Thursday 13 March 2014

RUCTF 2014 Quals Forensics-100 [Secret host]

This time challenges were more,But i couldn't solve much.

Forensics-100
We intercepted configs and dump. What were they hide on http://10.100.0.1/?

Search for password and username for the openvpn connection using the MDMP crash dump.
Using "strings" command or using Hexdump you can find these username and password.
So we got the username : SuperPuperRoot and password : VeryStrongSecret

Install openvpn here.

You need to place the certificate file and the config file(Extracted from the configs and dumps) in "openvpn configuration file directory" like this.


Now open the GUI and you are set.


open 10.100.0.1 and viewing the source page you would see this :

It works!


This is the default web page for this server.
The web server software is running but no content has been added, yet.
Your secret information is RUCTF_29793ced32a8c89481c83827cf24647a


FLAG :  RUCTF_29793ced32a8c89481c83827cf24647a

No comments:

Post a Comment

enter valid comments.Suggestions are most welcome and would be interested in correcting my mistakes.