Pursue The Tracks

Description

POINTS: 450 DIFFICULTY: easy

Luxx, leader of The Phreaks, immerses himself in the depths of his computer, tirelessly pursuing the secrets of a file he obtained accessing an opposing faction member workstation. With unwavering determination, he scours through data, putting together fragments of information trying to take some advantage on other factions. To get the flag, you need to answer the questions from the docker instance.

Solution

We are given raw MFTarrow-up-right file which we have to parse and then submit answers using netcat.

Till last question I used: analyzeMFTarrow-up-right to parse the results. (-o flag is important to output files! RTFM) For last question I was getting nowhere, I hardly found any docs mentioning the information needed and then I found https://github.com/omerbenamram/mftarrow-up-right parser, which mostly displays all information about MFT.

from pwn import remote, context
import sys

context.log_level = 'DEBUG'

IP = sys.argv[1]
PORT = sys.argv[2]

io = remote(IP, PORT)
io.sendlineafter(b'> ', b'2023,2024')
io.sendlineafter(b'> ', b'Final_Annual_Report.xlsx')
io.sendlineafter(b'> ', b'Marketing_Plan.xlsx') # Inactive
io.sendlineafter(b'> ', b'1') # Dot File
io.sendlineafter(b'> ', b'credentials.txt')
io.sendlineafter(b'> ', b'Financial_Statement_draft.xlsx') # Probably Copy
io.sendlineafter(b'> ', b'Project_Proposal.pdf') # ??? ~5files 
io.sendlineafter(b'> ', b'Annual_Report.xlsx') 
io.sendlineafter(b'> ', b'57344')

io.interactive()

# HTB{p4rs1ng_mft_1s_v3ry_1mp0rt4nt_s0m3t1m3s}
chevron-rightinteraction.loghashtag
circle-check

Last updated