Skip to content

Commit

Permalink
Deleting old Code inside the exploit/delete folder (clean up) for upl…
Browse files Browse the repository at this point in the history
…oad later
  • Loading branch information
SirGankalot committed Jul 26, 2024
1 parent cccf180 commit cb4e57d
Show file tree
Hide file tree
Showing 15 changed files with 10 additions and 1,771 deletions.
5 changes: 2 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,8 @@
Whatsscam
====================
This service was played as part of the enowars8 tournament.
# Whatsscam
This service was played as part of the enowars8 tournament.

An online messanger service that lets you "securely" text with friends.
Whatsscam is an online messanger service that lets you "securely" text with people.
The Service contains vulnerabilities that can leak data.
Inside the documentation folder a readme is contained that explains the exploits/vulnerabilities and possible fixes.

Expand Down
13 changes: 8 additions & 5 deletions documentation/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,14 +5,15 @@ This is the place to keep important documentation details about your service.

# Flagstores

There are 3 Flagstores.
First inside the Groupchat messages.
Second inside the private messages.
Third is inside the Status accessible via Profile or via Backup.
There are 3 Flagstores:
- First inside the Groupchat messages.
- Second inside the private messages.
- Third is inside the Status accessible via Profile or via Backup.

# Vulnerabilities

The service contains 3 vulnerabilities, exploits that are based on the enowars infrastructure are listed down below.

The exploits are also listed inside the checker/src/checker.py

## AES WEAK SEED GENERATOR
Expand All @@ -36,8 +37,8 @@ The base RSA function uses 2 prime numbers that are connected, called sexy prime
- Category: Authentication
- Difficulty: Medium-hard
- Position: Backup
- CVE Number: CVE-2024-33663

CVE-2024-33663
The Backup token is vulnerable as the authlib does not differaniate between 2 algorithms. This makes it possible to not only authenticate/sign with the private key inside the token, but also create a token with the public key that will be handled the same way as the private key token. You can create a fake token via the userlist in which the public keys are listed than you can login in as if you would have the actual private key token.

# Exploits
Expand Down Expand Up @@ -372,5 +373,7 @@ for user in messages:
# Fixes
Easy fixes are blocked via the checker which checks for missing flags and missing content inside the service.
The Fixes are listed inside the documentation/fix.py . You will have to switch the lines of code to fix the service.
The Fixes listed are only part of all possible ways to fix the exploits.
46 changes: 0 additions & 46 deletions documentation/aes/aes.py

This file was deleted.

39 changes: 0 additions & 39 deletions documentation/aes/exploit.py

This file was deleted.

File renamed without changes.
29 changes: 0 additions & 29 deletions documentation/rsa/exploit.py

This file was deleted.

83 changes: 0 additions & 83 deletions documentation/rsa/generateprime.py

This file was deleted.

31 changes: 0 additions & 31 deletions documentation/rsa/rsa_try.py

This file was deleted.

6 changes: 0 additions & 6 deletions exploit/a.py

This file was deleted.

81 changes: 0 additions & 81 deletions exploit/call_c.py

This file was deleted.

Loading

0 comments on commit cb4e57d

Please sign in to comment.