Tag List Sign In

Wackademia / Finale #3

Should LUHack pull out of this event (yes/no)?

Wackademia / Speakers #3

What unconventional tool is this speaker going to use to battle rogue AIs?

Wackademia / Finale #2

What is the acronym for the elusive speaker's current employer? (answer should be uppercase)

Wackademia / Speakers #2

When did this speaker graduate? (answer should be YYYY-MM)

Wackademia / Speakers #1

What is the name of the speaker with a degree in Cyber/Computer Forensices and Counterterrorism?

Wackademia / Finale #1

How many Complimentary Conference Passes are being given to sponsors?

Wackademia / Sponsors #2

What is the lowest tier of sponsorship to get a keynote opportunity? (answer should be lowercase)

Wackademia / Sponsors #1

What is the hashtag for the conference?

Wackademia / Warm up #2

What is the email address of the lead organiser?

Wackademia / Warm up #1

What date is the Wackademia conference? (answer as YYYY-MM-DD)

Wackademia / Venue #3

Which clause of the contract sets out the penalty if the venue owners fail to "pay" for the venue? (answer as N.N)

Wackademia / Venue #2

Who is providing the venue? (answer should be lowercase)

Wackademia / Venue #1

What is the name of the venue? (answer should be lowercase)

Wackademia / Budget #3

How much is being spent on security? (answer should be formatted as a number to 2 decimal places, with no currency symbol, no thousands separators)

Wackademia / Budget #2

They seem to be splurging a little - from which company are they spending the most money with?

Wackademia / Budget #1

We've heard that the finances of Wackademia are ... concerning. How much are they spending on Food and Beverages for the whole event? (answer should be formatted as a number to 2 decimal places, with no currency symbol, no thousands separators)

Steg #8

[File]

Steg #7

[File]

Steg #6

Lorem ipsum dolor sit amet occaecat laborum culpa minim, qUis occaecat esse nulla. irure velit aliquip cillum deserunt enim nostrud lorem officia esse aliqua cupidatat laborum voluptate eu amet ea eu incididunt. ullamco repreHenderit ex lorem consequat quis cillum enim officia enim est Aliquip ad nostrud laborum dolor ex anim amet enim mollit nisi. et Commodo tempor dolor et ad proident elit aute elit temporK. exercitation culpa ut esse et aliqua ea qui magna. id do eu reprehenderit [...]

Steg #5

[File]

Steg #4

Compare the meerkats [Meerkat 1] [Meerkat 2]

Steg #3

[File]

Steg #2

[Files]

Steg #1

??? [File]

WEB CSRF

Kerry is naive and clicks on every link you send her, try using a csrf vulnerability to steal her money. Box: luhack-web-0 Port: 8083 Url: [http://100.110.89.151:8083]

WEB SSTI

Try exploiting the ssti to run arbitrary code and get the flag. Box: luhack-web-0 Port: 8084 Url: [http://100.110.89.151:8084]

WEB SQLI

Try exploiting the sqli to dump the users table. (sqlmap may be useful) Box: luhack-web-0 Port: 8085 Url: [http://100.110.89.151:8085]

WEB-BOX #6 - Albums

Any way to get me access to this new album from my favourite band? (This one is a little tougher!) Box: luhack-web-0 Port: 8082 Url: [http://100.110.89.151:8082]

WEB-BOX #5 - CSGO SKINS

My steam wallet is running low. I've tried all the logins we found previously. This might require something new? Box: luhack-web-0 Port: 8082 Url: [http://100.110.89.151:8082]

WEB-BOX #4 - Ricflix

I want free access to movies. Box: luhack-web-0 Port: 8082 Url: [http://100.110.89.151:8082]

WEB-BOX #3 - FBS

More passwords to find! Box: luhack-web-0 Port: 8082 Url: [http://100.110.89.151:8082]

WEB-BOX #2 - Login

You've found the login page for the site. Can you get access? Box: luhack-web-0 Port: 8082 Url: [http://100.127.159.170:8082]

WEB-BOX #1 - Pin

This is a basic pin brute force. You've been given access to this page with a 4 digit pin. Can you build a script to crack it? Box: luhack-web-0 Port: 8082 Url: [http://100.127.159.170:8082]

Web #6

You're not admin, are you? Box: luhack-web-0 Port: 8081 Url: [http://100.127.159.170:8081]

Web #5

Can you login to an account? (Try doing #4 first) Box: luhack-web-0 Port: 8081 Url: [http://100.127.159.170:8081]

Web #4

(broken, sorry. Try web-sqli instead) Can you inject the login page? Box: luhack-web-0 Port: 8081 Url: [http://100.127.159.170:8081]

Web #3

Hack the Network Test page. Box: luhack-web-0 Port: 8081 Url: [http://100.127.159.170:8081]

Web #2

Another easy one, just look and pretend you're a robot 👀 Box: luhack-web-0 Port: 8081 Url: [http://100.110.89.151:8081]

Web #1

This is an easy one, just look around... Box: luhack-web-0 Port: 8081 Url: [http://100.110.89.151:8081]

Privesc six

Read the flag of the root6 account

Privesc three

Break into the root3 account

Privesc two

Escalate to the root2 account

Privesc five

Escalate to the root5 account

Privesc four

Escalate to the root4 account

Privesc one

Escalate to the root1 account

Privesc zero

Escalate to the root0 account

Crypto #11

We've received the following transmissions and their encrypted couterparts: plain text According to all known laws of aviation: there is no way a bee should be able to fly. cipher plain text Once upon a time there was a lovely princess. But she had an enchantment upon her of a fearful sort which could only be broken by love's first kiss. cipher

Crypto #6

Crypto #5

TFVIYWNre2Jhc2U2NF9pc19lbmNyeXB0aW9uP30=

Crypto #2

4c554861636b7b636f6d706c6574656c795f68696464656e5f66726f6d5f73696768747d

Crypto #15

Decrypt the file to find the flag [locked.zip] A dictionary might come in handy...

Crypto #14

Decode the message to find the flag

Crypto #13

Can you decrypt the traffic? I'll be nice and even give you the keys! (Hint: Use Wireshark) Traffic: [crypto9.pcapng] Keys: [ssl.log]

Crypto #17

Try the other tasks first before attempting these more difficult challenges! This one is very hard. Made by pink#3872

Crypto #16B

You need to complete #1A first, make sure to read the prompt again [final.dat] Made by pink#3872

Crypto #16A

Try the other tasks first before attempting these more difficult challenges! Made by pink#3872

Crypto #7

Decode the message to find the flag You will need to put your answer in the LUHACK{...} format Made by pink#3872

Crypto #10

Decode the message to find the flag Made by pink#3872

Crypto #12

Finding the flag might require some brute force... [hmmm.dat] Made by pink#3872

Crypto #9

Decode the message to find the flag Made by pink#3872

Crypto #8

Decode the message to find the flag Made by pink#3872

Crypto #4

Decode the message to find the flag Made by pink#3872

Crypto #3

Decode the message to find the flag Made by pink#3872

Crypto #1

Decode the message to find the flag Made by pink#3872

Infra #4

Pwn windows box with EternalBlue (Flag is on the desktop of the LUHack user) Boxes: win-infra-<0..n> Make sure you use a bind shell, windows/x64/meterpreter/bind_tcp works well. If this doesn't work, try one of the other win-blue machines. EternalBlue likes to trigger BSODs.

Infra #3

Pwn vsftpd Box: luhack-infra-0 Note: The metasploit module for this doesn't try to run the exploit if it sees the shell port already open, you can use the msfconsole edit and reload commands to remove this check. You can also try exploiting this vulnerability manually :)

Infra #2

Pwn Unrealircd Box: luhack-infra-0 Note: Make sure you use a bind shell, and, use port 10001

Infra #1

Pwn redis (Make sure you use a bind shell on port 10000) Box: luhack-infra-0 (cmd/unix/bind_netcat is a good payload btw)

Enumeration 7

Find the subdomain of luhack.me Answer format: <subdomain>.luhack.me

Enumeration 6

Find a weird user on the SMTP server. They're not one of these: (hint: /usr/share/wordlists/metasploit/unix_users.txt is a good wordlist) Box: luhack-enum-0

Enumeration 3

Throw dirb at it. Box: luhack-enum-0

Enumeration 4

I hope you're not a robot? Box: luhack-enum-0

Enumeration 5

Somewhere in a SMB share... Box: win-enum-0

Enumeration 2

The second flag from the FTP server. (you might want to come back to this later) Box: luhack-enum-0

Enumeration 1

Our ftp server isn't as secure as we hoped. Box: luhack-enum-0

Recon #17

Find the hidden flag on the DNS server! Box: luhack-recon-0 Hint: How can we read all records of a DNS server?

Recon #16

What is the content of the txt.luhack.local record? Box: luhack-recon-0

Recon #15

What is the IP address of test.luhack.local ? Hint: use dig or nslookup Box: luhack-recon-0

Recon #14

What protocol normally runs over port 53?

Recon #13

How many TCP ports can possibly exist on a system?

Recon #12

Is port 993 open? (yes/ no) Box: luhack-recon-0

Recon #11

Is port 999 open? (yes/ no) Box: luhack-recon-0

Recon #9

What is the SSH fingerprint of the server? Box: luhack-recon-0 Format: SHA256:...

Recon #8

What IMAP software is running? Box: luhack-recon-0

Recon #7

What is the SMTP banner? Box: luhack-recon-0

Recon #6

What is the banner of port 42069? Box: luhack-recon-0

Recon #5

What is the Organizational Unit (OU) of the certificate server on port 443? Box: luhack-recon-0

Recon #4

What is the hostname (Common Name) of the certificate served on port 443? Box: luhack-recon-0

Recon #3

What version of FTP software is running? Box: luhack-recon-0 Format: SoftwareName x.y.z

Recon #2

What web server software is running? Box: luhack-recon-0 Format: SoftwareName httpd x.y.z

Recon #1

What version of BIND is running? Format: x.y.x Box: luhack-recon-0

Freshers challenge #10

Ben lost his token again!

Freshers challenge #9

Hidden inside this pcap is a flag: [https://cdn.discordapp.com/attachments/631618075254325257/759113595841151017/completedChallenge.pcapng]

Freshers Challenge #8

Nothing to see here ...

Freshers Challenge #7

We received the following file. Can you help us decode the hidden message? [Downloadable File to investigate]

Freshers Challenge #6

To complete this challenge, you must find all 3 flags. Submit the flags in the format: flag1flag2flag3

Freshers Challenge #5

drainage edict deadbolt cranky crucial dragnet kickoff guidance highchair fracture chatter chatter jawbone eyetooth freedom chairlift gremlin flytrap eyetooth framework glucose choking freedom klaxon

Freshers Challenge #4

ndjsdcilxcugxtcshlxiwhpaps When submitting the flag, enter it as LUHACK{plaintext}. Where plaintext is the plaintext of the above string.

Freshers Challenge #3

🔎

Freshers Challenge #2

Once you've solved Freshers Challenge #1, you'll be given the start of the next challenge. Once you get the flag for that, submit it using the bot!

Freshers Challenge #1

Hmm I wonder Hint: [CyberChef]

Some dumb RE challenge

Here's a linux program compiled by another program I wrote, it should be fairly unintuitive to reverse engineer so good luck! [https://cdn.discordapp.com/attachments/631618075254325257/759334352886169640/a.out] Since I'm nice, here's the source code: [https://gist.github.com/simmsb/28c165087b301fcce234c1533861421e] And here's the source code of the compiler: [https://github.com/simmsb/some-scheme-compiler]