RSS
 

HACKvent 2015: Day 11

11 Dec 2015

Challenge The following image is provided: Solution I had to spend some time researching the above image but I soon discover that it is a punch card. It turns out to be a IBM 96 Column Punchcard. Unfortunately there isn’t much information online on how to decode them. A reverse image search comes up with the following image:…read more.

 
No Comments

Posted in Hackvent 2015

 

5138 – Escape from Python City

10 Dec 2015

I connect to the server and am presented with the following message:

I type in ls and am presented with the following:

I am in a python sandbox and must escape or read the key.txt file somehow. I try to simply type in sh and get the following message:

I notice the exception and figure…read more.

 
No Comments

Posted in Hacking Lab

 

HACKvent 2015: Day 10

10 Dec 2015

Challenge

The following zip file was also provided: Download ZIP File Solution We notice that the zip file nasty-Shit.zip contains one zip file called 1.zip, that contains one zip file called 2.zip and so on. I also know that the file zile will keep getting lower and lower in file size the more we…read more.

 
No Comments

Posted in Hackvent 2015

 

Creating an Extremely Strong and Unique Password

10 Dec 2015

In this post I’ll give you a method to create a really strong and flexible password. Now i’ve personally only gone through 5-6 passwords in the last 8 years. The first 2 passwords were insanely weak (6 digit numbers!). I then started picking stronger passwords but unfortunately I’ve had to change my password multiple times due…read more.

 
1 Comment

Posted in Security

 

Advent Of Code: Day 8

09 Dec 2015

Challenge

Solution A fairly simple puzzle. My approach was to add up the strings together and use regular expressions to replace special characters with a * character so that the python len function would provide me with the correct result. Script:

 

 
No Comments

Posted in Advent Of Code

 

HACKvent 2015: Day 1

09 Dec 2015

Challenge

Solution I decode the string above using a Vigenere Cipher solver with the key ‘geek‘ (deduced from frequency analysis). The message I get is:

The message is pretty clear. First spot I check as a webmaster is /robots.txt (psss go check my websites robots.txt :p). I find 1 disallowed resource which is: /MeMyselfAndI-surfingInTheSky/hacker.jpg I visit this…read more.

 
No Comments

Posted in Hackvent 2015

 

HACKvent 2015: Day 9

09 Dec 2015

Challenge

The following sound file was also provided: Download MP3 Solution This was a very simple challenge. First we listen to the transmission and discover it spells out the nugget but some characters are turned into noise. We get:

The ?  character represents a character in the set [A-Za-z0-9] (because those are the only…read more.

 
No Comments

Posted in Hackvent 2015

 

HACKvent 2015: Day 8

08 Dec 2015

Challenge

Link to website (may be down): http://hackvent.hacking-lab.com/xMasStore_wqbrGjHxxZ9YkbfiKiGC/index.php Solution I inspect the source of the website and take a look at the background image but that seems to be fine. There is nothing else of interest on the website so I figure this may require a brute-force attack. I then however find a cookie that is…read more.

 
No Comments

Posted in Hackvent 2015

 

HACKvent 2015: Day 6

08 Dec 2015

Challenge We are given the following string:

Solution We can deduce by the amount of padding that this is Base32 encoded string. We use an online decoder and get:

Then we try various other things to decode the above string. I will admit I failed to find a proper solution until I received…read more.

 
No Comments

Posted in Hackvent 2015

 

HACKvent 2015: Day 5

08 Dec 2015

Challenge You are given the following file: Download PDF File Solution So we open the PDF file to find 1 QR image in a ball. We scan it and we get the text Oooops ! . We then use an online tool to extract all images from the PDF (link). I do this because PDF files store…read more.

 
No Comments

Posted in Hackvent 2015

 
Page 2 of 512345