Advertisement
iAnonGuy

AnonGuy's Challenge [#21] - Solution

Jan 26th, 2016
275
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.66 KB | None | 0 0
  1. Level 1 ~
  2.  
  3. There was an encoded string in HTML source of /index.php -- http://prntscr.com/9urzoa
  4. "==AZRRmLzRXaRlWUvBjS" So you can see that it -->begins<-- with two equal signs(==)
  5. So it's base64 reversed .. let's reverse it (manually, strrev('==AZRRmLzRXaRlWUvBjS'), '==AZRRmLzRXaRlWUvBjS'[::-1] .. etc) -- http://prntscr.com/9us3al
  6. "SjBvUWlRaXRzLmRRZA==" Now it looks like plain base64 so you have to decode it (HackBar, base64_decode() base64.b64decode() .. etc) -- http://prntscr.com/9us2ti
  7. "J0oQiQits.dQd" .. There is also a form, a encrypter in /index.php .. so we can assume that this string is encrypted using that encrypter
  8. and that form only encrypts alphabets (A-Za-z) so we just have to see it converts what to what -- http://prntscr.com/9us5ga
  9. Now we know how it works so we have to decrypt "J0oQiQits.dQd" this .. we can do this manually or we can code something to do that for us -- http://prntscr.com/9us7s9
  10.  
  11. [code]
  12. <?php
  13. echo strtr('J0oQiQits.dQd', 'HxPjBkyELzXqwCgvlGDaYpVuhOFRbKSZoQtifJrsNdnWMemTUcAI', 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz');
  14. ?>
  15. or
  16. <?php
  17. echo strtr(base64_decode(strrev('==AZRRmLzRXaRlWUvBjS')), 'HxPjBkyELzXqwCgvlGDaYpVuhOFRbKSZoQtifJrsNdnWMemTUcAI', 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz'); # To "decode it in one shot" :v
  18. ?>
  19. [/code]
  20.  
  21. Solution for Level 1 ~ l0ghjhjin.php
  22.  
  23.  
  24. Level 2 ~
  25. Let's look at the source -- http://prntscr.com/9usa9c
  26. l0ghjhjin.php?log -- http://prntscr.com/9v1nn7
  27. So we just have to add a few headers and set their values to "151.51.202.22" ..
  28. ------------------------------------
  29. Client-IP=151.51.202.22            |
  30. X-Forwarded-For=151.51.202.22      |
  31. X-Forwarded=151.51.202.22          |
  32. X-Cluster-Client-IP=151.51.202.22  | --> You have to try everyone of them .. after you do that you'll see that
  33. Forwarded-For=151.51.202.22        |     the actual header it's looking for is "Via" ..
  34. Forwarded=151.51.202.22            |
  35. Via=151.51.202.22                  |
  36. ------------------------------------
  37.  
  38. So the solution for Level 2 is Via=151.51.202.22
  39.  
  40.  
  41. Level 3 ~
  42. Let's look at the source .. There's an image saying "Teh end is near" and then there's a comment "Is it?" .. http://prntscr.com/9v1rcv
  43. There's no hints but you can see that all the other images in the challenge were hosted on a different site except this one, it's on the same site ..
  44. So maybe there's something hidden in it .. http://prntscr.com/9v1sd8
  45. dhink4chik4.php
  46.  
  47. Solution for Level 3: Path to Level 4? was hidden in Image's EXIF->(Camera Make)
  48.  
  49.  
  50. Level 4:
  51. There's no level 4 :v -- http://prntscr.com/9v1t53
  52. You just had to post your html content + leety name to generate a .html ^_^
  53.  
  54. Regards,
  55. ~ AnonGuy
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement