ConnectionChecker
[★☆☆] Tool
Description
Bob, the overworked system administrator, had always battled an unpredictable internet connection—one moment it’s there, the next it’s gone. In his search for a remedy, he stumbled upon a forum post by a genuinely good guy, a friendly coder who had whipped up a quirky little program designed to diagnose his connectivity woes. With a mix of hope and skepticism, Bob ran the tool, only to be met with an eerie silence. At least it seemed so.
Solution
Decompile the JAR file https://www.decompiler.com/jar/1733171726a0461f8765cd649f5516ce/CheckConnection.jar
Main file to focus right now is TestKt.java. Right off the bat we see first base64 encoded value, if decoded it's the first flag.
String start_token = "U0stQ0VSVHtqNHJfZDNjMG1wX2s3fQ==";Flag: SK-CERT{j4r_d3c0mp_k7}
[★☆☆] Lies
Description
It turns out Bob wasn’t lucky after all. This tool isn’t a helpful diagnostic. Can you reveal its true purpose?
Solution
After following some logic we see another obfuscated used

deobfuscate by running the code and get second flag
Flag: SK-CERT{k3y_f0r_c253rv3r}
[★☆☆] Executer
Description
It seems that this "tool" is executing a payload. Can you determine what it does?
Solution
Following piece of code is connecting to C2 server
output.println(encodedData); sends the message to C2 server and then String response = input.readLine(); reads the response.
Encoded data is just String encodedData = base64(hash + '|' + new String(s, Charsets.UTF_8));; Hash is already hardcoded so we know it, s is the second flag and finally base64 encode;
Get readable code
Use ChatGPT to reverse engineer without struggle
Replace exec with print
Flag: SK-CERT{py7h0n_p4yl04d}
Last updated