🌝

Writeup JHDigitalCTF (John Hammond Digital CTF) 2019 Kategori [MISC]

Sunday, 10 November 2019 | est. 1 min read |
Tags : #ctf #jhdctf
Share

Catalias

Hmmm… maybe missing a hyphen somewhere?

Note: This password is reset every five minutes. If you are on the wrong side of the clock, you may need to reconnect.

Connect with:

ssh user@jh2i.com -p 50004 # password is 'userpass'

in this problem, cat command is aliased, so we need to call it directly using its path.

/bin/cat flag.txt
FLAG = JHDCTF{you_let_the_cat_out_of_the_bag}

Hidden

Hidden
60
What secret is this server hiding?!

Connect with:

ssh user@jh2i.com -p 50015 # password is 'userpass'

first, write ls -lah command, and it showing that there's .secret directory. and cd to those directory is restricted. we can use ls and its listring ._dont_delete_me.txt.

write this command:

cat .secret/._dont_delete_me.txt
flag = JHDCTF{you_found_my_hidden_secrets}

Chasm

Chasm
60
The Internet’s new echo server. Break it.

Connect with:

nc jh2i.com 50006

it's a remote server that run echo. so we can write $(command)

$(cat * | grep JHDCTF)
flag = JHDCTF{dangerous_echoes_in_this_chasm}
Comments