Siunam's Website

My personal website

Home About Blog Writeups Projects E-Portfolio

Chandi Bot

Table of Contents

  1. Chandi Bot 1
  2. Chandi Bot 2
  3. Chandi Bot 3
  4. Chandi Bot 4
  5. Chandi Bot 5
  6. Chandi Bot 6

Chandi Bot 1

Background

Have you noticed the funny bot on the server?

Find the flag

In the RITSEC CTF Discord server, we can see there’s a bot:

And the it’s profile is hiding something!

Chandi Bot 2

Background

Looks like the bot has some functionality.

Find the flag

Discord bot can be interacted with some commands.

Sometimes you can view commands via /:

Let’s use the /flag command!

Chandi Bot 3

Background

I wonder what the bot’s favorite dinosaur is?

Find the flag

If we send a message that contains “dinosaur”, it’ll reply us with some random dinosaur names:

However, I think that just a rabbit hole.

Then, I start to think: “Any command that’s interesting?”

Yes we do. Like the /stego command:

Hmm… Let’s upload a random PNG image file:

Let’s download it!

┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot)-[2023.04.02|16:30:05(HKT)]
└> wget https://media.discordapp.net/ephemeral-attachments/1091391452866682950/1092001499086864384/encoded.png

According to HackTricks, we can use a tool called zsteg to run all the checks:

┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot)-[2023.04.02|16:30:08(HKT)]
└> zsteg -a encoded.png
b8,b,msb,xy         .. file: RDI Acoustic Doppler Current Profiler (ADCP)
b8,rgb,msb,xy       .. file: RDI Acoustic Doppler Current Profiler (ADCP)
b8,bgr,msb,xy       .. file: RDI Acoustic Doppler Current Profiler (ADCP)
b1,rgb,lsb,yx       .. text: "RS{GO_GET_THE_ENCODED_FLAG}"
[...]

Boom! We found the flag!

Chandi Bot 4

Background

Can you beat the bot?

Find the flag

In this challenge, we need 3 commands: /balance to check how many point we have, /rps to play “Rock Paper Scissors” to gain points, /dad to gain 1 point, /buy-flag to buy flag for 10000 points

First, let’s check our balance:

We got 0 point.

Then, gain 1 point by using /dad command:

Next, use /rps to play “Rock Paper Scissors”:

Hmm… we can’t wager 0 points…

I wonder can we go negative points:

Ohh!! We can! And we gain 1 point!!

Let’s use that logic vulnerbility to gain 9999999 points!!

/rps choice:Rock wager:-9999999

Boom! We have 10000001 points!!

Finally, we can use /buy-flag command to buy the flag!

Chandi Bot 5

Background

How much do you know about RITSEC?

Find the flag

After some testing, I found there’s a command called /trivia:

Command:

/trivia RITSEC Trivia

After we entered that command, it’ll prompt us some questions.

Q: Who is the current President of RITSEC?

We can go to their website and found the current President:

Q: When was RITSEC founded?

In their Twitter account, we can see that it’s “Joined August 2018”:

Maybe 2022? I couldn’t find any information about that, perhaps I’m weak in OSINT.

Q: What was the original name of the RITSEC CTF?

By looking through previous RITSEC CTF in CTFtime, it’s called RC3 CTF:

Q: When was Sparsa founded?

In the RITSEC about page, it’s founded in 2002:

Q: What is RITSEC’s main website?

RITSEC main website is at ritsec.club:

Q: When was the first RITSEC CTF?

Let’s go to CTFtime!

Q: When was the first ISTS

After some Googling, I found the 12th annual of ISTS:

The 12th annual of ISTS is in 2015, so \(2015 - 12 = 2002\) year:

Q: When was RC3 founded?

In RITSEC about page, it’s founded at 2013:

Q: What is the name of the RITSEC Current Discord Bot?

If we join to RITSEC Discord server, it’ll have a bot called “OBI”

Q: What is the name of RITSEC’s CTF Team?

In CTFtime, we see their team name:

Q: Who was the first President of RITSEC?

Go to the RITSEC about page:

Flag

After answering all 10 questions, we can get the flag:

Chandi Bot 6

Background

We finally found the source code. Can you dig through find the secret?

https://github.com/1nv8rzim/Chandi-Bot

Find the flag

In this challenge, it gives us a GitHub repository of the bot’s link:

Right off the bat, we see there are 14 commits in branch “master”, and 3 branches:

Let’s clone that repository!

┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot)-[2023.04.02|16:08:23(HKT)]
└> git clone https://github.com/1nv8rzim/Chandi-Bot.git
Cloning into 'Chandi-Bot'...
[...]
┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot)-[2023.04.02|16:10:35(HKT)]
└> cd Chandi-Bot/; ls -lah
total 96K
drwxr-xr-x 8 siunam nam 4.0K Apr  2 16:10 .
drwxr-xr-x 3 siunam nam 4.0K Apr  2 16:10 ..
drwxr-xr-x 2 siunam nam 4.0K Apr  2 16:10 bot
drwxr-xr-x 5 siunam nam 4.0K Apr  2 16:10 commands
drwxr-xr-x 2 siunam nam 4.0K Apr  2 16:10 config
-rw-r--r-- 1 siunam nam   31 Apr  2 16:10 config_example.yml
drwxr-xr-x 8 siunam nam 4.0K Apr  2 16:10 .git
-rw-r--r-- 1 siunam nam   22 Apr  2 16:10 .gitignore
-rw-r--r-- 1 siunam nam  916 Apr  2 16:10 go.mod
-rw-r--r-- 1 siunam nam  47K Apr  2 16:10 go.sum
drwxr-xr-x 2 siunam nam 4.0K Apr  2 16:10 helpers
-rw-r--r-- 1 siunam nam  498 Apr  2 16:10 main.go
drwxr-xr-x 2 siunam nam 4.0K Apr  2 16:10 structs

Now, sometimes a version control’s repository could contain some sensitive information in commits, like API key, private SSH key, credentials, and other stuff like the flag.

To view commits in Git, we can use:

┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot/Chandi-Bot)-[2023.04.02|16:10:41(HKT)]-[git://master ✔]
└> git log -p
commit 91520f529945a5846c54feb28f7645437ce820b2 (HEAD -> master, origin/master, origin/HEAD)
Author: Maxwell Fusco <54746239+1nv8rzim@users.noreply.github.com>
[...]
diff --git a/commands/enabled.go b/commands/enabled.go
new file mode 100644
index 0000000..21e8078
--- /dev/null
+++ b/commands/enabled.go
@@ -0,0 +1,13 @@
+package commands
[...]

However, there’s nothing weird in master branch.

To switch to other branch we can use:

┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot/Chandi-Bot)-[2023.04.02|16:14:38(HKT)]-[git://master ✔]
└> git checkout fix-packages            
branch 'fix-packages' set up to track 'origin/fix-packages'.
Switched to a new branch 'fix-packages'
┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot/Chandi-Bot)-[2023.04.02|16:14:46(HKT)]-[git://fix-packages ✔]
└> 

Then, view commit logs again:

┌[siunam♥earth]-(~/ctf/RITSEC-CTF-2023/Chandi-Bot/Chandi-Bot)-[2023.04.02|16:14:46(HKT)]-[git://fix-packages ✔]
└> git log -p
[...]
diff --git a/commands/main.go b/commands/main.go
index 477d7d4..edb5dc4 100644
--- a/commands/main.go
+++ b/commands/main.go
@@ -82,6 +82,6 @@ func StartScheduledTasks() {
 
 func StopScheduledTasks() {
        if len(ScheduledEvents) > 0 {
-               quit <- "RS{GIT_CHECKOUT_THIS_FLAG}"
+               quit <- "kill"
        }
 }
[...]

Boom! We found the flag!

Conclusion

What we’ve learned:

  1. Extracting Hidden Information In An Image File
  2. Exploiting Logic Vulnerability
  3. Leaking Sensitive Information In Git Repository