Home >

Huntress CTF > Medium Challenges

Back <> Next

A threat actor exposed an open directory on the public internet! We could explore their tools for some further intelligence. Can you find a flag they might be hiding?

NOTE: This showcases genuine malware samples found a real opendir. For domain reputation purposes, this is behind Basic Authentication with credentials: opendir:opendir

Here we are given a webserver to interact with. Visiting the webpage, and entering the username and password, we find a list of files and one directory being hosted. The directory ‘sir/’ stood out right away, so we inspected that to start. This directory contained a number of other directories and executables, however again one stood out :‘64_bit_new/’ and we decided to check in there. Among the files in this directory there was one txt file, which we decided to open and do a search for ‘flag{’. Sure enough, there it was!

opendir1

We also decided to take a more streamlined approach to this and decided to download all the files with a simple wget command from linux:

wget -r --http-user=opendir --http-password=opendir http://chal.ctf.games:30014/

we then were able to retrieve the flag with a simple grep command:

grep -ri 'flag{'

opendir1

Back <> Next