16.09.2014 16:14, by azrael
Category:
Event:
We got an archive with directory "ctf" with only one file "flag.txt" which contains next text:
Nothing to see here, moving along...
So we had closed text file and started searching another way. I'm an OS X user so let's check if there is hidden items in folder. Ok, we saw ".git" directory so it is git repository.
git status
shows nothing to commit and
git log
shows only initial commit. But
git stash list
shows some stashed changes. Let's apply it:
git stash apply
We saw new created file "s.py" and "flag.txt" was modified. So all we need is run python script and get flag.
Running sports | Patike – Nike Air Jordan, Premium, Retro Klasici, Sneakers , IicfAttachments: