Operation Orchid
https://play.picoctf.org/practice/challenge/285
[[gunzip]] disk img
[[mmls]] disk img
DOS Partition Table
Offset Sector: 0
Units are in 512-byte sectors
Slot Start End Length Description
000: Meta 0000000000 0000000000 0000000001 Primary Table (#0)
001: ------- 0000000000 0000002047 0000002048 Unallocated
002: 000:000 0000002048 0000206847 0000204800 Linux (0x83)
003: 000:001 0000206848 0000411647 0000204800 Linux Swap / Solaris x86 (0x82)
004: 000:002 0000411648 0000819199 0000407552 Linux (0x83)
check 004 then 002 if need since 004 has uneven length and probably is the one of interest
yup seems like it, [[fls]] shows me the common linux root folders
$ fls -o 411648 disk.flag.img
d/d 460: home
d/d 11: lost+found
d/d 12: boot
d/d 13: etc
d/d 81: proc
d/d 82: dev
d/d 83: tmp
d/d 84: lib
d/d 87: var
d/d 96: usr
d/d 106: bin
d/d 120: sbin
d/d 466: media
d/d 470: mnt
d/d 471: opt
d/d 472: root
d/d 473: run
d/d 475: srv
d/d 476: sys
d/d 2041: swap
V/V 51001: $OrphanFilesnow check root and home
[[icat]] flag.txt.enc
encrypted huh
I tried putting the output into [[CyberChef]] and use magic to decode but that didn't work
i explored the disk with fls and then i thought of checking .ash_history
ayyyy now we know how the flag was encoded
i've seen AES256 before and i also know [[openssl]] has some encryption algos, but i have no idea what that command does other than it encodes it
so i ask by bestie bard to teach me about it
we just run the same command but with the
-d(decode) flagicat __ > tmpto have file output be put in tmpenter in
unbreakblepassword1234567as password
Last updated