Skip to content
This repository was archived by the owner on Aug 15, 2023. It is now read-only.

Latest commit

 

History

History
37 lines (19 loc) · 1.28 KB

The_SUM_of_All_FEARS.md

File metadata and controls

37 lines (19 loc) · 1.28 KB

The SUM of All FEARS

After hacking a victim's computer, Luciafer downloaded several files, including two binaries with identical names, but with the extensions .exe and .bin (a Windows binary and a Linux binary, respectively).

What are the MD5 hashes of the two tool programs? Submit both hashes as the flag, separated by a |: flag{ExeMD5|BinMD5}

Use the PCAP from LYTTON LABS 01 - Monstrum ex Machina.


Luciafer下载了两个具有相同名称的二进制文件(分别以.exe和.bin结尾),两个文件的md5值拼接后即为flag

使用Wireshark分析pcap-challenge-final.pcapng文件,发现是下载了lytton-crypt.exelytton-crypt.bin两个文件

选中一个接收lytton-crypt.exe文件的数据包,右键点击“跟踪流”->"TCP流"

lytton-crypt

然后点击“另存为”,保存为lytton-crypt.exe

lytton-crypt

重复上述步骤,得到lytton-crypt.bin.然后计算两个文件的md5值

╭─ ~/CTF/DEADFACE
╰─$ md5 lytton-crypt.*
MD5 (lytton-crypt.bin) = 4da8e81ee5b08777871e347a6b296953
MD5 (lytton-crypt.exe) = 9cb9b11484369b95ce35904c691a5b28

flag:flag{9cb9b11484369b95ce35904c691a5b28|4da8e81ee5b08777871e347a6b296953}