Monday 30 March 2020

Stego: Monstrosity writeup: Challenge

Monstrosity stego write up

Tools:

1. tweets_analyzer (https://github.com/x0rz/tweets_analyzer)
2. prettyJSON.py (https://gist.githubusercontent.com/pdelteil/45b8ce2c13956bd94a963681a976122c/raw/7a994e939116c0a710e4550e58027709113e838a/prettyJSON.py)
3. GPS visualizer

Steps:

1. Use tweet analyzer to get tweet data from given twitter account. Command used "python tweets_analyzer.py -n miounster --limit 3000 -s".
2. short cooridinates from analyzed tweets. Command used "python prettyJSON.py tweets/miounster/2018–01–10_17–12–13.json | grep -A 2 "coordenadas \": \ ["| grep" \. "| sed 's /, // g' | sed 's / // g' | rs 0 2 | sed 's / /, /' > muestra.txt"

3. Use gps visualizer to read coordinates on the map. It gives  407180f14EBB5D998E0083034ED9A21B.
4. search this md5 on google to get the string. And the string is "covertops".

Commands:

1. analyze last 300 tweets from the miounster twitter account. python tweets_analyzer.py -n miounster --limit 3000 -s.
2. python prettyJSON.py tweets/miounster/2018–01–10_17–12–13.json | grep -A 2 "coordenadas \": \ ["| grep" \. "| sed 's /, // g' | sed 's / // g' | rs 0 2 | sed 's / /, /' > muestra.txt

Flag:

HTB{covertops}

Reference:

1. https://forum.hackthebox.eu/discussion/1404/monstrosity-stego
2. https://forum.hackthebox.eu/discussion/525/monstrosity

Video:



No comments:

Post a Comment