BackdoorCTF 2016 - buzybee | Akash Trehan

BackdoorCTF 2016 - buzybee

Backdoor Logo

BackdoorCTF is the annual flagship CTF competition conducted by SDSLabs and InfoSecIITR.

Points: 150

Description:

A deadly virus is killing bees in Busybee’s village Busybox, India. Unfortuantely, you have to go to the village to fight the infection. Get the flag virus out of the infected files. Village address: http://hack.bckdr.in/BUSYBEE/infected.tar

Write-up

This was actually a good one which got beaten because of the small number of files and low complexity.

So what I did during the CTF was just opened and looked at all the .json files. They didn’t have any flag or anything that I found suspicious. Then I checked for human-readable strings in all the .tar files using the strings command.

One of them indeed had the flag.

Infected flag

So that was too easy for a 150 points question so I asked around about the expeced solution. Turns out this was a Docker dump. It had to be mounted in Docker and then searched for abnomalities. I have not tried that out yet(I’ll have to set up Docker on my machine. I’m feeling too lazy right now.). I’ll do it soon though and update this writeup accordingly.

Go through other writeups for more such fun challenges.




Follow @CodeMaxx
BackdoorCTF 2016 - imagelover
Akash Trehan

Akash Trehan

Hacker-Developer-Geek

comments powered by Disqus
rss facebook twitter github youtube mail spotify instagram linkedin google pinterest medium