Get The Key.txt Seccon CTF Writeups 100Pts

Pertama kita download soalnya  forensic100.zip

Cek menggunakan file

$ file forensic100.zip
forensic100.zip: Zip archive data, at least v2.0 to extract

Extract file

$ unzip forensic100.zip
Archive:  forensic100.zip
  inflating: forensic100

Hasil yang di extract

$ file forensic100
forensic100: Linux rev 1.0 ext2 filesystem data

Ternyata File System , Kita Mount

$ mkdir /tmp/forensic100

$ cd /tmp/forensic100

           
            <div class="onp-locker-call" style="display: none;" data-lock-id="onpLock517077">
                <p>$ mount -o loop forensic100 /tmp/forensic100</p>
            </div>
         

        

$ ls
1    116  133  150  168  185  201  219  236  33  50  68  85
10   117  134  151  169  186  202  22   237  34  51  69  86
100  118  135  152  17   187  203  220  238  35  52  7   87
101  119  136  153  170  188  204  221  239  36  53  70  88
102  12   137  154  171  189  205  222  24   37  54  71  89
103  120  138  155  172  19   206  223  240  38  55  72  9
104  121  139  156  173  190  207  224  241  39  56  73  90
105  122  14   157  174  191  208  225  242  4   57  74  91
106  123  140  158  175  192  209  226  243  40  58  75  92
107  124  141  159  176  193  21   227  244  41  59  76  93
108  125  142  16   177  194  210  228  25   42  6   77  94
109  126  143  160  178  195  211  229  26   43  60  78  95
11   127  144  161  179  196  212  23   27   44  61  79  96
110  128  145  162  18   197  213  230  28   45  62  8   97
111  129  146  163  180  198  214  231  29   46  63  80  98
112  13   147  164  181  199  215  232  3    47  64  81  99
113  130  148  165  182  2    216  233  30   48  65  82  lost+found
114  131  149  166  183  20   217  234  31   49  66  83
115  132  15   167  184  200  218  235  32   5   67  84

Ternyata Isinya banyak kita harus cari key.txt yang ada flag

$ grep -r 'key.txt' .
Binary file ./1 matches

</pre>

Coba cek lagi file 1

$ file 1 1: gzip compressed data, was “key.txt”, from Unix, last modified: Wed Oct 1 02:00:52 2014

Uzip file 1.zip

gunzip < 1
SECCON{@]NL7n+-s75FrET]vU=7Z}

Atau kita bisa gunakan cara

strings foresic100 > flag.txt

SECCON{@]NL7n+-s75FrET]vU=7Z}

Nanti akan muncul banyak flag .. kita ambil yang paling bawah

 

The flag is SECCON{@]NL7n+-s75FrET]vU=7Z}.