Archive for Cyber Security

BlueHens CTF 2022 MCU – Geoguesser OSINT – Historical Ciphers Writeup

Prompt: This problem brought to you by GRUMBOT Who Framed Jessica?
_JOCRQ{1t_jd5_ir1jr_ll1kcc_a11_n10qv}
Find the location of this photo to use as the key to decode our flag.

I participated in the BlueHens CTF 2022 on the weekend of Oct 28th 2022. While this event was several months ago, I still wanted to share my write-ups from my favorite challenges.

Read more

CTFLEARN Milk’s Best Friend

Prompt: There’s nothing I love more than oreos, lions, and winning. https://mega.nz/#!DC5F2KgR!P8UotyST_6n2iW5BS1yYnum8KnU0-2Amw2nq3UoMq0Y Have Fun 🙂

Read more

CTFLEARN Git Is Good Writeup

Prompt: The flag used to be there. But then I redacted it. Good Luck. https://mega.nz/#!3CwDFZpJ!Jjr55hfJQJ5-jspnyrnVtqBkMHGJrd6Nn_QqM7iXEuc

Read more

CTFLEARN Exif Writeup

Prompt: If only the password were in the image?

https://mega.nz/#!SDpF0aYC!fkkhBJuBBtBKGsLTDiF2NuLihP2WRd97Iynd3PhWqRw You could really ‘own’ it with exif.

Read more

CTFLEARN: BruXOR Writeup

Prompt: There is a technique called bruteforce. Message: q{vpln’bH_varHuebcrqxetrHOXEj No key! Just brute .. brute .. brute … 😀

Read more

CTFLEARN: Don’t Bump Your Head(er) Writeup

Prompt: Try to bypass my security measure on this site! http://165.227.106.113/header.php

Read more

CTFLEARN: Hextroadinary Writeup

Prompt: Meet ROXy, a coder obsessed with being exclusively the worlds best hacker. She specializes in short cryptic hard to decipher secret codes. The below hex values for example, she did something with them to generate a secret code, can you figure out what? Your answer should start with 0x.

0xc4115 0x4cf8

Read more

Practical Linux Topics: GnuPG

Today I am going to be looking GnuPG as a continuation of my delve into Practical Linux Topics. As described on https://www.gnupg.org/, GnuPG is a free implementation of OpenPGP which is used to encrypt and sign data and communications using a public/private key infrastructure. It can be used to encrypt and digitally sign emails, encrypt files, and to secure SSH tunnels. In this post I am going to look at some fundamental configuration and usage of GnuPG for encryption.  

Read more

Practical Linux Topics: Data Destruction

When running a server of any volume, it is likely that there is sensitive data stored on it. Knowing how to destroy that data with confidence is an important skill for any system admin. Luckily Linux has several utilities that can be used to securely wipe partitions, drives, and even an entire server. The tools that I will be looking at are shred, dd, wipefs, and DBAN.

Read more

Preventing “The Big Hack”

One of the biggest tech stories in recent days was an investigative piece by Bloomberg called, “The Big Hack.” In a nutshell, the story is about how China used its access to the American supply chain of motherboards to plant a chip the size of a grain of rice. The goal of this chip according to the story was “telling the device to communicate with one of several anonymous computers elsewhere on the internet that were loaded with more complex code; and preparing the device’s operating system to accept this new code (Robinson & Riley, 2018)”. This isn’t so different from what a rootkit does, but what makes this story so alarming is the fact these devices were vulnerable out of the box. This isn’t unheard of when counterfeit products are purchased on accident, but these devices were given the stamp of approval from their manufacturer and seller. Read more