Security

ZeroDays CTF 2018 – “JonSnow” Challenge

ZeroDays CTF 2018 – “JonSnow” Challenge

Capture The Flag, Security
The "JonSnow" challenge under the “Reverse Engineering” category of the ZeroDays Capture the Flag 2018 event was pretty interesting as it took me some time to realize what was obvious. So to start with, the challenge description went as follows: You know the flag? Tell me what you know Jon Snow? The first thing to see was what the file was by using the command "file": When I saw that this was a 64-bit ELF, I knew that I won't be able to play around because I was using a 32-bit Kali during the event! Talk about not being prepared. So, here I am, not being able to sleep soundly just like my OSCP days because an unsolved challenge gave me nightmares. The only thing that I was able to do apart from the "file" command was using "strings" but it honestly did not make sense:
ZeroDays CTF 2018 – “edgescan” Challenge

ZeroDays CTF 2018 – “edgescan” Challenge

Capture The Flag, Security
The "edgescan" challenge under the "Reverse Engineering" category of the ZeroDays Capture the Flag 2018 event was pretty straightforward although I wasn't able to solve it during the actual event due to time pressure. So to start with, the challenge description went as follows: So edgescan kindly sent us a small challenge, we've tweaked it slightly. Enter the key to get your flag. Enjoy! Clues: The flag is in the usual format. The flag message is XORed with the key (12 chars). The first clue says "The flag is in the usual format" which means, it should be in the format of ZD2018{???????????????????} as per example flags given in the event. The second clue on the other hand says that the flag message is XORed with a 12-character key. During the event, I actually thought tha
CCNA CyberOps Experience

CCNA CyberOps Experience

Security
The 'Cisco Certified Network Associate - Cybersecurity Operations' program has been quite of a ride! Coming from a software development background, it wasn't really my interest getting into computer networks but hey, Cisco offered the training and certification FREE of charges for qualified people! How cool is that? So, yes! I tried applying for the scholarship and blessed to be accepted! What is it? CCNA CyberOps is the newest version of the CCNA path as of the time of writing this article. This CCNA version specifically leads to understanding the basics in cybersecurity which discusses more about general network security and security operations. As of this day, this path doesn't have the Cisco Certified Network Professional (CCNP) and obviously Cisco Certified Internet Expert (CCIE...
ASUS Responsible Disclosure – SQL Injection

ASUS Responsible Disclosure – SQL Injection

Security, Vulnerabilities
My CCNA CyberOps scholarship has finally ended which means more time to fool around in the internet! Yey! So recently, I decided to pursue some bug hunting because it has been a while since my last "capture the flag" practice and am already forgetting how to use tools in Kali. This made me look for some popular sites and led me to visit asus.com. After some information gathering, I came across the domain etrip.asus.com which then forwarded me to a Javascript file etrip.asus.com/eTrip/HO-js.js. Reading the script showed another file with a .jsp extension which had some parameters. I first visited the link without any parameters as I didn't really know what values are marked 'correct' in the system. After visiting, it just spitted out the source code which made me say "Wow! Tha...
SickOS 1.2 Walkthrough

SickOS 1.2 Walkthrough

Penetration Testing, Security
Since I have managed to put down SickOS 1.1, I guess the next challenge would be visiting SickOS 1.2. After setting up the machine through VMWare, an initial Nmap scan towards 192.168.209.161 (Address of SickOS 1.2) has shown the following output: By the results shown, only two TCP ports were open. One SSH and another one is an HTTP service. Firing up Mozilla in Kali and typing in the IP address 192.168.209.161 should give us this output: The next things to do were: Check robots.txt (Not found) Check source code of web page (Nothing really useful) Use dirb Use HTTP Nmap scripts against the main directory (Nothing really useful)   Looking at the HTTP headers when browsing the website, it was also found that the server was using lighttpd 1.4.28 (als...