📻Going active
Going Active
This is a set of active scanning challenges hosted during CDDC 2021. I forgot most of the challenge texts exactly, but I documented information provided. Apologies for the lack of screenshots, the CTF platform and all challenges were completely taken offline very shortly after the CTF ended.
This is the category I had the most success with on day 1 of the CTF. I managed to solve all the challenges on the first day of the CTF. This category of challenges was very similar to techniques used for recon in vulnerable boxes in HTB, VulnHub and the PWK Labs.
Mounting
Points: 200
Challenge text:
(forgot, but the IP 13.213.94.233 was provided.)
Solution
Simple challenge, mount an NFS share and read the flag.
UnKnown
Points: 300
Challenge text:
(forgot, but same ip and port provided was 666.)
Solution
When I nc'ed into the IP, it started printing a bunch of gibberish.
I simply piped the gibberish into a file with the following command:
and opened it as an archive. The file in the archive is the image file shown here, containing the flag.
VH2
Points: 300
Challenge text:
(forgot, but a URL was provided: dev02.globaldominationcorporation.xyz Something was said about not being able to access the server.)
Solution
Challenge name is VH2, which stands for Virtual Host 2. I checked the certificate and found the alternate name gdc-internal02.globaldominationcorporation.xyz Seems like there was a second VHOST, the steps taken to access the flag were:
(sorry, flag was not saved :C )
Last updated