tkh4ck.github.io

Personal website and blog of tkh4ck

View on GitHub

HCSC 2025 - The Silent Terminal

Description

Deep within an abandoned server network, a secret terminal lies hidden, accessible only to those who know the right key. However, amidst the signals flowing through the network, someone has carelessly left behind a small piece of information that could grant access. The secret the system tried to conceal is now out in the open for all to see, but only the observant ones will find it.

Password for the ZIP archive: hcsc2025

10.10.1-9.12:9239

SHA1: ad4bbf5e40af8bda394cd8ac8310899d844db1c7
SHA256: 60de2de13933d978cdc36137ee2f91589053856902250bbde8c887ed2e77e13d

Metadata

Solution

We got a network capture file which we can open in Wireshark.

If we follow the TCP streams, tcp.stream eq 32 will give us a telnet session where we can see the plaintext credentials: john / CUReatOP

Telnet credentials

Now we can use nc to access the service and get the flag.

$ nc 10.10.4.12 9239
Enter username: john
Enter password: CUReatOP
HCSC{Pl41n_T3xT_Tr4nSf3r_1s_R1sKy}

The flag is: HCSC{Pl41n_T3xT_Tr4nSf3r_1s_R1sKy}