Home >

Huntress CTF > Medium Challenges

Back <> Next

For this challenge, we are given a file ‘main.7z’ to download and extract, as well as a webserver to spin up. Once extracted we find that the file is an ELF64-bit binary (we see what you did there). We decided to deompile the binary using Ghidra and found it was using curl to access the webserver, as well as some interesting variables containing hex:

0x2f616c6c697a6f4d
0x6562333920302e35
0x3762372d62353464
0x392d373930342d30
0x346138392d393732
0x6533353330666561

speakfriend1

Once we decoded the hex, we retrieved a user agent string, and after some tinkering with the various curl options, we were able to curl the webserver with the decoded user agent string and retrieve the flag!

curl -k -L -A 'Mozilla/5.0 93bed45b-7b70-4097-9279-98a4aef0353e' https://chal.ctf.games:32313

speakfriend2

Back <> Next