From 0e8092f39b72ae32965d8d239540d0bc2e30adcd Mon Sep 17 00:00:00 2001 From: Amanda Rousseau Date: Fri, 17 Nov 2017 15:50:13 -0800 Subject: [PATCH] adding challenge1 --- flareon4/challenge1.md | 43 +++++++++++++++++++++++++++++++++++++++++- flareon4/flareon4.md | 24 +++++++++++------------ 2 files changed, 54 insertions(+), 13 deletions(-) diff --git a/flareon4/challenge1.md b/flareon4/challenge1.md index 97045f3..668b7c5 100644 --- a/flareon4/challenge1.md +++ b/flareon4/challenge1.md @@ -6,4 +6,45 @@ title: Challenge 1 login.html [Go Back to All Challenges](https://securedorg.github.io/flareon4) -# Challenge 1: login.html # \ No newline at end of file +# Challenge 1: login.html # + + +Here is the contents of **login.html** + +``` + + + + FLARE On 2017 + + + + + + + +``` + +What gives away the answer is the variable name `rotFlag` and addition `c.charCodeAt(0) + 13`. Rotation or ROT is an older and simple technique for hiding readable strings. It's just a simple substitution cipher commonly known as ROT13. ROT13 means the characters will rotate 13 places. + +A quick solution is python's codec library for using ROT13. + +``` +import codecs +print codecs.encode('PyvragFvqrYbtvafNerRnfl@syner-ba.pbz', 'rot_13') +``` + +It's also good to note that all of flare-on challenges end in **@flare-on.com** this makes it easy to help you guess the output. + + +[Next -> Challenge 2](https://securedorg.github.io/flareon4/challenge2) diff --git a/flareon4/flareon4.md b/flareon4/flareon4.md index c8e4980..4dfc084 100644 --- a/flareon4/flareon4.md +++ b/flareon4/flareon4.md @@ -13,29 +13,29 @@ I wanted to make sure I participated this year since I would be coaching my inte ## Challenges ## -### Challenge 1) [login.html](#) ### +### Challenge 1) [login.html](https://securedorg.github.io/flareon4/challenge1) ### -### Challenge 2) [IgniteMe.exe](#) ### +### Challenge 2) [IgniteMe.exe](https://securedorg.github.io/flareon4/challenge2) ### -### Challenge 3) [greek_to_me.exe](#) ### +### Challenge 3) [greek_to_me.exe](https://securedorg.github.io/flareon4/challenge3) ### -### Challenge 4) [notepad.exe](#) ### +### Challenge 4) [notepad.exe](https://securedorg.github.io/flareon4/challenge4) ### -### Challenge 5) [pewpewboat.exe](#) ### +### Challenge 5) [pewpewboat.exe](https://securedorg.github.io/flareon4/challenge5) ### -### Challenge 6) [payload.dll](#) ### +### Challenge 6) [payload.dll](https://securedorg.github.io/flareon4/challenge6) ### -### Challenge 7) [zsud.exe](#) ### +### Challenge 7) [zsud.exe](https://securedorg.github.io/flareon4/challenge7) ### -### Challenge 8) [flair.apk](#) ### +### Challenge 8) [flair.apk](https://securedorg.github.io/flareon4/challenge8) ### -### Challenge 9) [remorse.ino.hex](#) ### +### Challenge 9) [remorse.ino.hex](https://securedorg.github.io/flareon4/challenge9) ### -### Challenge 10) [shell.php](#) ### +### Challenge 10) [shell.php](https://securedorg.github.io/flareon4/challenge10) ### -### Challenge 11) [covfefe.exe](#) ### +### Challenge 11) [covfefe.exe](https://securedorg.github.io/flareon4/challenge11) ### -### Challenge 12) [missing](#) ### +### Challenge 12) [missing](https://securedorg.github.io/flareon4/challenge12) ###