Blood Bash 4

Challenge:

A sensitive file from De Monne was exfiltrated by mort1cia. It contains data relating to a new web portal they're creating for their consumers. Read the contents of the file and return the flag as flag{flag_goes_here}.

Username: bl0ody_mary
Password: d34df4c3

bloodbash.deadface.io:22

Solution:

There is a PDF file in the home directory with a name that appears to be related to the portal mentioned in the challenge:

$ ls -l

-rw-r--r-- 1 bl0ody_mary bl0ody_mary 12444 Sep 14 20:20 'De Monne Customer Portal.pdf'

The simplest way to get a local copy of the PDF is to Base64 encode it, copy the encoded payload to the terminal clipboard and finally paste and decode it locally:

$ base64 De\ Monne\ Customer\ Portal.pdf

JVBERi0xLjYNJeLjz9MNCjExIDAgb2JqDTw8L0xpbmVhcml6ZWQgMS9MIDEyNDQ0L08gMTMvRSA4
...

Highlight the entire output, copy it to the clipboard and paste it into a new local file. Finally, decode the payload and open the PDF.

$ base64 -D temp.bin > file.pdf

Opening the PDF reveals the flag:

Published:

Updated:

Leave a comment