Security Unveiled – Yukthi CTF 2024 Finals

Introduction

The “Security Unveiled” challenge in the Yukthi CTF 2024 Finals offered an immersive experience, focusing on advanced digital forensics, credential recovery, and exploiting vulnerabilities. Participants engaged with real-world cybersecurity issues, gaining hands-on experience with critical skills required to secure privileged access in a simulated IT setting. Aspiring IT students can apply these techniques to their studies in Selfmade Ninja Lab’s cloud lab training, enhancing their practical cybersecurity knowledge

What You Will Learn

This challenge provided an in-depth look into various aspects of cybersecurity and digital forensics:

  • Disk image analysis and data recovery techniques.
  • Deciphering encrypted data to extract credentials.
  • Conducting network scans to identify service entry points.
  • Web application security testing to exploit vulnerabilities.
  • Real-world application of cybersecurity concepts in a CTF context.

Challenge 1: Credential Hunt

Story

Accepted into Bout Tech, an IT company devoid of a conventional hierarchical structure, the task at hand was to recover the previous maintainer’s work credentials from a raw image file left behind. This initial step was crucial for accessing the maintainer dashboard, pivotal for my new role.

Challenge Flow

  1. Disk Image Analysis: Starting with sdb1.img, the challenge involved mounting the image and exploring its contents.

    sudo mkdir /mnt/image_mount
    sudo losetup -fP --show ./sdb1.img
    sudo mount /dev/loop0p1 /mnt/image_mount
    cd /mnt/image_mount
    ls -l

    Disk Mounting

  2. Decrypting Data:

    Encountering data.json.enc, a file encrypted with OpenSSL, and discovering the .Trash directory, which led to the crucial find of report.docx. After converting the DOCX to a zip and extracting, bout.jpg was found.

    • Finding report.docx: DOCX to ZIP

    • Extracting bout.jpg: Using steghide, a decryption key was retrieved from bout.jpg.

      mv report.docx report.zip
      unzip report.zip
      steghide extract -sf bout.jpg

      Steghide Extraction Finding Decryption Key

  3. Credential Recovery: With the decryption key, the data.json.enc file was decrypted to reveal the username and password.

    openssl enc -aes-256-cbc -d -in data.json.enc -out data_decrypted.json -pass pass:jhdfe98hh

    Credentials found:

    {
    "username":"clat",
    "location":"us",
    "pass":"clat@098"
    }
  4. Accessing the Dashboard: After conducting a network scan, port 80 was found to be open. The recovered credentials allowed dashboard access, revealing the first flag.

    • Network Scan: Network Scan
    • Dashboard Access: Dashboard Access

      Getting into Admin Area

      After I logged in with the above credentials, I got my first flag in the dashboard section.

Challenge 2: Security Breach

Story

After getting into the system, I discovered I needed admin access to do my job. The website had two login methods: one with a username and password and another with a token sent to your email.

Challenge Flow

  1. Exploring Login Methods:

    The token-based login caught my interest, especially since I didn’t have the admin privileges required for deeper access.

  2. Finding an Admin User:

    I found an admin email, wilson@bout.com, which seemed like a lead to gaining admin access.

    Crafting the Token Request

  3. Token System Exploit: I noticed a flaw in the token system that allowed requesting a token for both my account and the admin’s with a single submission:

    wilson@bout.com&clat@bout.com

    Crafting the Token Request

  4. Receiving the Admin Token: The exploit worked, and I received an email with the admin token. Admin Token in My Email

  5. Admin Access Achieved:

    Armed with the admin token, I proceeded to log into the admin area of the website. This crucial step allowed me to navigate the secured sections and ultimately, locate the second flag. Successfully gaining admin access not only demonstrated the vulnerability within the token system but also underscored the importance of rigorous security practices in web applications.

Conclusion

The “Security Unveiled” challenge in Yukthi CTF 2024 Finals highlighted key cybersecurity strategies and vulnerabilities, offering an ideal scenario for students and professionals alike. Through Selfmade Ninja Lab’s cloud lab training, aspiring IT students can develop these critical skills, preparing them for real-world cybersecurity challenges. This CTF provided valuable insights into digital forensics, credential recovery, and web application security—skills crucial for maintaining robust, secure systems in today’s digital landscape.

Leave a Comment

Realted Blog >>

Send the Alien Back home
🛡 Deep Dive into Path Traversal with "Send the Alien Back Home" - Selfmade Ninja Lab Cloud Lab Training for Aspiring IT Students 🛡
Hey Ninjas! 🥷  Welcome to an in-depth write-up for the "Send the Alien Back Home" CTF challenge!...
A Blockchain OSINT Challenge
Case 118 Unlocked: A Blockchain OSINT Challenge Guide
Introduction Case 118 Unlocked presents an exciting blockchain-based OSINT challenge on the Binance Smart...
Pickle Portal
Exploring the Pickle Portal Challenge: Python and Linux Skills Enhancement with Selfmade Ninja Lab
Introduction The Pickle Portal Challenge offers a deep dive into essential programming and system management...
1 2 3 4
Scroll to Top