WPI CTF: Suckmore Shell 2.0

Apr 18, 2020 • One minute to read

Challenge Description

After its abysmal performance at WPICTF 2019, suckmore shell v1 has been replaced with a more secure, innovative and performant version, aptly named suckmore shell V2.

ssh smsh@smsh.wpictf.xyz pass: suckmore>suckless

made by: acurless

Poking Around

First off, SSH login.

ssh smsh@smsh.wpictf.xyz

Give the password when asked.

login

A prompt, hmmmm. Doesn’t look a normal shell, but it’s a shell. Okay, let’s see what we have now.

ls -la

ls

Whaaaaaaaat? We have found the flag already!? Easy 200 points!

cat flag

cat

Strange. The shell was hanging after I entered the command.

That’s fine. Let’s try other ways to read the file.

other commands

Not even string or grep. When I tried less flag it even messed the console up, and I had to fire up a new terminal tab. I was wrong. It’s not easy 200 points.

I finally got lucky with base64 command.

base64 flag

base64

Seems it managed to read and encode that file. Let’s copy the encoded text and decode it on our own machine.

echo -n "ZWNobyAiV1BJe1NVY2ttb3JlU29mdHdhcmVOMzNkejJHM1RpdFRvZ2VUSEVSfSIK" | base64 -d

decode

Curious. It’s a shell command in that file. Anyway, we’ve retrieved the flag.

CTFWPICTF2020

Wonderland - TryHackMe

WPI CTF: John Cena 🎺🎺🎺🎺

comments powered by Disqus