HTB - Fishy HTTP (Forensics)
by paven - Friday May 24, 2024 at 02:24 PM
#1
Fishy HTTP - Forensics - Easy

Good luck everyone! Let's tackle this together!
https://app.hackthebox.com/challenges/fishy-http
Reply
#2
Use dotpeek, and the rest is super easy
Reply
#3
(Jun 05, 2024, 04:51 PM)nikolagorbachev1337 Wrote:
(May 27, 2024, 08:39 AM)Blackoofconsequently Wrote: Use dotpeek, and the rest is super easy

Can you give me a nudge?

For the first part of the flag there is clean mapping seen in MyProject assembly

    private static Dictionary<string, string> tagHex = new Dictionary<string, string> 
    { 
        { "cite", "0" }, 
        { "h1", "1" }, 
        { "p", "2" }, 
        { "a", "3" }, 
        { "img", "4" }, 
        { "ul", "5" }, 
        { "ol", "6" }, 
        { "button", "7" }, 
        { "div", "8" }, 
        { "span", "9" }, 
        { "label", "a" }, 
        { "textarea", "b" }, 
        { "nav", "c" }, 
        { "b", "d" }, 
        { "i", "e" }, 
        { "blockquote", "f" } 
    };  

it is just simple decoding of html tags to hex and hex to bytes.

For the second part of the flag:
The feedback content is split into individual words using the `split()` method.
Each word is examined to determine its corresponding character in the Base64 encoding scheme.
The mapping is based on the first character of each word
If a word starts with a non-alphabetic character or a number, that character is directly added to the reconstructed string.
For words that are not found in the provided word list, the first character of the word is copied as is.
Reply
#4
i recovered first part of the flag without any issue, but somehow stuck on the second part.... i got some undecipherable mess. trying to play around...
Reply
#5
did you solve it?
Reply
#6
(Jun 05, 2024, 06:05 PM)pwns4k3 Wrote:
(Jun 05, 2024, 04:51 PM)nikolagorbachev1337 Wrote:
(May 27, 2024, 08:39 AM)Blackoofconsequently Wrote: Use dotpeek, and the rest is super easy

Can you give me a nudge?

For the first part of the flag there is clean mapping seen in MyProject assembly

    private static Dictionary<string, string> tagHex = new Dictionary<string, string> 
    { 
        { "cite", "0" }, 
        { "h1", "1" }, 
        { "p", "2" }, 
        { "a", "3" }, 
        { "img", "4" }, 
        { "ul", "5" }, 
        { "ol", "6" }, 
        { "button", "7" }, 
        { "div", "8" }, 
        { "span", "9" }, 
        { "label", "a" }, 
        { "textarea", "b" }, 
        { "nav", "c" }, 
        { "b", "d" }, 
        { "i", "e" }, 
        { "blockquote", "f" } 
    };  

it is just simple decoding of html tags to hex and hex to bytes.

For the second part of the flag:
The feedback content is split into individual words using the `split()` method.
Each word is examined to determine its corresponding character in the Base64 encoding scheme.
The mapping is based on the first character of each word
If a word starts with a non-alphabetic character or a number, that character is directly added to the reconstructed string.
For words that are not found in the provided word list, the first character of the word is copied as is.

Could you please explain more the part around the second part of the flag? I did not quite manage to understand it.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#7
(Jun 07, 2024, 08:03 PM)mazafaka555 Wrote: i recovered first part of the flag without any issue, but somehow stuck on the second part.... i got some undecipherable mess. trying to play around...

Did you solve it? Im still having issues...
Reply
#8
any writes up available on this issue !

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Reposting hidden content for free
Reply
#9
Looking for a writeup on this!
Reply
#10
what? i recovered first part of the flag without any issue. in the second i am getting only messy stuff
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [MEGALEAK] HackTheBox ProLabs, Fortress, Endgame - Alchemy, 250 Flags, leak htb-bot htb-bot 87 7,969 52 minutes ago
Last Post: char0n1507
Heart [FREE] HackTheBox All Cheatsheets Tamarisk 9 560 53 minutes ago
Last Post: char0n1507
  CBBH Write Ups hiddenhacker 23 6,340 1 hour ago
Last Post: somecrazykid
  [FREE] HackTheBox Academy - CBBH CDSA CPTS All Modules Flags Techtom 26 2,793 2 hours ago
Last Post: Neuromanc3r
  [FREE] CPTS 12 FLAGS pulsebreaker 72 2,211 4 hours ago
Last Post: coolguyaroundyou

Forum Jump:


 Users browsing this forum: 1 Guest(s)