You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Transitioned the 'system-exploration' directory to meet the requirements of
the OpenEdu Methodology.
Signed-off-by: Sorin Birchi <sb.birchi.sorin@gmail.com>
If you're having difficulties solving this exercise, go through [this](/chapters/scratch-linux/system-exploration/reading/README.md##Sumary) reading material.
Use the hint it comes with, in order to figure out the second flag as well.
6
+
7
+
If you're having difficulties solving this exercise, go through [this](/chapters/scratch-linux/system-exploration/reading/README.md##Sumary) reading material.
It has a rather simple header, that you can find [here](https://en.wikipedia.org/wiki/Netpbm#PPM_example)(`.pnm`s are almost the same as `.ppm`s; it's just the data encoding that differs).
5
+
But it's incomplete.
6
+
Find a way to reveal it completely.
7
+
8
+
If you're having difficulties solving this exercise, go through [this](/chapters/scratch-linux/system-exploration/reading/README.md##Sumary) reading material.
Image comments are often used in CTFs in order to hide some more subtle information, such as hints.
602
-
Always remember to check them out.
603
-
604
571
## Summary
605
572
606
573
Here are a few useful snippets from today's session:
@@ -609,38 +576,6 @@ Here are a few useful snippets from today's session:
609
576
-`cat large_file | grep SSS`: looks for the `SSS` string in a large file, so you don't have to do this manually;
610
577
-`find some/path <some criteria> | xargs grep SSS`: look for the `SSS` string in each file that matches some specified criteria.
611
578
612
-
## Activities
613
-
614
-
### Challenge: Surgical Precision
615
-
616
-
There are many false flags out there.
617
-
Answer the questions and find the **real** flags.
618
-
The quizzes cover subjects discussed today and during the previous session.
619
-
Think of them as a recap.
620
-
621
-
The answer to each of the riddles in the files `question-*` from the `activities/surgical-precision/public` is the name of one of the given files.
622
-
When you've found an answer, upload the flag in that file.
623
-
624
-
Beware of [red herrings](https://en.wikipedia.org/wiki/Red_herring)!
625
-
626
-
### Challenge: Empty Files
627
-
628
-
So many empty files...
629
-
Nevertheless, you must find the flag!
630
-
631
-
### Challenge: Find Us If You Can
632
-
633
-
This is a two-stage challenge.
634
-
The first flag is somewhere on the remote system.
635
-
Use the hint it comes with, in order to figure out the second flag as well.
636
-
637
-
### Challenge: Not Your Doge
638
-
639
-
The image is in `.pnm` format.
640
-
It has a rather simple header, that you can find [here](https://en.wikipedia.org/wiki/Netpbm#PPM_example)(`.pnm`s are almost the same as `.ppm`s; it's just the data encoding that differs).
0 commit comments