Operation_Orchid
Description
Download this image and find the flag.
https://artifacts.picoctf.net/c/216/pico.flag.png
Info
- gunzip disk.img.gz
- Mounted disk.img to /mnt or use FTK Imager
- Navigate to root directory and find flag.txt.enc and .ash_history
- The Ash history file contains the command used to encrypt the flag
touch flag.txt
nano flag.txt
apk get nano
apk --help
apk add nano
nano flag.txt
openssl
openssl aes256 -salt -in flag.txt -out flag.txt.enc -k unbreakablepassword1234567
shred -u flag.txt
ls -al
halt
- Export these or just use the command to get the flag.txt
- cat the flag.txt
# Decrypt the encrypted file
openssl aes256 -d -in flag.txt.enc -out flag.txt -k unbreakablepassword1234567
# View the contents of the decrypted file
cat flag.txt
Flag
picoCTF{h4un71ng_p457_5113beab}