Categories
ctf, pentest, Uncategorized, Web Attacks

The CTF  wanted to cover basics in the beginning where people not only see but observe. On loading the system we notice that there is a web application hosted on it. The application was a wordpress application. Things to note about it are:

  • readme.html was still present to give us version information
  • the wordpress site was out of date
  • the instance had one user hacker123

The one thing most people overlook however before going in to direct offense is the robots.txt file. Reading this file showed some interesting entries.

1-get-robots

Getting juicy information from robots.txt

As is seen there are two interesting elements.

  • loot.dic – A dictionary file which we download
  • Key 1 of 3 – Jackpot one is in

All we need to do now is read key 1 of 3 as below:

Reading the first key file contents

Reading the first key file contents

The key is not in plaintext, we notice its encoded in between the callibraces which denote a function, which in this troll’s case the function is:
RobotsRPeople2. All we need to clear this now is decode the text to get the first key. The key is base64 encoded which is easy to decode, it is definitely not hex encoding as we can see it doesn’t follow the convention of only using characters between {0-9,A-F}. The key is decoded as below:

Key 1 Decoded

Key 1 Decoded

And there we have it first key is :

robotsRpeople2AfricaHackonKey1

Leave a Reply

Your email address will not be published. Required fields are marked *

February 2024
M T W T F S S
 1234
567891011
12131415161718
19202122232425
26272829