LabyREnth Capture the Flag (CTF) Hints

Richard Wartell


Category: Events

Unit 42 CTF 1

The LabyREnth capture the flag challenge is only open for four more days, but you still have a chance to participate. To help you get started, or move on to the next challenge, our threat research team put together a number of (sometimes cryptic) hints. Whether you’ve been stuck on a challenge and want to move on to the next one, or want to jump in during the final stretch, look no further:

Windows 1:

Watch out for those debugging checks, these XORs aren’t too hard…

Windows 4:

Try harder, with a vengeance! … Or a napkin! … Or a brute forcer!

Unix 1:

How many levels deep does it go?!?! I’d say script it, or maybe bash one liner if you’re extra cool…

Unix 2:

The Program only does one thing, HTTP request and print. Figure out how that HTTP request works…

Docs 1:

Use the URL for hints on how to decode part of the URL this naughty macro attempts to download from.  Could be base64 and XOR 😉

Docs 4:

LabyREnth Hints 1

Mobile 1:

That seems like a lot of bytes for a call…what do you think RDX?

Mobile 3:

Decompile -> Find -> Replace -> Profit

Threat 1:

sed -e ‘s/\&L4bry1nth_.*\?//g’

Threat 2:

AAAAAAAAAAA!!!! Compression AAAAAAAAAAA!!!!

Random 1:

Give that environment variable a drink!

Random 3:

Step 1: SYN packet sequence numbers; Step 2: Embedded ZIP; Step 3: Profit!

1 Reader Comment

  1. Hello, will you provide full solutions, like the Fireeye guys did on their flare-on challenge?

    Thanks.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.


© 2018 Palo Alto Networks, Inc. All rights reserved.