The Needle
As a part of our SDLC process, we've got our firmware ready for security testing. Can you help us by performing a security assessment?
Given an binary file.
Solution
To search or extract files from binary file binwalk
is used so extract the files from the binary file.
binwalk --extract firmware.bin
# Extracted 1 directory: firmware.bin.extracted search for keywords like "flag","password","login","admin","root","secret" in the extracted files.
grep -r "flag" firmware.bin.extracted
grep -r "login" firmware.bin.extracted
on grepping for loggin we get this
you can see in telnetd.sh there is Device_Admin taking its password from sign file.
since in this image you can see login as Device_Admin and taking value from sign
file which contains qS6-X/n]u>fVfAt!
, After login by username:Device_Admin and password: qS6-X/n]u>fVfAt! we get into the console.
After that we can run any command,run ls and you will see flag.txt
and run flag.txt
you will get flag =HTB{4_hug3_blund3r_d289a1_!!}