Wargames 2018 – Teka Teki Pakcik Bawang

Hi readers, during a CTF we (Shah and myself) participated this year, we were given a URL which is only accessible via Tor Browser. While browsing through the web application, I noticed that there was a page called “Flag”. However, it only gave us a hint on how we could retrieve the flag as shown in the figure below:

Hint

While working on another challenge, we then noticed that a new hint was released and it mentioned:

Information Gathering: where do we run our CTF infra.

From the hint above, we then identified all the domains IP address and below is the information we gathered:

d2018.wargames.my       68.183.226.119
gooble.wargames.my 68.183.191.52
phpsbox.wargames.my 178.128.211.120
waf2.wargames.my 167.99.72.178
hackerman.wargames.my 68.183.229.27

Upon getting the information, we used an online tool called ipinfo.io to get the segment/route information as shown in the figure below:

Route information of 167.99.72.178

With the route information, we then used NMAP to scan port 80 and grep the HTTP title. Below command was used:

nmap --script http-title -sS -p 80 167.99.64.0/20 -oN 167.99.64.0.txt

Once the scan has been completed, we used “grep” to get the title information as shown in the figure below:

Grep information

Since now we have the IP, we could just access via any web browser and view the flag in plaintext as shown in figure below:

Flag

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.