Self Destruct
Original Writeup on seall.dev
The description says:
The attachment is a VirtualBox image. Do not run it outside VirtualBox. It is recommended to backup the .vdi file before launching the VM.
I downloaded the .vdi and then extracted it with 7Zip to a .img as I find working with disk images in Autopsy far easier than running the image called โSelf Destructโ.
Once loaded in Autopsy, I exported all the files to Export.
I manually found 2 flag parts in /img_0.img/home/kashictf/.sush_history and /img_0.img/home/kashictf/.bash_history:
ls
echo "fLaG Part 3: 'eserve_roo'"
exit
and
ls
echo "fLaG Part 5: 'ht??_No_Er'"
exit
after noticing the trend, I used powershell with a recursive search to locate the remaining parts:
kashiselfdestruct\Export> Get-ChildItem -Recurse | Select-String -Pattern "fLaG Part" -CaseSensitive:$false
25-etc\hosts.allow:7:# fLaG Part 1: 'KashiCTF{r'
25-etc\kernel-img.conf:1:# Kernel image management overrides fLaG Part 4: 't_Am_1_Rig'
25-etc\sudo.conf:35:# fLaG Part 6: 'r0rs_4ll0w'
4-home\kashictf\.bash_history:2:echo "fLaG Part 5: 'ht??_No_Er'"
4-home\kashictf\.sush_history:2:echo "fLaG Part 3: 'eserve_roo'"
7083-usr\bin\sush:34:lsdirvdirgrepfgrepegreprgrepfLaG Part 7: 'ed_Th0}'
7083-usr\bin\sush:36:fLaG Part 2: 'm_rf_no_pr'sush: tokenization buffer allocation errorsush: cd: no such file o
Flag: KashiCTF{rm_rf_no_preserve_root_Am_1_Right??_No_Err0rs_4ll0wed_Th0}
Related Writeups
Brick House
I was going through some old tapes from the '80s and came across a strange recording on one labeled "Basic Programs #1." ...
Don't Touch My Fone
Looks like someone's dialing a phone number, see if you can figure out what it is! The flag format is the decoded phone ...
Look Long and Prosper
In this challenge, youโll need to uncover a hidden secret, but first, you must find the key. The key is hidden in plain ...