Skip to content

Commit bd1b96c

Browse files
mzfrmzfr
authored andcommitted
Solution for Industrial Process
1 parent 4e6a89d commit bd1b96c

File tree

6 files changed

+65357
-0
lines changed

6 files changed

+65357
-0
lines changed
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
# Industrial process
2+
3+
4+
__Description__
5+
6+
In company XXX, we have a big expertise in laser cutting and we are well informed about cybersecurity. We have setup a small honeypot to simulate the cut of some pieces. In our fake process, we have manufactured 25 pieces of 1 meter by 1 meter. We have found this really weird file thanks to a super effective detection tool. There was also a weird string :
7+
8+
893c539a84e6c96acf5f2ceea2ad9ef7be895580
9+
10+
This flag follow the following format : INSA([A-Z]*). Please submit it as INSA{$1}, for example if you find INSAAZERTY, submit INSA{AZERTY}. [Weird File](tempList.txt)
11+
12+
13+
__SOLUTION__
14+
15+
At first I thought that it was a hash and we have to crack the hash. I didn't even looked at the given file.
16+
17+
After a while I realized that we are given a file(:facepalm:).
18+
19+
When I googled the strings/hash I came across this tool called [Cloakify](https://github.com/TryCatchHCF/Cloakify/).
20+
Okay so that mean we have to use that tool somehow to proceed.
21+
22+
Reading the `README` file I realized what was supposed to be done.
23+
Basically the given file will turn out to be something else when we will `decloakify` it.
24+
25+
```bash
26+
➜ python2 decloakify.py tempList.txt ciphers/worldFootballTeams > pcap
27+
```
28+
29+
This will give us a PCAP file.
30+
When we open the file it give us some error about missing bytes, I thought WE'll have to fix that issue but then __@unblvr__ explained what might happened.
31+
32+
According to him
33+
```
34+
There's no missing data per se, it's just that the file stops suddenly
35+
it could just be due to the creation process
36+
I bet they didn't sniff some modbus connection, but crafted this with scapy or something
37+
```
38+
39+
Okay that mean we didn't have to fix the PCAP then what do we do.
40+
41+
Well if we read the description the tool was `laser cutter` and if you look at those protocols `Modbus/TCP` there are `Register values` present.
42+
43+
![alt text](bytes.png)
44+
45+
So we need to extract those response values and analyze them.
46+
47+
```bash
48+
➜ tshark -r pcap -Y modbus -T fields -E header=y -e frame.len -e modbus.regval_uint16
49+
```
50+
51+
This will give us all those responses and since they are in tuple of 3 the best we could do is plot them on graph and see if it result in something.
52+
53+
First we put those values in a [file](pdus.txt).
54+
Now you can just plot this using python.
55+
Once plotted this will give you the flag.
56+
57+
Also all the part after the we found pcap was done by __@unblvr__
84.6 KB
Loading
14 KB
Loading
47.7 KB
Binary file not shown.
Lines changed: 212 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,212 @@
1+
0,0,0
2+
0,0,0
3+
0,0,0
4+
0,0,0
5+
0,0,0
6+
0,0,0
7+
0,0,0
8+
250,0,0
9+
125,0,0
10+
125,1000,0
11+
0,1000,0
12+
250,1000,0
13+
0,0,1
14+
0,1000,1
15+
750,0,1
16+
750,1000,1
17+
0,125,2
18+
125,0,2
19+
625,0,2
20+
750,125,2
21+
750,375,2
22+
675,500,2
23+
675,500,2
24+
125,500,2
25+
0,625,2
26+
0,875,2
27+
125,1000,2
28+
625,1000,2
29+
750,875,2
30+
0,0,3
31+
0,0,3
32+
500,1000,3
33+
750,500,3
34+
250,500,3
35+
750,500,3
36+
1000,0,3
37+
0,0,4
38+
0,1000,4
39+
0,1000,4
40+
0,500,4
41+
750,500,4
42+
750,1000,4
43+
750,0,4
44+
0,0,5
45+
500,1000,5
46+
750,500,5
47+
250,500,5
48+
250,500,5
49+
750,500,5
50+
1000,0,5
51+
750,125,6
52+
625,0,6
53+
125,0,6
54+
0,125,6
55+
0,875,6
56+
0,875,6
57+
125,1000,6
58+
625,1000,6
59+
750,875,6
60+
0,0,7
61+
0,1000,7
62+
0,500,7
63+
750,1000,7
64+
750,1000,7
65+
0,500,7
66+
750,0,7
67+
0,0,8
68+
250,0,8
69+
125,0,8
70+
125,1000,8
71+
0,1000,8
72+
250,1000,8
73+
250,1000,8
74+
0,0,9
75+
0,1000,9
76+
750,0,9
77+
750,1000,9
78+
0,0,10
79+
0,1000,10
80+
625,1000,10
81+
625,1000,10
82+
750,875,10
83+
750,125,10
84+
625,0,10
85+
0,0,10
86+
0,1000,11
87+
0,125,11
88+
125,125,11
89+
125,0,11
90+
625,0,11
91+
750,125,11
92+
750,1000,11
93+
0,125,12
94+
125,0,12
95+
625,0,12
96+
750,125,12
97+
750,125,12
98+
750,375,12
99+
675,500,12
100+
125,500,12
101+
0,625,12
102+
0,875,12
103+
125,1000,12
104+
625,1000,12
105+
750,1000,12
106+
750,875,12
107+
0,1000,13
108+
500,1000,13
109+
500,0,13
110+
500,1000,13
111+
1000,1000,13
112+
0,0,14
113+
0,0,14
114+
0,1000,14
115+
625,1000,14
116+
750,875,14
117+
750,625,14
118+
625,500,14
119+
0,500,14
120+
625,500,14
121+
875,0,14
122+
875,0,14
123+
0,0,15
124+
250,0,15
125+
125,0,15
126+
125,1000,15
127+
0,1000,15
128+
250,1000,15
129+
0,0,16
130+
0,0,16
131+
500,1000,16
132+
750,500,16
133+
250,500,16
134+
750,500,16
135+
1000,0,16
136+
0,0,17
137+
0,1000,17
138+
0,1000,17
139+
0,0,17
140+
750,0,17
141+
0,0,18
142+
0,1000,18
143+
625,1000,18
144+
750,875,18
145+
750,625,18
146+
625,500,18
147+
625,500,18
148+
0,500,18
149+
0,0,19
150+
0,1000,19
151+
625,1000,19
152+
750,875,19
153+
750,625,19
154+
625,500,19
155+
625,500,19
156+
0,500,19
157+
625,500,19
158+
875,0,19
159+
750,125,20
160+
625,0,20
161+
125,0,20
162+
0,125,20
163+
0,125,20
164+
0,875,20
165+
125,1000,20
166+
625,1000,20
167+
750,875,20
168+
750,125,20
169+
750,125,21
170+
625,0,21
171+
125,0,21
172+
125,0,21
173+
0,125,21
174+
0,875,21
175+
125,1000,21
176+
625,1000,21
177+
750,875,21
178+
750,0,22
179+
0,0,22
180+
0,0,22
181+
0,500,22
182+
750,500,22
183+
0,500,22
184+
0,1000,22
185+
750,1000,22
186+
0,125,23
187+
125,0,23
188+
625,0,23
189+
625,0,23
190+
750,125,23
191+
750,375,23
192+
675,500,23
193+
125,500,23
194+
0,625,23
195+
0,875,23
196+
125,1000,23
197+
125,1000,23
198+
625,1000,23
199+
750,875,23
200+
0,125,24
201+
125,0,24
202+
625,0,24
203+
750,125,24
204+
750,375,24
205+
750,375,24
206+
675,500,24
207+
125,500,24
208+
0,625,24
209+
0,875,24
210+
125,1000,24
211+
625,1000,24
212+
750,875,24

0 commit comments

Comments
 (0)