fs0ciety (Misc)

  • First I download challenge file into my machine
  • I extract this file , After this I got one zip file with password , but i don't know password to extract to this zip password
  • I used fcrackzip to crack this zip file password
  • $ unzip fs0ciety.zip 
    Archive:  fs0ciety.zip
    [fs0ciety.zip] fsociety.zip password: 
      inflating: fsociety.zip            
    $ ls
    fs0ciety.zip  fsociety.zip
    $ fcrackzip -u -v -D -p /opt/wordlists/rockyou.txt fsociety.zip
    found file 'sshcreds_datacenter.txt', (size cp/uc    198/   729, flags 9, chk 8d9c)
    
    
    PASSWORD FOUND!!!!: pw == justdoit
    $ unzip fsociety.zip 
    Archive:  fsociety.zip
    [fsociety.zip] sshcreds_datacenter.txt password: 
      inflating: sshcreds_datacenter.txt  
    $ ls
    fs0ciety.zip  fsociety.zip  sshcreds_datacenter.txt
    $ cat sshcreds_datacenter.txt 
    *****************************************************************************************
    Encrypted SSH credentials to access Blume ctOS : 
    
    MDExMDEwMDEgMDExMDAxMTAgMDEwMTExMTEgMDExMTEwMDEgMDAxMTAwMDAgMDExMTAxMDEgMDEwMTExMTEgMDExMDAwMTEgMDEwMDAwMDAgMDExMDExMTAgMDEwMTExMTEgMDAxMDAxMDAgMDExMDExMDEgMDAxMTAwMTEgMDExMDExMDAgMDExMDExMDAgMDEwMTExMTEgMDExMTAxMTEgMDExMDEwMDAgMDEwMDAwMDAgMDExMTAxMDAgMDEwMTExMTEgMDExMTAxMDAgMDExMDEwMDAgMDAxMTAwMTEgMDEwMTExMTEgMDExMTAwMTAgMDAxMTAwMDAgMDExMDAwMTEgMDExMDEwMTEgMDEwMTExMTEgMDExMDEwMDEgMDExMTAwMTEgMDEwMTExMTEgMDExMDAwMTEgMDAxMTAwMDAgMDAxMTAwMDAgMDExMDEwMTEgMDExMDEwMDEgMDExMDExMTAgMDExMDAxMTE=
    
    *****************************************************************************************
    $ echo MDExMDEwMDEgMDExMDAxMTAgMDEwMTExMTEgMDExMTEwMDEgMDAxMTAwMDAgMDExMTAxMDEgMDEwMTExMTEgMDExMDAwMTEgMDEwMDAwMDAgMDExMDExMTAgMDEwMTExMTEgMDAxMDAxMDAgMDExMDExMDEgMDAxMTAwMTEgMDExMDExMDAgMDExMDExMDAgMDEwMTExMTEgMDExMTAxMTEgMDExMDEwMDAgMDEwMDAwMDAgMDExMTAxMDAgMDEwMTExMTEgMDExMTAxMDAgMDExMDEwMDAgMDAxMTAwMTEgMDEwMTExMTEgMDExMTAwMTAgMDAxMTAwMDAgMDExMDAwMTEgMDExMDEwMTEgMDEwMTExMTEgMDExMDEwMDEgMDExMTAwMTEgMDEwMTExMTEgMDExMDAwMTEgMDAxMTAwMDAgMDAxMTAwMDAgMDExMDEwMTEgMDExMDEwMDEgMDExMDExMTAgMDExMDAxMTE= | base64 -d
    01101001 01100110 01011111 01111001 00110000 01110101 01011111 01100011 01000000 01101110 01011111 00100100 01101101 00110011 01101100 01101100 01011111 01110111 01101000 01000000 01110100 01011111 01110100 01101000 00110011 01011111 01110010 00110000 01100011 01101011 01011111 01101001 01110011 01011111 01100011 00110000 00110000 01101011 01101001 01101110 01100111
    $
    
  • I used fcrackzip and i got password justdoit I extract fsociety.zip with this password

  • After Extracting I got one file name is sshcreds_datacenter.txt
  • I checked this file and I found some base64 encode value , I decode this base64encode value and I got something like binary code
  • In this time , I used Online Binary to text converter to change this binary to text
  • Sample Image
  • After this I got Flag
  • Flag: HTB {if_y0u_c@n_$m3ll_wh@t_th3_r0ck_is_c00king}

Art (Misc)

  • First I download challenge file into my machine
  • I unzip this file challenge file with password hackthebox
  • After Extrcting I got one png file
  • $ unzip art.zip 
    Archive:  art.zip
    [art.zip] art.png password: 
    inflating: art.png                 
    $ 
  • This Image
    Sample Image
  • After some time searching at google and I know this is Piet Programming Language
  • I found Online Piet Program Photo Executer
  • I upload this photo into this executer and execute this
  • Now I got Flag
  • Sample Image
  • Flag : HTB{p137_m0ndr14n}

Inferno (Misc)

  • I download challenge file and extract this challenge file
  • $ unzip inferno.zip 
    Archive:  inferno.zip
    [inferno.zip] inferno.txt password: 
    inflating: inferno.txt             
    $ cat inferno.txt 
    RCdgXyReIjdtNVgzMlZ4ZnZ1PzFOTXBMbWwkakdGZ2dVZFNiYn08eyldeHFwdW5tM3Fwb2htZmUrTGJnZl9eXSNhYFleV1Z6PTxYV1ZPTnJMUUpJTkdrRWlJSEcpP2MmQkE6Pz49PDVZenk3NjU0MzIrTy8uJyYlJEgoIWclJCN6QH59dnU7c3JxdnVuNFVxamlubWxlK2NLYWZfZF0jW2BfWHxcW1pZWFdWVVRTUlFQMk5NRktKQ0JmRkU+JjxgQDkhPTw1WTl5NzY1NC0sUDAvby0sJUkpaWh+fSR7QSFhfXZ7dDpbWnZvNXNyVFNvbm1mLGppS2dgX2RjXCJgQlhXVnpaPDtXVlVUTXFRUDJOR0ZFaUlIR0Y/PmJCJEA5XT08OzQzODFVdnUtMiswLygnSysqKSgnfmZ8Qi8= 
  • I know this is base64 encode value and I decode this
  • 
    $ echo "RCdgXyReIjdtNVgzMlZ4ZnZ1PzFOTXBMbWwkakdGZ2dVZFNiYn08eyldeHFwdW5tM3Fwb2htZmUrTGJnZl9eXSNhYFleV1Z6PTxYV1ZPTnJMUUpJTkdrRWlJSEcpP2MmQkE6Pz49PDVZenk3NjU0MzIrTy8uJyYlJEgoIWclJCN6QH59dnU7c3JxdnVuNFVxamlubWxlK2NLYWZfZF0jW2BfWHxcW1pZWFdWVVRTUlFQMk5NRktKQ0JmRkU+JjxgQDkhPTw1WTl5NzY1NC0sUDAvby0sJUkpaWh+fSR7QSFhfXZ7dDpbWnZvNXNyVFNvbm1mLGppS2dgX2RjXCJgQlhXVnpaPDtXVlVUTXFRUDJOR0ZFaUlIR0Y/PmJCJEA5XT08OzQzODFVdnUtMiswLygnSysqKSgnfmZ8Qi8=" | base64 -d 	
    
    D'`_$^"7m5X32Vxfvu?1NMpLml$jGFggUdSbb}<{)]xqpunm3qpohmfe+Lbgf_^]#a`Y^WVz==<5Yzy765432+O/.'&%$H(!g%$#z@~}vu;srqvun4Uqjinmle+cKaf_d]#[`_X|\[ZYXWVUTSRQP2NMFKJCBfFE>&<`@9!=<5Y9y7654-,P0/o-,%I)ih~}${A!a}v{t:[Zvo5srTSonmf,jiKg`_dc\"`BXWVzZ<;WVUTMqQP2NGFEiIHGF?>bB$@9]=<;4381Uvu-2+0/('K+*)('~f|B/
    
  • I got one strange value but i don't know what it's this
  • After few minutes researching and I got this is malboge programming language
  • I used this Online Malboge Interpreter to execute this malboge code
  • After Execute I got flag
  • Sample Image
  • Flag : HTB{!1t_1s_just_M4lb0lg3_l4ngu4g3!}