Wolvctf Writeup
WOLV CTF 2024
Beginner
Web: The Gauntlet
Description Can you survive the gauntlet? 10 mini web challenges are all that stand between you and the flag.
Note: Automated tools like sqlmap and dirbuster are not allowed (and will not be helpful anyway). https://gauntlet-okntin33tq-ul.a.run.app
Solution
1
2
Landing page and inspect the source code.
Have hidden path
The page now need to perform same task.
Pwn: babypwn
Just a little baby pwn. nc babypwn.wolvctf.io 1337
Forensics: Hidden Data
WOLPHV sent me this file. Not sure what to comment about it
==wctf{h1dd3n_d4t4_n0T_s0_h1dD3N}==
Misc
Sanity Check
Join the Discord and read the #rules
Happy Hacking and Go Blue! ==wctf{4_c0py_4nd_p4s+3_r4c3}==
Made Sense
i couldn’t log in to my server so my friend kindly spun up a server to let me test makefiles. at least, they thought i couldn’t log in :P https://madesense-okntin33tq-ul.a.run.app
Forensics
Eternally Pwned: Infiltration
I recently had my passwords and other sensitive data leaked, but I have no idea how. Can you figure out how the attacker got in to my PC?
1
By reading all the action, we can see that this user being attack via smb which might be cause from eternal blue.
Decode all base64 and get the flag. ==wctf{l3tS_3teRn4lLy_g0_bLU3_7n9wm4iWnL}==
Eternally Pwned: Persistence
I get that the attackers were in my PC, but how did they achieve persistence?
MEMORY.DMP:
1
Looking into cmdline and pslist and notice that one suspicious file being execute. Actually im stuck here since my volatility cannot dump that file. But one of friends said dont overthinking. I just put into decode and it appear to have new link. :X
==wctf{v0lAt1l3_m3m0ry_4qu1r3D_a3fe9fn3al}==
Eternally Pwned: Exfiltration
Ok yeah, they are definitely in the machine. But how did they manage to take my data?
You will likely find both the packet capture from Eternally Pwned: Infiltration and the memory dump from Eternally Pwned: Persistence to be useful
==wctf{ahk-5cr1pt5-4r3-d4ng3r0u5-dirmgaiwpd}==
Site Secret
There’s been a secret flag on this website the whole time???
That’s an interesting background…
Web
Bean Cafe
This cool cafe offers a super secret menu! But it’s being guarded by some AI detection systems. Hopefully we can get through it to try the coffee…
Note: Automated tools like sqlmap and dirbuster are not allowed (and will not be helpful anyway). https://bean-cafe-okntin33tq-ul.a.run.app
Upload Fun
I made a website where you can upload files.
What could go wrong?
Note: Automated tools like sqlmap and dirbuster are not allowed (and will not be helpful anyway). https://upload-fun-okntin33tq-ul.a.run.app
Osint
WOLPHV I: Reconnaissance
100 dree_
A new ransomware group you may have heard about has emerged: WOLPHV
There’s already been reports of their presence in articles and posts.
NOTE: Wolphv’s twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges
This is a start to a 5 part series of challenges. Solving this challenge will unlock WOLPHV II: Infiltrate
1
Long journey enough but their twitter group @wolphvgroup make some post that point to out of scope. Since this is osint challenge, reading through all comment and find one account @joeosint_ with noted need to investigate. The result was rot13 + base64.
==wctf{0k_1_d0nT_th1Nk_A1_w1ll_r3Pl4c3_Us_f0R_4_l0ng_t1me}==
WOLPHV II: Infiltrate
Since the WOLPHV twitter/x is out of comission now, I wonder where else the official WOLPHV group posts on social media. Maybe we can also infiltrate what they use to message each other
NOTE: Wolphv’s twitter/X account and https://wolphv.chal.wolvsec.org/ are out of scope for all these challenges. Any flags found from these are not a part of these challenges
Solving this challege will unlock WOLPHV III, WOLPHV IV, and WOLPHV V