Prologue

An online CTF competition by ACSC, this competition is qualification for competing in ICC for ASIA category.

Transclude of dist-picopico-18a7c81b205ca1de2d152cdbef6a0cb525bdf433.tar.gz

Write Up

Initial Analysis

We were given one file, a firmware.bin file

Since We don’t know what file is this, we can use binwalk to extract the data.

After analyzing each file, i found a suspicious file where there’s look like an obfuscated script and the spacing is a little bit different with others.

According to the documentation1, microcontroller.nvm is a module to store raw bytes in the reserved section volatile memory.

Basically, this source above is about a writing command in cmd. The flow of source code is like this:

  • Checking the first four byte of the memory as signature
  • Do a xor encryption between variable O and h.
    • Where O is the index memory from 0x4 until 47
    • Where h is the index memory from 47 until 90
  • After that, it will write the result of encryption into windows cmd.

Exploitation

After stuck for awhile where to find the value of memory, I decide to read the description challenge again. It did mention the file w as a firmware dump. So I decide to analyze file again and I did really find the signature.

After that, I create a script to parse the dump file and do decryption according to the malware before and finally I can get the flag.

fa = open("firmware.bin", 'rb')
zz = fa.read()
s_idx = zz.find(b"\x10\x53\x7f\x2b")
 
a=0x04
K=43
 
O = []
for __ in range(s_idx+a, s_idx+a+K):
    O.append((zz[__]))
 
h = []
for __ in range(s_idx+a+K, s_idx+a+K+K):
    h.append((zz[__]))
 
F=bytes((kb^fb for kb,fb in zip(O,h))).decode()
# print(O, h)
print(F)

FLAG: ACSC{349040c16c36fbba8c484b289e0dae6f}

Footnotes

  1. https://docs.circuitpython.org/en/latest/shared-bindings/nvm/index.html