Monstrosity stego write up
Tools:
1. tweets_analyzer (https://github.com/x0rz/tweets_analyzer)2. prettyJSON.py (https://gist.githubusercontent.com/pdelteil/45b8ce2c13956bd94a963681a976122c/raw/7a994e939116c0a710e4550e58027709113e838a/prettyJSON.py)
3. GPS visualizer
Steps:
1. Use tweet analyzer to get tweet data from given twitter account. Command used "python tweets_analyzer.py -n miounster --limit 3000 -s".2. short cooridinates from analyzed tweets. Command used "python prettyJSON.py tweets/miounster/2018–01–10_17–12–13.json | grep -A 2 "coordenadas \": \ ["| grep" \. "| sed 's /, // g' | sed 's / // g' | rs 0 2 | sed 's / /, /' > muestra.txt"
3. Use gps visualizer to read coordinates on the map. It gives 407180f14EBB5D998E0083034ED9A21B.
4. search this md5 on google to get the string. And the string is "covertops".
Commands:
1. analyze last 300 tweets from the miounster twitter account. python tweets_analyzer.py -n miounster --limit 3000 -s.2. python prettyJSON.py tweets/miounster/2018–01–10_17–12–13.json | grep -A 2 "coordenadas \": \ ["| grep" \. "| sed 's /, // g' | sed 's / // g' | rs 0 2 | sed 's / /, /' > muestra.txt
Flag:
HTB{covertops}Reference:
1. https://forum.hackthebox.eu/discussion/1404/monstrosity-stego2. https://forum.hackthebox.eu/discussion/525/monstrosity
No comments:
Post a Comment