Practice CTF
Problem Writeup: Python Wrangling, Wave a flag, Static ain't always noise - CTF 8
Category: General Skills
Description for Python Wrangling
“Python scripts are invoked kind of like programs in the Terminal… Can you run this Python script using this password to get the flag?”
Approach
This problem
Description for Wave a Flag
“Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information…”
Approach
This problem teaches us how to identify binaries (i.e., programs), how to make them executable with chmod
, and how to execute them in the Linux shell. We begin, as we often do, by using wget
to download the file linked in the description. This command downloads a file called warm
.
We first want to inspect warm
a bit to learn what kind of file it is. Running cat
on it doesn’t give us anything useful, so let’s use the file
command to learn more about warm
:
pimaker-picoctf@webshell:~$ file warm
warm: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=7b3da2efd83a2b9154697b6c7f6474042e1fd033, with debug_info, not stripped
pimaker-picoctf@webshell:~$
Now we know that warm
is an “executable” file, or a program (a ‘binary’ in Linux). To run warm
from the command prompt, we use this command:
pimaker-picoctf@webshell:~$ ./warm
-bash: ./warm: Permission denied
pimaker-picoctf@webshell:~$
But this command tells us we don’t have the right permissions to run this file. So, to change the file’s “mode”, we use the Linux command chmod
, which is an abbreviation for “change mode”:
pimaker-picoctf@webshell:~$ chmod +x warm
In this command +x
means we are adding (+
) the permission to execute (x
) the file called warm
. (Read more about chmod
by running man chmod
in the terminal.)
Now we can try running warm
again:
pimaker-picoctf@webshell:~$ ./warm
Hello user! Pass me a -h to learn what I can do!
pimaker-picoctf@webshell:~$
Looks like we need to add a -h
to our execute commmand:
pimaker-picoctf@webshell:~$ ./warm -h
Oh, help? I actually don't do much, but I do have this flag here: picoCTF{b1scu1ts_4nd_gr4vy_6635aa47}
pimaker-picoctf@webshell:~$
And we’re done!
Description for Static ain’t always noise
“Can you look at the data in this binary: static? This BASH script might help!”
Approach
This problem introduces us to bash scripts, which are small Linux shell programs we can run in the terminal. We will first solve this problem using the bash script, then we’ll solve it a much faster way.
First, we use wget
to download the two files: static
and ltdis.sh
. The .sh
file extension in ltdis.sh
tells us it is a bash script. Let’s begin by investigating what kind of file static
is:
pimaker-picoctf@webshell:~$ file static
static: ELF 64-bit LSB pie executable, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 3.2.0, BuildID[sha1]=7eb9ee1907cc878f15f9949988893b1f0ab1ebdf, not stripped
pimaker-picoctf@webshell:~$
Since static
is an executable (and it’s from a trusted source), let’s make sure it’s executable with chmod
and then run it:
pimaker-picoctf@webshell:~$ chmod +x static
pimaker-picoctf@webshell:~$ ./static
Oh hai! Wait what? A flag? Yes, it's around here somewhere!
pimaker-picoctf@webshell:~$
That didn’t get us very far, so let’s investigate ltdis.sh
next with cat
:
pimaker-picoctf@webshell:~$ cat ltdis.sh
#!/bin/bash
echo "Attempting disassembly of $1 ..."
#This usage of "objdump" disassembles all (-D) of the first file given by
#invoker, but only prints out the ".text" section (-j .text) (only section
#that matters in almost any compiled program...
objdump -Dj .text $1 > $1.ltdis.x86_64.txt
#Check that $1.ltdis.x86_64.txt is non-empty
#Continue if it is, otherwise print error and eject
if [ -s "$1.ltdis.x86_64.txt" ]
then
echo "Disassembly successful! Available at: $1.ltdis.x86_64.txt"
echo "Ripping strings from binary with file offsets..."
strings -a -t x $1 > $1.ltdis.strings.txt
echo "Any strings found in $1 have been written to $1.ltdis.strings.txt with file offset"
else
echo "Disassembly failed!"
echo "Usage: ltdis.sh <program-file>"
echo "Bye!"
fi
pimaker-picoctf@webshell:~$
The variable $1
in this file refers to the file name we pass in with the script command. So, to run this bash script on static
, we use the command bash ltdis.sh static
:
pimaker-picoctf@webshell:~$ bash ltdis.sh static
Attempting disassembly of static ...
Disassembly successful! Available at: static.ltdis.x86_64.txt
Ripping strings from binary with file offsets...
Any strings found in static have been written to static.ltdis.strings.txt with file offset
pimaker-picoctf@webshell:~$
Based on this output, we should search in static.ltdis.strings.txt
for the flag. We can use cat
and grep
to make this much easier:
pimaker-picoctf@webshell:~$ cat static.ltdis.strings.txt | grep pico
1020 picoCTF{d15a5m_t34s3r_ae0b3ef2}
pimaker-picoctf@webshell:~$
And we are done! Now, let’s consider a much faster solution to this problem.
The Approach #2
Remember back a few problems to the “Strings It” problem? We solved it using the command strings
and grep
. Let’s try a similar approach here with static
:
pimaker-picoctf@webshell:~$ strings static | grep pico
picoCTF{d15a5m_t34s3r_ae0b3ef2}
pimaker-picoctf@webshell:~$
In this case, remembering a previous solution makes this new problem trivial (though we still learned some important things about bash scripts.)
CTF
blog content practice