- The
md5
of username is hard coded in js. - Use md5online to get plain text and get
flag{17_w45_hidd3n_in_p14in_5igh7}
- change the
flag
cookie to false, Enter
- Username :
root
md5
of password is cookie pass- Use md5online to get password
- Enter to get flag.
Running binwalk
will reveal the contents of executable. Run the following commands to get flag:
$ binwalk cr4ck_7hi5_7ce7aa193db6fd41fc3857602e72fc1d
$ dd if=cr4ck_7hi5_7ce7aa193db6fd41fc3857602e72fc1d of=out.png skip=1536 bs=1
$ eog out.png
Running binwalk
will reveal the contents of executable.
$ binwalk -e malicious_0a5aca19667459c2b75c384d7a6af48f.zip
$ cd _malicious_0a5aca19667459c2b75c384d7a6af48f.zip.extracted
# file.txt contains hex encoded string of flag
$ python2 -c "print '`cat flag.txt`'.decode('hex')"
flag{k33p_up_y0ur_zipp3r5}
Title says "50 shades of grey"
Open gimp
increase brightness and contrast.
Flag : flag{LETHAL}
Run the following commands to get the flag:
$ gdb ./un10ck_m3_a04acef13380d5a9bbc20fddc7dd426c
(gdb) b *0x400686
(gdb) b *0x400cca
(gdb) r
(gdb) set $rip=0x400c8f
(gdb) c
(gdb) set $rip=0x400cd0
(gdb) c
(gdb) q