CTF recon 1-100pt write up

*****CTF recon (Points 1〜100)

*Ghost in the Shellcode 2014: one
Category: Recon Points: 1
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/ghost-in-the-shellcode-2014/one/README.md
Description:

What is the marking on the second train? https://www.youtube.com/watch?v=6lutNECOZFw

writeup
:動画をみる f:id:sakura818uuu:20161206100155p:plain
:flag

*CSAW QUALS 2015: trivia-2
Category: Trivia Points: 10 Solves: 963 https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/trivia/trivia-2/README.md
Description:

No More Free __!

writeup
:__にあてはまる語を考える
:" "No More Free" security "と検索
:bugsという単語が出てくる
:flag

*CSAW QUALS 2015: trivia-3
Category: Trivia Points: 10 Solves: 1021 https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/trivia/trivia-3/README.md
Description:

This mode on x86 is generally referred to as ring -2.

writeup
:"mode "ring -2" x86"と検索
:SMM(System Management Mode)という単語が出てくる
:flag

*CSAW QUALS 2015: trivia-4
Category: Trivia Points: 10 Solves: 1083 https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/trivia/trivia-4/README.md
Description:

This vulnerability occurs when the incorrect timing/sequence of events may cause a bug.

writeup
:"This vulnerability occurs when the incorrect timing/sequence of events may cause a bug."と検索
:Race condition - Wikipedia
:flag

*CSAW QUALS 2015: trivia-5
Category: Trivia Points: 10 Solves: 1016
https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/trivia/trivia-5/README.md
Description:

On Windows, loading a library and having it's code run in another process is called _ .

writeup
:"On Windows, loading a library and having it's code run in another process is called _ ."と検索
:Dynamic-link library - Wikipedia
:"Dynamic-link library vuln"と検索
:flag

*CSAW QUALS 2015: trivia-6
Category: Trivia Points: 10 Solves: 551
https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/trivia/trivia-6/README.md
Description:

This Pentesting expert supplied HBO's Silicon Valley with technical advice in season 2. The flag is his twitter handle.

writeup
:"HBO's Silicon Valley pentest"で検索
:Rob Fullerという単語が見つかる
:"Rob Fuller twitter"で検索
:https://twitter.com/mubix
:flag

*CSAW CTF 2016 Quals: Eric_Zhi_Liang
Category: Recon Points: 10
https://github.com/ctfs/write-ups-2016/blob/b60d9fa809f3caa09dae2b8cad3b1435a33f13c4/csaw-ctf-2016-quals/recon/eric-zhi-liang-10/README.md
Description:

We tried very hard to find Eric last year. You're going to have to try just as hard this year, since not even his friends can find him.

We heard Eric has his own subreddit. Can you find Eric for us?

writeup
*はてなブログredditのURLのリンクを挿入するとBad Requestを返すのでredditのURLは一部省略 :キーワードはEric(問題名からEric = Eric_Zhi_Liang)とsubreddit."Eric_Zhi_Liang subreddit"と検索
:reddit.com/user/theRealEricLiang/のサイトが出てくる。その中からreddit.com/r/creativecoding/comments/51fas9/has_anyone_worked_with_the_intel_edison/ より、Hackster Meetup in NYCに参加した
:"Hackster Meetup in NYC"と検索するとhttps://www.meetup.com/ja-JP/Hackster-NYC/のサイトがでてくる。メンバー>メンバー検索でEric>Eric Liangを選択>自己紹介に"I love fanfiction and Allen Lau!"
:"fanfiction and Allen Lau"と検索するとhttps://www.wattpad.com/user/allenlau :URLのuser名をEricに変更>https://www.wattpad.com/user/ericZhiLiang
:flag

*That Sounds Delicious
Category: Trivia Points: 15
https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/sCTF-2015/trivia/That%20Sounds%20Delicious/README.md
Description:

BLcvFJic
highlighting:none
expiration:never
exposure:unlisted

writeup
:"highlighting none exprination never exposure unlisted"と検索してpastebin関係と推測
:http://pastebin.com/の後ろにBLcvFJicを足して http://pastebin.com/BLcvFJic :flag

*ASIS Cyber Security Contest Finals 2014: Fact or Real?
Category: Recon Points: 25
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/asis-ctf-finals-2014/fact-or-real/README.md
Description:

ASIS_md5(motto)

writeup
:2014-01-01から2014-12-31の期間に絞って"asis fact or real"と検索
:https://twitter.com/factoreal/status/486459604973662208
:画像には"NO+$=YES"と書いてあるのでMD5ハッシュ値の計算をする

$ echo -n "NO+$=YES" | md5sum
d25b9c2f1c29e49e81e8fdfaf4d16fc6  -

:ASIS_の後に計算した値をつける
:flag

*IceCTF-2016 : complacent-40
Category: Recon Points: 40
https://github.com/ctfs/write-ups-2016/blob/274307f43140bb4a52e0729ecf1282628fb22f5b/icectf-2016/recon/complacent-40/readme.md

Description:

These silly bankers have gotten pretty complacent with their self signed SSL certificate. I wonder if there's anything in there.

writeup
*サーバー落ちてるのでURL(https://github.com/ctfs/write-ups-2016/blob/274307f43140bb4a52e0729ecf1282628fb22f5b/icectf-2016/recon/complacent-40/readme.md)のwriteupを参考に書きました
:問題文からSSL関係と推測
:この問題のURL:http://complacent.vuln.icec.tfhttps://complacent.vuln.icec.tfに変更
:flag

*ABCTF 2016 : archive-me-50
Category: Recon Points: 50 Solves: 360
https://github.com/ctfs/write-ups-2016/blob/274307f43140bb4a52e0729ecf1282628fb22f5b/abctf-2016/recon/archive-me-50/README.md

Description:

If you could look at our website from a while ago im sure the flag would be there...

writeup
:our website=http://abctf.xyz の少し前の状態をみるから推測してInternet Archive: Wayback Machineを使う
:ABCTF2016が開催されていた時間はFri, 15 July 2016, 18:23 UTC — Fri, 22 July 2016, 18:23 UTC.
:Internet Archive: Wayback Machinehttp://abctf.xyzと検索 :5月10日に記録されているのでリンクにとぶ
:flag

*ABCTF 2016 : drive-home-50
Category: Recon Points: 50 Solves: 378
https://github.com/ctfs/write-ups-2016/tree/192b20d12c296b810265e4df978d98b8704f211e/abctf-2016/recon/drive-home-50
Description:

We found this link scribbled on a piece of paper: document/1_TxYCrk5vIMlUjiB1OioXmR7b-Uq_a9aPIh9JyYlPNs/edit?usp=sharing. It is broken but we need you to fix it!

writeup
:GoogledocsのURLの後に文字列を追加
:https://docs.google.com/document/d/1_TxYCrk5vIMlUjiB1OioXmR7b-Uq_a9aPIh9JyYlPNs/edit
:flag

*CSAW CTF 2014: Fuzyll
Category: Recon Points: 100
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/csaw-ctf-2014/fuzyll/README.md
Description:

Unbeknownst to many, Fuzyll is actually the next Dendi. Like most of Reddit, he just needs better teammates first. He's not ranked yet, but his MMR would definitely be at least 10000. I mean, have you seen him play?

Written by fuzyll

writeup
:not yet

*CSAW CTF 2014: Julian Cohen
Category: Recon Points: 100
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/csaw-ctf-2014/julian-cohen/README.md
Description:

Figure out how to get Julian to go on a date with you.

HINT: Julian uses OkCupid

Written by HockeyInJune

writeup
:not yet

*CSAW CTF 2014: Kevin Chung
Category: Recon Points: 100
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/csaw-ctf-2014/kevin-chung/README.md
Description:

Find a picture of me that's from before I was a high school student. Submit the URL to the file on the internet

If you find an alternative to the file I'm thinking of, PM it to me on IRC and I'll consider it but use this site to check if it's right first :)

Written by ColdHeat

writeup
:not yet

*DEFKTHON CTF: Recon 100
https://github.com/ctfs/write-ups-2014/tree/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/defkthon-ctf/recon-100

Description:

Francis Alexander

writeup
:

*ECTF 2014: Meet the Team
Category: Recon Points: 80
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/ectf-2014/meet-the-team/README.md
Description:

writeup

*ECTF 2014: Eight Cats Hid the Flag
Category: Recon Points: 100
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/ectf-2014/eight-cats-hid-the-flag/README.md
Description:

writeup

*Ghost in the Shellcode 2014: phpcrypto
Category: Recon Points: 100
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/ghost-in-the-shellcode-2014/phpcrypto/README.md
Description:

writeup

*Ghost in the Shellcode 2014: CTF247
Category: Recon Points: 100
https://github.com/ctfs/write-ups-2014/blob/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/ghost-in-the-shellcode-2014/ctf247/README.md
Description:

writeup

*RuCTF 2014 Quals: Recon 100 - Favourite book
https://github.com/ctfs/write-ups-2014/tree/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/ructf-2014-quals/recon-100
Description:

writeup

*Volga Quals CTF 2014: Recon 100
Category: Recon Points: 100
https://github.com/ctfs/write-ups-2014/tree/b02bcbb2737907dd0aa39c5d4df1d1e270958f54/volga-quals-2014/recon/100
Description:

writeup

*CSAW QUALS 2015: eric-liang-100
Category: Recon Points: 100 Solves: 55
https://github.com/ctfs/write-ups-2015/tree/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/recon/eric-liang-100
Description:

Eric played ctfs with some friends a while ago.

Hint: I remember playing with them around 2014... err maybe 2013?

Hint: flag is in flag{} format

Hint: The flag can be found on a .edu website

writeup
:

*CSAW QUALS 2015: alexander-taylor-100
Category: Recon Points: 100 Solves: 424
https://github.com/ctfs/write-ups-2015/tree/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/recon/alexander-taylor-100
Description:

writeup

*CSAW QUALS 2015: julian-cohen-100
Category: Recon Points: 100 Solves: 883
https://github.com/ctfs/write-ups-2015/tree/9b3c290275718ff843c409842d738e6ef3e565fd/csaw-ctf-2015/recon/julian-cohen-100
Description:

writeup

*Haxdump CTF 2015: Amanda Parkside
Category: Recon Points: 100 Solves: 16
https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/haxdump-ctf-2015/recon/amanda-parkside/README.md
Description:

writeup

*School CTF Winter 2015: Highly professional
Category: Joy Points: 100
https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/school-ctf-winter-2015/joy/highly-professional-100/README.md
Description:

writeup

*Securinets Quals CTF 2015: Recon1
Category: Recon Points: 80 Solves:
https://github.com/ctfs/write-ups-2015/blob/9b3c290275718ff843c409842d738e6ef3e565fd/securinets-ctf-2015/recon/recon1/README.md
Description:

writeup

UIU CTF 2015: incertia
Category: Recon Points: 100 Solves: 17
https://github.com/ctfs/write-ups-2015/tree/9b3c290275718ff843c409842d738e6ef3e565fd/uiuctf-2015/recon/incertia
ABCTF 2016 : always-so-itchy-100
Category: Recon Points: 100 Solves: 218
https://github.com/ctfs/write-ups-2016/blob/274307f43140bb4a52e0729ecf1282628fb22f5b/abctf-2016/recon/always-so-itchy-100/README.md
Description:

Dialga1234 - Johnny Boy

writeup
:"Dialga1234"を検索
:https://scratch.mit.edu/users/dialga1234/
:https://scratch.mit.edu/projects/108998724/
:青い中を見るボタンを押す
:flag