Challenge description
Note: you must launch a challenge instance in order to view your disk image download link.
Download this disk image, find the key and log into the remote machine. Note: if you are using the webshell, download and extract the disk image into /tmp
not your home directory.
Category: Forensics
Solution
To start, click the “Launch instance” button for further instructions for the challenge.
As usual, I downloaded the provided file, and extracted the content with gzip -d
and binwalk -e
.
Having no idea what to look for just yet, I decided to first look up what the -i
option for ssh
means. Apparently, this option allow you to ssh
into remote machines with an identify file in place of inputting login credentials.
After some more digging, I found this medium post suggests that the file should be in a hidden .ssh
folder somewhere.
Let’s look for it with find | grep .ssh


Now to run the command the challenge provided, substituting “key_file” for “id_ed25519”. Running it just like that returned a warning:

Okay, let’s fix the file’s permission with chmod id_ed25519 600


One response to “picoCTF 2022 | Operation Oni Write-up”
[…] the same steps as from the previous challenge of this type, Operation Oni, I extracted the disk image. First, I tried to find a flag-related file with find | grep […]
LikeLike