🔬
CTFs
  • 🚩nitrozeus's CTF Writeups
  • Tutorial
    • Install Windows 10 VM on M1 Mac
  • My Notes
    • Capture-The-Flag
      • Windows Forensics
      • Memory Forensics
      • Base32, Base64
      • Steganography
      • Email Analysis
      • Malware Analysis
      • MD4, MD5 Cracking
      • Social Engineering
      • OSINT
      • Google Dorking
      • Reconnaissance
      • Port Scan (nmap)
  • 2023
    • 🧠BrainHack CDDC 2023
      • Gallery
      • Eazy Network Analysis
      • What the hell happened to the PC?!
      • Audio Steganography
  • 2022
    • 🐱Grey Cat The Flag 2022
      • Parcel
      • Memory Game (Part 1)
      • Too Fast
      • Entry
      • Ghost
      • Firmware
      • Image Upload
      • flappy-js
    • ⛵STANDCON 2022
      • I Sea You (Part 1)
      • Locate Me
      • I Sea You (Part 2)
      • Trolley Trolling
      • A New Gateway
      • Walks like a cat, barks like a dog
      • Shark in the Ocean
      • Atlan Safe P1
      • Gift from Russia
      • Asmuth Shares
      • Memedump
      • Warmup Forensics
    • 🦁STACK the Flags 2022
      • Finding Nyan
      • New Task!
      • Hit you with that
      • Cobalt Struck
      • PyRunner
Powered by GitBook
On this page
  • Solution 1
  • Solution 2
  1. 2022
  2. Grey Cat The Flag 2022

Firmware

How often do we update our firm anyway? Hehe

PreviousGhostNextImage Upload

Last updated 2 years ago

Router firmware is a nice target to start your bug hunting journey. But you have to first understand how the firmware is loaded.

There is always a file in the firmware image that tells the router what services to start. Find this file.

MD5 (firmware.img.gz) = 488d36e3855f16972adec9067ca6deb2

Author: daniellimws

There are TWO ways to solve this challenge, and we will show both!

Solution 1

For this challenge, we were given an .img file, so the first this we did was open it with , and took a look inside. We noticed there was a bunch of folders inside and so we extracted it.

Looking inside that folder, we found the flag!!

Flag: grey{inittab_1s_4n_1mp0rt4nt_p14c3_t0_100k_4t_wh3n_r3v3rs1ng_f1rmw4r3}

Solution 2

Get-ChildItem -Path PATH_TO_YOUR_DIRECTORY -recurse 
| Select-String -Pattern "grey"

Flag: grey{inittab_1s_4n_1mp0rt4nt_p14c3_t0_100k_4t_wh3n_r3v3rs1ng_f1rmw4r3}

Given the challenge description, it gave us a hint on where to look for! In this case, it is the /etc/inittab. The tells the router what processes to start, and what actions to take when it starts!

After extracting the folders out, we can run a command that recursively search/find a string it directories, subdirectories and files!

Who updates their firmware anyway? Ain't nobody got time for that!

🐱
🐧
inittab
PowerShell
7zip
flag!!
PowerShell command