SANS Holiday Hack 2023
  • 🌴Overview
  • 🆙Linux PrivEsc
  • 🃏Na'an
  • 🎣Phish Detection Agency
  • 😼Hashcat
  • 🧝Elf Hunt
  • 🐚Certificate SSHenanigans
  • 📒Active Directory
  • 🚪Space Island Door Access Speaker
  • 📸Camera Access
  • 🚀Missile Diversion
  • 🏴‍☠️I'm Gonna be King of the Pirates!
Powered by GitBook
On this page
  • Objective
  • Solution

Camera Access

Location - Space Island: Zenith SGS

PreviousSpace Island Door Access SpeakerNextMissile Diversion

Last updated 1 year ago

Objective

Get a picture of the Evil Elf!

Solution

Setting Up

1) Get the docker container download from the Nanosat-O-Matic machine to the left

2) Get a Wireguard VPN config from the GateXOR

3) Build & start your docker container

4) Copy your wireguard config to the docker container

5) Connect to your container over VNC & turn on the VPN tunnel

TIP: Check the docker container's README for the entrypoint & help!

TIP2: VNC copy/paste can be awful.

To solve this, we first connect to the supervisor directory endpoint using the CTT software built into the provider docker container (maltcp://10.1.1.1:1024/nanosat-mo-supervisor-Directory). Enter in the endpoint, then hit "Fetch Information". Then, we go to the apps launcher service, select the "camera" app and hit "run app".

Once the app is up and running, we can connect to it in the CTT software (go back to "fetch information", select the camera app & hit Connect). There is a tab in the software called "Action Service" with the name "Base64SnapImage". A base64 encoded image is likely going to be pretty large, so we can run a packet capture on our wg0 interface in Wireshark in case the GUI gives us problems (spoiler: it will!).

After we snap the image, we need to retrieve it from somewhere. Go to the Parameter Service tab, select our Base64SnapImage, then hit Get Value. The base64 of the image we snapped loads up, but we are not able to see the full value. This is where our packet capture comes in handy! Save the packet capture, and copy it to your host machine.

Next, we will use the Follow TCP stream feature in Wireshark to see the full base64 value of the image. Then, we can copy/paste this (you can use shift+select in wireshark!) to cyberchef and download the associated image.

You can submit the flag associated with the image that is asked for to complete the objective!

📸
Copy any files to/from your container
Page cover image