🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Briefing L03 C04
  • The Final Countdown
  • Scoreboard
  1. WiCYS CyberStart
  2. Chapter 3 - Barcelona In the thick of it

WiCYS CyberStart (Barcelona) Challenge 4

PreviousWiCYS Cyberstart (Barcelona) Challenge 3NextTechnical Cyber articles

Last updated 3 years ago

Briefing L03 C04

The Final Countdown

The main tourism website for Barcelona has been hacked. They’ve devised a program that changes the content of the website based on a timer. You can imagine the confusion this has been causing the sites visitors! Can you figure out how we can get the secret code to stop this program from running?

Tip: The characters at the 5 URLs change quickly, but computers can be far quicker than humans, especially when getting data!

Proceeding to the challenge, we are given a set of links

So what's the objective?

Clicking on each of the 5 links (under the timing section) gives us 5 different strings, which together form a passphrase.

The challenge here is that the strings need to be collected in under 10 seconds and inserted as parameters in the validation link

How do we collect the strings effectively?

cURL to the rescue again!

Step 1 - curl all the links to get the strings we want (do not list each of them in separate lines!)

Why? — we are aiming to collect data from the websites. In this case, we are using curl to aid us.

curl https://roambarcelona.com/clock-pt1?verify=Na2Q%2BeqhSP5hTRLDwpTNoA%3D%3D https://roambarcelona.com/clock-pt2?verify=Na2Q%2BeqhSP5hTRLDwpTNoA%3D%3D https://roambarcelona.com/clock-pt3?verify=Na2Q%2BeqhSP5hTRLDwpTNoA%3D%3D https://roambarcelona.com/clock-pt4?verify=Na2Q%2BeqhSP5hTRLDwpTNoA%3D%3D

It should look something like this. Keep this ready, before the timer is up

Step 2 - Take the validation link and open it in another browser. Clear the string parameter and leave it empty

https://roambarcelona.com/get-flag?verify=Na2Q%2BeqhSP5hTRLDwpTNoA%3D%3D&string=

Execution Time!

Run the curl command (when timer resets to 10) and quickly insert the generated passphrase from the CLI to the end of the validation string

Voila, you get your flag!

Flag — wh1te_Ro$E

Scoreboard

Well fellow gamers, my internship time is up, as I am on a free CyberStart license (up to 3 levels only). I had a great time completing challenges (both easy and challenging) and drafting writeups for the same. Hope you enjoyed the time spent on CyberStart.

Until then, farewell. Stay connected on my socials (given at the top of this page). Dropping a sweet message would make my day

💒