ESGISECURITYDAY - DeadEnd
06 Apr 2018description: Pas mal pour un Skid. Bah qu’est ce que tu attends, tu as son IP, son port. Alors go ! Rejoins M0th3r !
category: Forensic
The challenge was available at ctf.hacklab-esgi.org
on port 8083
. We can use netcat
to connect to the service, it is asking for an host and a port. We supposed it would try to connect back or at least pung back. I put my VPS IP and the port 4242
.
As expected we got a connect back from the challenge, revealing a sensitive data about it. The DeadEnd challenge is using Paramiko
, a python library to interact with ssh
. We set up a honeypot called sshesame
from https://github.com/jaksi/sshesame.
We force sshesame to listen on port 22, and we wait for the connect back, if everything is working correctly we may get some credentials.
Here we see the credentials, and after connected it try to write the flag inside the /tmp/flag
.