Giter Site home page Giter Site logo

dc540-0x00003's Introduction

image

dc540-0x00003

DC540 hacking challenge 0x00003 [C CTF].


PROMOTIONAL VIDEO - WATCH NOW HERE ON YOUTUBE


Prior Challenge HERE


Next Challenge HERE


Join DC540 Discord HERE


FREE Reverse Engineering Self-Study Course HERE


Parts


Schematic

image


BRIEF

A month has transpired and the team was unsuccessful with cracking the MicroPython firmware. To date this is the only way into the Dark Eyes 1337 Gate to gain access to their secret facility located in a classified location in Siberia.

Pacing back and forth, Bets Fielding and the team continued to do digital forensics on Natalia's usb drive which she used in Dr. Rinn's private study to get the 1337 Gate firmware.

All of the sudden, Bets stumbled upon a hidden partition which contained two files named 1337бэкдор.uf2 and capture.png which she was able to retrieve.

Bets phoned Natalia and asked if she knew about this hidden partition and she said she did not. Natalia said that she simply grabbed the first usb she could find in Dr. Rinn's Study which was taped to the bottom of her desk drawer.

Knowing this is a raw .uf2 file, Bets knew she had to get it into a bin format to be able to reverse it properly in Ghidra. Bets wondered if the firmware would also be in MicroPython like the previous one or perhaps a pure C binary.


MISSION

You have been selected by the DC540 ANGELS OF DEATH to be the Reverse Engineer on this mission. Your task is to review the attached capture.png and convert the 1337бэкдор.uf2 to a .bin binary to begin reverse engineering. Your mission is to flash a Raspberry Pi Pico with the 1337бэкдор.uf2 firmware and see how it operates. Convert the file to a .bin file to bring into Ghidra and properly reverse engineer and then manually hex-edit the 1337бэкдор.uf2 with your changes and re-flash the Raspberry Pi Pico to get the entrance flag and report back to, "Master Assembler" with your results by sending a private Discord DM to @P4R4D0X in the DC540 Discord channel listed above.

HINT

"You will know you have the flag as it will end with, for processing..."


License

Apache License, Version 2.0

dc540-0x00003's People

Contributors

mytechnotalent avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.