Self Destruct

Original Writeup on seall.dev
The description says:
The attachment is a VirtualBox image. Do not run it outside VirtualBox. It is recommended to backup the .vdi file before launching the VM.
I downloaded the .vdi
and then extracted it with 7Zip to a .img
as I find working with disk images in Autopsy far easier than running the image called ‘Self Destruct’.
Once loaded in Autopsy, I exported all the files to Export
.
I manually found 2 flag parts in /img_0.img/home/kashictf/.sush_history
and /img_0.img/home/kashictf/.bash_history
:
ls
echo "fLaG Part 3: 'eserve_roo'"
exit
and
ls
echo "fLaG Part 5: 'ht??_No_Er'"
exit
after noticing the trend, I used powershell with a recursive search to locate the remaining parts:
kashiselfdestruct\Export> Get-ChildItem -Recurse | Select-String -Pattern "fLaG Part" -CaseSensitive:$false
25-etc\hosts.allow:7:# fLaG Part 1: 'KashiCTF{r'
25-etc\kernel-img.conf:1:# Kernel image management overrides fLaG Part 4: 't_Am_1_Rig'
25-etc\sudo.conf:35:# fLaG Part 6: 'r0rs_4ll0w'
4-home\kashictf\.bash_history:2:echo "fLaG Part 5: 'ht??_No_Er'"
4-home\kashictf\.sush_history:2:echo "fLaG Part 3: 'eserve_roo'"
7083-usr\bin\sush:34:lsdirvdirgrepfgrepegreprgrepfLaG Part 7: 'ed_Th0}'
7083-usr\bin\sush:36:fLaG Part 2: 'm_rf_no_pr'sush: tokenization buffer allocation errorsush: cd: no such file o
Flag: KashiCTF{rm_rf_no_preserve_root_Am_1_Right??_No_Err0rs_4ll0wed_Th0}
Related Writeups
RWX Bronze
We give you file read, file write and code execution. But can you get the flag? Let's start out gently. NOTE: If you ge ...
RWX Silver
We give you file read, file write and code execution. But can you get the flag? Apparently that was too much!
Mafia at the End of the Block 1
You're an agent, your unit recently intercepted a mob discussion about an event that's going to take place on August 8, ...