Practice CTF
Problem Writeup: Magikarp Ground Mission - CTF 7
Category: General Skills
Description for Magikarp Ground Mission
“Do you know how to move between directories and read files in the shell? Start the container, ssh
to it, and then ls
once connected to begin. Login via ssh
as ctf-player
with the password, 6dee9772
.”
Approach
ssh
stands for Secure Shell, and it is a Linux tool that is similar to netcat
in function: both ssh
and netcat
allow us to connect remotely to another computer. The essential difference is that ssh
allows us to make an encrypted connection (which is why it is called “secure shell”).
Once we’ve established an ssh
connection, we have essentially used our computer to access a shell on another computer. To do this we’ll need 1) a user account on the host machine, 2) a password to that account so we can login remotely.
Opening the ssh
Connection
For this problem, we first need to click the blue “Start Instance” button in the problem box and wait a few seconds until the “Challenge Endpoint” information appears. Copy this command and paste it into your webshell. When asked if you want to continue connecting, type “yes” and hit enter. When asked for the password, copy and paste the password from the problem statement:
pimaker-picoctf@webshell:~$ ssh ctf-player@venus.picoctf.net -p 54085
The authenticity of host '[venus.picoctf.net]:54085 ([3.131.124.143]:54085)' can't be established.
ED25519 key fingerprint is SHA256:P1f6h95BrSVnJbm2AKhphfHHGEyAeThib/rN/AwKs24.
This host key is known by the following other names/addresses:
~/.ssh/known_hosts:1: [hashed name]
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '[venus.picoctf.net]:54085' (ED25519) to the list of known hosts.
ctf-player@venus.picoctf.net's password:
Once we enter the correct password, the ssh
connection is completed and our command prompt changed to match the user account we have accessed–in this case, ctf-player@pico-chall
:
Welcome to Ubuntu 18.04.5 LTS (GNU/Linux 5.4.0-1041-aws x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
This system has been minimized by removing packages and content that are
not required on a system that users do not log into.
To restore this content, you can run the 'unminimize' command.
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.
ctf-player@pico-chall$
Finding the Flag
Once connected, the first step is to explore our working directory (the directory we are currently in) by typing ls
. We have two files in our directory;
ctf-player@pico-chall$ ls
1of3.flag.txt instructions-to-2of3.txt
ctf-player@pico-chall$
Let’s use cat
to explore each file:
ctf-player@pico-chall$ cat 1of3.flag.txt
picoCTF{xxsh_
ctf-player@pico-chall$ cat instructions-to-2of3.txt
Next, go to the root of all things, more succinctly `/`
ctf-player@pico-chall$
The first file contains what we might expect: 1/3 of the flag. The other file tells us to go to the root directory (/
), where all the system files are stored. We can do this with the change directory command: cd /
ctf-player@pico-chall$ cd /
ctf-player@pico-chall$ ls
2of3.flag.txt bin boot dev etc home instructions-to-3of3.txt lib lib64 media mnt opt proc root run sbin srv sys tmp usr var
ctf-player@pico-chall$
When we list the files of the root directory, we see the usual directories found here on a Linux system. But we also have two new files to explore:
ctf-player@pico-chall$ cat 2of3.flag.txt
0ut_0f_\/\/4t3r_
ctf-player@pico-chall$ cat instructions-to-3of3.txt
Lastly, ctf-player, go home... more succinctly `~`
ctf-player@pico-chall$
We found the second 1/3 of the flag, and need to change to the home directory (~
) with the command cd ~
:
ctf-player@pico-chall$ cd ~
ctf-player@pico-chall$ ls
3of3.flag.txt drop-in
ctf-player@pico-chall$ cat 3of3.flag.txt
540e4e79}
ctf-player@pico-chall$
When we explore the final in the home directory, we have the last part of the flag. Combining all three of the pieces into one string gives us the final and correct flag: picoCTF{xxsh_0ut_0f_\/\/4t3r_540e4e79}
.
CTF
blog content practice