CSAW Qualifiers 2022

Chris McGuire
5 min readSep 14, 2022

--

As the school year starts again, many students will start playing with more capture the flag events. While no longer a student, it is always fun to try out a few challenges to see what is new that the hosts can come up with.

Here are solutions to 3 of the challenges completed, World Wide Web, DockREleakage, and Android x86.

World Wide Web

Category: web

Challenge

Isn’t the Word Wide Web a fascinating place to be in? Words.. so many words.. all linked…

Solution

The initial webpage provided a link under “stuff”.

Snip of a browser showing text, “Please help me find my missing stuff. :(“ The word stuff is a hyperlink.
Initial webpage

The next page provided what appeared to be many links.

Snip of a webpage with what looks like many many words and links.
Second page of many links

However, looking at the source there did not appear to be any actual hrefs.

Snip of source html for the webpage, showing the links do not actual refernce a location.
Links but no links

Using ctrl+f it showed there was a link somewhere on the page.

Snip of html source code. With an href highlighted.
There’s the link

Using the ZAP spider, it runs until hitting the end at “/best”. ZAP needs to be set to a search depth of 0 in order to run completely (infinitely). The other max of 19 was not deep enough.

ZAP output showing the last item was http://web.chal.csaw.io:5010/best.
Last item found by the spider

At this point you can get the flag from the response in ZAP as well, but let’s explore some fun things about this challenge.

ZAP response from the page /best with the flag in it.
And done!

Going to “/best” immediately, results in an error, “Booooo!”

Snip of blank webpage other than the text “Booooo!”
Errored how?

There is nothing in the page source. So, what could be the problem?

Starting back at the beginning and manually clicking through a few links provides a good clue in the cookies.

Snip of webpage and the developer tools showing the webpages cookies.
Yum cookies

The cookie “solChain” grows as the links are followed. ZAP kept the cookie through it’s spidering process and was able to retrieve the flag.

After updating the cookie to include the entire path, refresh “/best” to get the flag.

Snip of webpage with the flag text and cookies showing.
Flag yay!

The Flag

CTF{w0rdS_4R3_4mAz1nG_r1ght}

DockREleakage

Category: rev
Files: dockREleakage.tar.gz

Challenge

A breach occurred and some files have been leaked. One of the leaked files named dockREleakage.tar.gz contains an image of one of the company’s components. An anonymous hacker has reached out to me and beware me that there is some serious mistake in my build image process. The hacker implies that sensitive information should be handled carefully. However, I couldn’t find the mistake by myself. Please help me!

Solution

The download for this challenge contained a number of files that are for deploying a docker instance.

Exploring through the files, using 7z, there are a number of directories with files with “flag” in the title. Each of these contains what appears to be the end of the flag, with one file including an addition clue:

73c73d_w17h1n_7h3_d0ck3rf1l3}
Find the rest of the flag by yourself!

Continuing looking through the files, there is “acbb216b17482071caca135101282177f6ffed7b8ee0bfc5323aae103c216d74.json”. This contains information for a build process and has a nice base64 string to check out.

Command line output from file acbb216b17482071caca135101282177f6ffed7b8ee0bfc5323aae103c216d74.json, in green on black with base64 string boxed in red.
Hmm what’s that base64?

Putting the string “ZmxhZ3tuM3Yzcl9sMzR2M181M241MTcxdjNfMW5mMHJtNDcxMG5fdW5wcjA=” into a base64 decoder reveals another part of the flag.

Snip of a webpage showing the base64 string at the top and the decoded portion at the bottom.
Yay flag!

Then combing the two parts, the flag is complete.

The Flag

flag{n3v3r_l34v3_53n5171v3_1nf0rm4710n_unpr073c73d_w17h1n_7h3_d0ck3rf1l3}

Android x86

Category: forensics
Files: android_forensics_easy.zip

Challenge

There are some secrets on this phone image. Please find the flag!

Solution

In this challenge we are given an android forensic image. One of the easiest tools to use for disk images is Autopsy.

After loading the image into Autopsy, it can be very quick to navigate through the files and use the modules to locate information faster.

White screenshot of Autopsy application, file list on left, folder content top right, and file details bottom right.
Hmm…nothing

Using the keyword search for the CTF format (“flag{“), did not return any results.

Looking at the different file types, there are 20 images listed. In particular, image 14.jpg provides an interesting clue.

White screenshot of Autopsy application, file list on left, folder content top right, and an image in the bottom right. Bottom right image shows a list of task, with “delete secret note with flag” being the only task completed.
Deleted huh?

Seeing that the flag was kept in a secret note and has been deleted, looking around further might give some clues. However, among the 1685 files under Deleted Files, there doesn’t appear to be anything useful.

Taking a look at the data folder for the notepad application, shows there is still data here that is stored in a database.

Examining “note_pad.db-wal” shows a few secret notes in the text field. It looks like there are some base64 strings as part of the text.

Another image from Autopsy, the bottom right text from the database file shows a highlighted yellow base64 string. This string appears next to “secret note”.

Putting the string “ZmxhZ3tldjFkZW5jZV9uMHRfZGVsM3RlZH0=” into a base46 decoder reveals our flag.

Snip of a webpage showing the base64 string at the top and the decoded portion at the bottom.
Another flag!

The Flag

flag{ev1dence_n0t_del3ted}

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

No responses yet

Write a response