TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Israeli Mossad launches cyber challenge

73 pointsby stdcall83about 6 years ago

18 comments

atdtabout 6 years ago
Decompile the apk, and run &#x27;strings&#x27; on assets&#x2F;flutter_assets&#x2F;kernel_blob.bin.<p>Poke around and you&#x27;ll find code for POSTing JSON-encoded credentials to <a href="http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;getUrl" rel="nofollow">http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;getUrl</a>. (Grep for the IP to find it.)<p>So, using the web site name as the seed and the &#x27;client id&#x27; as the password, we get:<p>$ curl -X POST -H &quot;Content-Type: application&#x2F;json&quot; -d &#x27;{&quot;Seed&quot;: &quot;3d375032374147a7865753e4bbc92682&quot;, &quot;Password&quot;: &quot;d7c6bdcfcb184bf587ceee7c7c28e72e&quot;}&#x27; <a href="http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;getUrl" rel="nofollow">http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;getUrl</a><p>The response is an HTTP 200 and: {&quot;AuthURL&quot;:&quot;&#x2F;auth&#x2F;v2&quot;}<p><a href="http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;v2" rel="nofollow">http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;v2</a> is I guess the next step.<p>edit: The &#x2F;auth&#x2F;getUrl endpoint responds to any request with the same response, so that may not be the right Seed&#x2F;Password combination.
评论 #19873090 未加载
评论 #19872755 未加载
评论 #19873638 未加载
评论 #19873144 未加载
chrismellerabout 6 years ago
Install a random app from Mossad on my phone? N-no, no I don’t think so.
评论 #19872041 未加载
评论 #19872009 未加载
tdhootabout 6 years ago
In case you didn&#x27;t want to wait for the slow-typing to load the entire message:<p>&quot;Welcome Agent.<p>A team of field operatives is currently on-site in enemy territory, working to retrieve intel on an imminent terrorist attack.<p>The intel is contained in a safe, the plans for which are available to authorized clients via an app [0].<p>Our client ID is d09ff4ec651c48f89f7f7aa19160bd55<p>Your mission is to retrieve those plans, and allow our team to break into the safe.<p>Good luck!,<p><pre><code> M.&quot; </code></pre> [0]: <a href="http:&#x2F;&#x2F;3d375032374147a7865753e4bbc92682.xyz&#x2F;static&#x2F;app.apk" rel="nofollow">http:&#x2F;&#x2F;3d375032374147a7865753e4bbc92682.xyz&#x2F;static&#x2F;app.apk</a>
评论 #19871951 未加载
jsdev93about 6 years ago
THIS IS LEGITIMATE. The Israeli Mossad had a ad today, <a href="https:&#x2F;&#x2F;www.algemeiner.com&#x2F;2019&#x2F;05&#x2F;09&#x2F;mossad-marks-israeli-independence-day-with-facebook-riddle&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.algemeiner.com&#x2F;2019&#x2F;05&#x2F;09&#x2F;mossad-marks-israeli-i...</a> with a picture. The picture has 4 rows of trophies, which should be converted to 4 numbers using binary --&gt; decimal. Those four numbers are 35, 246, 158, 51.<p>As an ip address, 35.246.158.51 leads to the site OP posted.
laurentlabout 6 years ago
The French cyber security community has a similar challenge every year: <a href="https:&#x2F;&#x2F;www.sstic.org&#x2F;2019&#x2F;challenge&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.sstic.org&#x2F;2019&#x2F;challenge&#x2F;</a> (in French).<p>The challenges usually involve static analysis &#x2F; disassembly, breaking improperly configured crypto, etc. The best part (for me at least) is that competitors must submit a write-up of how they cracked the challenge, and the best write-ups are published. It makes for fascinating reading even if you’re not really into that scene.
andr0idabout 6 years ago
Searching for &quot;iWalk-v2&quot; on google gives following book as the first result:<p><a href="https:&#x2F;&#x2F;books.google.rs&#x2F;books?id=1nfhpqvLSM4C&amp;pg=PA397&amp;lpg=PA397&amp;dq=%22iwalk-v2%22&amp;source=bl&amp;ots=oxE7LdoK2w&amp;sig=ACfU3U1h4H0eUFMV2u3zk9VbR_kDiVw_vA&amp;hl=sr&amp;sa=X&amp;ved=2ahUKEwilp4qM94_iAhXIb1AKHXS1CWsQ6AEwBnoECAkQAQ#v=onepage&amp;q=%22iwalk-v2%22&amp;f=false" rel="nofollow">https:&#x2F;&#x2F;books.google.rs&#x2F;books?id=1nfhpqvLSM4C&amp;pg=PA397&amp;lpg=P...</a><p>on page 397 there is entry in index: iWalk, v2 71 on the same page there are interesting terms like islamic terrorism, jihad via internet, judism... also page number 71 which stands next to iWalk term is interesting coincidence since this riddle is celebrating 71 years of Israel independence...
hashberryabout 6 years ago
This site loads the jQuery library in order to...<p>1. Access $(&quot;#text1&quot;)[0].innerHTML<p>2. $( document ).ready() { typeWriter (); }<p><i>facepalm</i>
评论 #19872881 未加载
lone_haxx0rabout 6 years ago
I don&#x27;t have time for slow-ass typing text. Next.
评论 #19872256 未加载
salawatabout 6 years ago
Oh, come on. You have to have an old phone lying around to factory reset for shits and giggles. Not like they&#x27;d burn good zero days on a publicity stunt.<p>Remember, this thing&#x27;ll be getting picked apart by everybody considering the source.<p>Unless you&#x27;re afraid of getting black bagged that i...&lt;SIGNAL LOST&gt;
评论 #19872104 未加载
评论 #19874370 未加载
qwerty40about 6 years ago
Challenge 3: Do we need to RE the EXE cause that’s look obvious but I don’t think that that’s what we need to do
Ritsuko_akagiabout 6 years ago
I hope my house does receive air strike
评论 #19872947 未加载
jakobovabout 6 years ago
How do we know this is created by the mossad?
评论 #19879184 未加载
Haribleabout 6 years ago
Still stuck at Level 2... Any ideas?
alphagrep12345about 6 years ago
How do you know it&#x27;s by mossad?
评论 #19873419 未加载
评论 #19872689 未加载
Naacabout 6 years ago
Ignoring the editorialized made up title of this post, is there any information on who actually made this challenge?
评论 #19872329 未加载
DvirRonaldoabout 6 years ago
First Challenge Solution: Mossad 2019 Challenge Start: <a href="https:&#x2F;&#x2F;r-u-ready-4.it&#x2F;" rel="nofollow">https:&#x2F;&#x2F;r-u-ready-4.it&#x2F;</a> Every line in the image is binary 8-bit number that will give you an ip address : 35.246.158.51<p>Challenge-1 :Link <a href="http:&#x2F;&#x2F;3d375032374147a7865753e4bbc92682.xyz" rel="nofollow">http:&#x2F;&#x2F;3d375032374147a7865753e4bbc92682.xyz</a> &#x2F; <a href="http:&#x2F;&#x2F;35.246.158.51" rel="nofollow">http:&#x2F;&#x2F;35.246.158.51</a><p>Download app.apk from <a href="http:&#x2F;&#x2F;3d375032374147a7865753e4bbc92682.xyz&#x2F;static&#x2F;app.apk" rel="nofollow">http:&#x2F;&#x2F;3d375032374147a7865753e4bbc92682.xyz&#x2F;static&#x2F;app.apk</a> Remember your Client ID - mine is 854279b4c89e4b5c9722352c3f9f1d6c You will user it as &quot;Seeder&quot; property in the app &#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F; using WireShark (or any other packet snipper) we can see that the login button does this:<p>POST &#x2F;auth&#x2F;v2 HTTP&#x2F;1.1si user-agent: iWalk-v2 content-type: application&#x2F;json; charset=utf-8 accept-encoding: gzip content-length: 29 host: 35.246.158.51:8070 {&quot;Seed&quot;:&quot;admin&quot;,&quot;Password&quot;:&quot;admin &quot;}HTTP&#x2F;1.1 200 OK Content-Type: application&#x2F;json Date: Wed, 08 May 2019 21:49:05 GMT Content-Length: 47<p>{&quot;IsValid&quot;:false,&quot;LockURL&quot;:&quot;&quot;,&quot;Time&quot;:149646302} &#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;&#x2F;<p>Using <a href="http:&#x2F;&#x2F;www.javadecompilers.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.javadecompilers.com&#x2F;</a>, i Decompiled the apk, and got a lock at the Manifest &lt; &lt;xml version=&quot;1.0&quot; encoding=&quot;utf-8&quot; ....... &lt;activity android:configChanges=&quot;density|fontScale|keyboard|keyboardHidden|layoutDirection|locale|orientation|screenLayout|screenSize&quot; android:hardwareAccelerated=&quot;true&quot; android:launchMode=&quot;singleTop&quot; android:name=&quot;com.iwalk.locksmither.MainActivity&quot; .... .....<p>The line &quot;look for us on github.com&quot; got my attention, so i looked for iwalk.locksmither in github and found &quot;iwalk-locksmithers&quot; linke: <a href="https:&#x2F;&#x2F;github.com&#x2F;iwalk-locksmithers-app" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;iwalk-locksmithers-app</a> the server source code was there. In the code, there are a few comments that can help<p><a href="https:&#x2F;&#x2F;github.com&#x2F;iwalk-locksmithers-app&#x2F;server&#x2F;blob&#x2F;master&#x2F;main.go" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;iwalk-locksmithers-app&#x2F;server&#x2F;blob&#x2F;master...</a> link 70 points us to the auth-1 weeknes.<p>the part of &quot;for currentIndex &lt; len(lock.Password) &amp;&amp; currentIndex &lt; len(loginData.Password) { if lock.Password[currentIndex] != loginData.Password[currentIndex] { break } &#x2F;&#x2F;OG: securing against bruteforce attempts... ;-) time.Sleep(30 * time.Millisecond) currentIndex++ }&quot;<p>the securing aginst bruteforce (tyring all combinations) is the weeknes. The idea behind for hacking the password is to try only one char at first. if we get a 30ms dealy, it means we got the 1st char right, so then we can check the next one, so we will try 2 chars (the 1st we know, the second we will guess) if we will get 60 ms +- dealy then we got th 2nd char and we will try the third one, and again and again, until we will get the password.<p>To solve it, it wrote a simple c# code that does in a loop http push to the server every time we try to add a new char to the password, and if we got a dealy that is +- 30ms more then the last try, we add that char our final password the uri is <a href="http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;v1_1" rel="nofollow">http:&#x2F;&#x2F;35.246.158.51:8070&#x2F;auth&#x2F;v1_1</a> and user agent is ed9ae2c0-9b15-4556-a393-23d500675d4b (as writen in the server) I did some avg calcs of the dealys The password length is 32 with hexa char (didnt know that until i guessed the password) we can know that the password is correct when we get back &quot;IsValid&quot;:true&quot; *Time we get is in nano Seconds and not ms<p>After I enterd the pasword and cliend id, i got a link for a token and a linke for challenge 2<p><a href="http:&#x2F;&#x2F;759d8eba52184f538c8a4525680cfb33.xyz&#x2F;" rel="nofollow">http:&#x2F;&#x2F;759d8eba52184f538c8a4525680cfb33.xyz&#x2F;</a><p>Challenge-2 <a href="http:&#x2F;&#x2F;759d8eba52184f538c8a4525680cfb33.xyz&#x2F;" rel="nofollow">http:&#x2F;&#x2F;759d8eba52184f538c8a4525680cfb33.xyz&#x2F;</a>
评论 #19876945 未加载
评论 #19877390 未加载
zuburkingabout 6 years ago
is challenge 2 download cert page down?
yanirtaabout 6 years ago
Challenge #2, someone forgot a reference to <a href="https:&#x2F;&#x2F;dev.missilesys.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;dev.missilesys.com&#x2F;</a> ;)