Flight plan: Difference between revisions
From Pessin randon wiki
No edit summary |
|||
| Line 17: | Line 17: | ||
===Flag=== | ===Flag=== | ||
<code>3a4425f2-8882-428c-ab84-8adecf15a394</ | <code>3a4425f2-8882-428c-ab84-8adecf15a394</code> | ||
===Links=== | ===Links=== | ||
*[[CTF Challenges | Back to CTF Challenges page]] | *[[CTF Challenges | Back to CTF Challenges page]] | ||
Revision as of 19:00, 14 September 2022
Description
After everything is cleared you start to wonder about the origin of this attack.
When inspecting the logs, a correlation between the start of the compromise and a pdf file arriving to the ATC can be made.
200pts
Question
Inspect the flight plan, find out if there is anything malicious hidden in it.
Solution
Tools
binwalk | binwalk -e file.pdf
wine
Flag
3a4425f2-8882-428c-ab84-8adecf15a394