Sender - Cybrics Quals 2019
For this challenge, we have a link with some intercepted data:
It's the traffic incerception of a mail sent from fawkes@ugm.cybrics.net
. The
body of the mail is encoded with the quoted-printable encoding. Let's save it in
a file and decode it:
So we do have the password for an archive. After a bit of thinkering I thought
to search if there are received mails. The default port for POP3
is 110, so
let's try:
Let's read the mail with RETR 1:
The mail contains an attachment called secret_flag.zip
. Let's use tee
to
write the output of netcat to a file:
nc ugm.cybrics.net 110 | tee received-mail
and run the previous commands to authenticate and retrieve the mail.
We now have to use an editor to extract the base64 encoded attachment, so delete the lines from 1 to 34 and from 1899 to 1901. We also have to remove the line endings to obtain a valid base64 string.
I personally use vim and the command to remove all line endings is :%s/\n//g
.
Let's create the archive and extract it:
Even if base64 -d
says that the input is not valid, it's because cat
adds a
new line at the end.
Opening the PDF file we find the flag:
Flag
cybrics{Y0uV3_G0T_m41L}