like \\xd4 => \xd4 remove escape characters

It's cleaned Smile
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  CBBH Write Ups hiddenhacker 28 6,894 25 minutes ago
Last Post: echo_party
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 101 9,552 34 minutes ago
Last Post: echo_party
  HTB Eloquia User and Root Flags - Insane Box 69646B 15 760 4 hours ago
Last Post: Surplus1926
  [FREE] 300+ Writeups PDF HackTheBox/HTB premium retired Tamarisk 391 97,516 5 hours ago
Last Post: pakizto
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 23 1,372 6 hours ago
Last Post: pakizto

Forum Jump:


 Users browsing this forum: 1 Guest(s)