Bounty: $130 Description:

WHAT THE HECK HAPPENED HERE? IT SEEMS THAT THE CHALLENGE HERE IS GONE? CAN YOU FIND IT? CAN YOU CHECK IF YOU CAN FIND THE BACKUP FILE FOR THIS ONE? I’M SORRY FOR MESSING UP :(

Write-up

After looking for files with some best practices file extensions like .backup, .bak, _backup… I found file /levelfourteen.php.old to be present. After downloading it, there was a php source code commented out.

<?php 

* <img src="img/clippy1.jpg" class="imahe" /> <br /> <br />

<p>Do you want to download this mysterious file?</p>

<a href="misc/imadecoy">
<button class="btn">Yes</button>
</a>

<a href="index.php">
<button class="btn">No</button>
</a>
*/

?>

Now let’s download the misc/imadecoy file.

$ file imadecoy
imadecoy: tcpdump capture file (little-endian) - version 2.4 (Linux "cooked", capture length 65535)

OK, we are dealing with another packet capture. Let’s looks at the Protocol Hierarchy.

$ tshark -nnr imadecoy -qz  io,phs

===================================================================
Protocol Hierarchy Statistics
Filter:

sll                                      frames:713 bytes:143926
  ip                                     frames:710 bytes:143649
    tcp                                  frames:168 bytes:97794
      http                               frames:34 bytes:39046
        data-text-lines                  frames:7 bytes:4497
          tcp.segments                   frames:1 bytes:359
        media                            frames:2 bytes:8900
          tcp.segments                   frames:1 bytes:456
        image-gif                        frames:3 bytes:1750
        png                              frames:1 bytes:1955
      data                               frames:2 bytes:308
    udp                                  frames:542 bytes:45855
      dns                                frames:530 bytes:42023
      data                               frames:12 bytes:3832
  arp                                    frames:2 bytes:106
    vssmonitoring                        frames:1 bytes:62
  ipv6                                   frames:1 bytes:171
    udp                                  frames:1 bytes:171
      dns                                frames:1 bytes:171
===================================================================
$ tshark -nnr imadecoy -qz ip_hosts,tree
===================================================================
IP Addresses           value	        rate	     percent
-------------------------------------------------------------------
IP Addresses            710       0.005819
10.0.2.15                12       0.000098           1.69%
144.76.14.145             3       0.000025           0.42%
127.0.0.1              1396       0.011442         196.62%
193.11.164.243            6       0.000049           0.85%
224.0.0.251               1       0.000008           0.14%
83.149.127.140            2       0.000016           0.28%
===================================================================
$

Again, just like Level 6, we see a lot of traffic from 127.0.0.1, this time it’s mostly HTTP. We know that abnormal, so let’s extract all the HTTP objects from the whole pcap. Open wireshark, load the pcap and select File -> Export Object -> HTTP. Now “Save All” to a new directory. This will save all files transfered via HTTP.

$ ls imadecoy_extract/
Fixedsys500c.woff back.gif          bootstrap.css     custom.css        honeypy           image2.gif        img(1)
HoneyPY.PNG       blank.gif         bootstrap.min.js  favicon.ico       honeypy(1)        img               jquery.js
$

Browsing to the directory and opening the HoneyPY.PNG file, we see the flag.
infosec_flagis_morepackets