<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Brayden V</title>
    <description>The latest articles on Forem by Brayden V (@braydenv).</description>
    <link>https://forem.com/braydenv</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F328325%2Fa7df0466-e254-4927-a201-5ba09f8524b8.png</url>
      <title>Forem: Brayden V</title>
      <link>https://forem.com/braydenv</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/braydenv"/>
    <language>en</language>
    <item>
      <title>Launching My New Site (Triple E)!</title>
      <dc:creator>Brayden V</dc:creator>
      <pubDate>Mon, 15 Feb 2021 10:42:25 +0000</pubDate>
      <link>https://forem.com/braydenv/launching-my-new-blog-47g1</link>
      <guid>https://forem.com/braydenv/launching-my-new-blog-47g1</guid>
      <description>&lt;p&gt;I recently launched my new blog called &lt;a href="https://www.triplee.tech/"&gt;Triple E&lt;/a&gt;. The tagline for Triple E is "Taking the Byte out of Eight Bits" which intends to take light at the fact that learning computing concepts doesn't have to be difficult.&lt;/p&gt;

&lt;p&gt;I used Gatsby and ReactJS to build the site, along with AWS to deploy it, Cloudflare to distribute it using their CDN offering and GitHub actions for continuous integration and deployment.&lt;/p&gt;

&lt;p&gt;Over the next few months I intend to touch on topics such as cyber security, reverse engineering (my personal favourite), concurrent programming and my experience in the software industry as a junior engineer. I hope you stop by at &lt;a href="https://triplee.tech"&gt;https://triplee.tech&lt;/a&gt; and let me know on this post if you have any feedback!&lt;/p&gt;

</description>
      <category>showdev</category>
      <category>gatsby</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Looking inside Go - Reverse Engineering</title>
      <dc:creator>Brayden V</dc:creator>
      <pubDate>Sat, 18 Jul 2020 11:22:48 +0000</pubDate>
      <link>https://forem.com/braydenv/looking-inside-go-reverse-engineering-53f4</link>
      <guid>https://forem.com/braydenv/looking-inside-go-reverse-engineering-53f4</guid>
      <description>&lt;h1&gt;
  
  
  First: the Context
&lt;/h1&gt;

&lt;p&gt;Google hosts an abundance of technical events where avid programmers and engineers can get hands-on experience solving problems and battling it out against some of the best engineers in the world. One event in particular is the Google CTF where cybersec experts can try their hand at hacking at various levels of security challenges.&lt;/p&gt;

&lt;p&gt;Google also host a beginner's quest (the "qualifiers") for those looking for a challenge but are just getting started in the industry. While it is called the "beginner's quest" the challenges are usually by no means simple for those just starting out. However, they require less man power and breadth of knowledge compared to the main event. &lt;/p&gt;

&lt;h1&gt;
  
  
  Beginner's Quest 2019
&lt;/h1&gt;

&lt;p&gt;One of the challenges from the 2019 quest was simply named "Satellite" and labelled as a networking challenge.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Zi00U9Z4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/ZiqweoM.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Zi00U9Z4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/ZiqweoM.png" alt="alt text" title="The satellite challenge"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The linked attachment is a compressed file which contains a pdf and an unknown file named &lt;code&gt;init_sat&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RsEdzQ3J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/hz3wzNr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RsEdzQ3J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/hz3wzNr.png" alt="alt text" title="List of files on command line"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can use the &lt;code&gt;file&lt;/code&gt; command to get a better idea of what the &lt;code&gt;init_sat&lt;/code&gt; file is.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$ &lt;/span&gt;file init_sat 
init_sat: ELF 64-bit LSB executable, x86-64, version 1 &lt;span class="o"&gt;(&lt;/span&gt;SYSV&lt;span class="o"&gt;)&lt;/span&gt;, dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, Go &lt;span class="nv"&gt;BuildID&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;YhfyV09rKV_0ewkLiNr1/6ZJO5J8awFQSRgZDzlnA/zvyuoO7Qu3ralSU_Aheb/QK0rATh0jzljJY8j2313, not stripped
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;Here we can see that it is actually a 64-bit executable. We can also see that the binary is not stripped, indicating that the symbols table is still intact. This is useful as it means the binary contains the function names as well as other useful debug information.&lt;/p&gt;

&lt;h1&gt;
  
  
  Running, Running, Running
&lt;/h1&gt;

&lt;p&gt;To get an idea of what we are dealing with we should first execute the binary. After allowing execution (&lt;code&gt;chmod +x&lt;/code&gt;) we see that the program outputs a prompt asking for the name of the satellite.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OTYZyrkp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/qJCtIEI.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OTYZyrkp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/qJCtIEI.png" alt="alt text" title="Running the binary"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Practise what you preach
&lt;/h1&gt;

&lt;p&gt;It's always good practice to try what we know before digging deep. When presented with user input we can test for the usual pitfalls; buffer overflows, &lt;a href="https://owasp.org/www-community/attacks/Format_string_attack"&gt;printf formatting bugs&lt;/a&gt; and so on. Unfortunately these trivial tests proved futile in revealing any of the typical bugs.&lt;/p&gt;

&lt;h1&gt;
  
  
  And Dumping...
&lt;/h1&gt;

&lt;p&gt;To dig further, we need to dump the assembly code and understand how the program functions.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$ &lt;/span&gt;objdump &lt;span class="nt"&gt;-D&lt;/span&gt; init_sat &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; init_sat.asm
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;On inspection of the dump we notice there is a &lt;em&gt;lot&lt;/em&gt; of assembly code. In fact the assembly dump is a total of 85MB of text!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7VNnm4cC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wajMLRv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7VNnm4cC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/wajMLRv.png" alt="alt text" title="Massive assembly code file"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is a bit unexpected, especially since we noted before that the executable was dynamically linked. The point of a dynamically linked executable is that it uses shared libraries already installed on your operating system. In doing so it does not have to include bundled library code, greatly reducing its size.&lt;/p&gt;

&lt;p&gt;Skimming through a small section of the dumped assembly, we notice a few functions that sound like standard library functions. For example, &lt;code&gt;x_cgo_sys_thread_create&lt;/code&gt;. Searching for this function reveals that this binary was actually written in Go.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--gqXK-UCL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/nirj1n3nemulqyshiv8a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--gqXK-UCL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/nirj1n3nemulqyshiv8a.png" alt="Alt Text" title="Search for the function name"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When a Go binary is compiled, the standard libaries/Go runtime are statically linked. This has the consequence of &lt;a href="https://golang.org/doc/faq#Why_is_my_trivial_program_such_a_large_binary"&gt;ballooning the overall file size&lt;/a&gt;, resulting in even basic CLI programs being megabytes in size.&lt;/p&gt;

&lt;p&gt;Fortunately Go also includes a powerful toolkit that we can use to debug and investigate further. For example, it includes an &lt;code&gt;objdump&lt;/code&gt; command which we can use to dump the main function.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$ &lt;/span&gt;go tool objdump &lt;span class="nt"&gt;-s&lt;/span&gt; &lt;span class="s2"&gt;"main.main"&lt;/span&gt; init_sat
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;This command outputs way more debug information, with Go-specific symbols being included in the output. The dump also includes the Go file and associated line number that the assembly implements. Here is a snippet to illustrate what that looks like.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  init_sat.go:12    MOVQ CX, 0xb0(SP)
  init_sat.go:12    NOPL
  print.go:243      MOVQ os.Stdout(SB), CX
  print.go:243      LEAQ go.itab.*os.File,io.Writer(SB), DX
  print.go:243      MOVQ DX, 0(SP)
  print.go:243      MOVQ CX, 0x8(SP)
  print.go:243      LEAQ 0xa8(SP), CX
  print.go:243      MOVQ CX, 0x10(SP)
  print.go:243      MOVQ $0x1, 0x18(SP)
  print.go:243      MOVQ $0x1, 0x20(SP)
  print.go:243      CALL fmt.Fprint(SB)
  init_sat.go:16    NOPL
  init_sat.go:16    MOVQ os.Stdin(SB), AX
  init_sat.go:16    MOVQ AX, 0x70(SP)
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;&lt;em&gt;NB: Memory addresses have been ommitted for ease of reading&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Here we can see assembly code for the main file (&lt;code&gt;init_sat.go&lt;/code&gt;) and one of the standard library functions (&lt;code&gt;print.go&lt;/code&gt;). This clear distinction gives us more power to glance over the assembly and get to what we really care about. Since we aren't dissecting the standard library, we can mostly ignore the assembly code from anything other than &lt;code&gt;init_sat.go&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;How that we have a clear focus we can start to cross-reference the behaviour of the program with the assembly in front of us.&lt;/p&gt;

&lt;p&gt;Recalling the functionality, we note that the program first prints a message to the user. This takes form in the assembly snippet above with the call to &lt;code&gt;fmt.Fprint&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;The user is then prompted to enter the name of the satellite to begin the connection. It achieves this via the &lt;code&gt;bufio.go&lt;/code&gt; library code which makes a call to &lt;code&gt;bufio.(*Reader).ReadBytes&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  print.go:243     CALL fmt.Fprint(SB)
  init_sat.go:18   NOPL
  bufio.go:474     LEAQ 0x110(SP), AX
  bufio.go:474     MOVQ AX, 0(SP)
  bufio.go:474     MOVB $0xa, 0x8(SP)
  bufio.go:474     CALL bufio.(*Reader).ReadBytes(SB)
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;We can continue to skim over this library code until we find assembly from &lt;code&gt;init_sat.go&lt;/code&gt; again.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  bufio.go:475      0x4f8b87    MOVQ CX, 0x68(SP)           
  init_sat.go:20    0x4f8b8c    MOVQ CX, 0(SP)              
  init_sat.go:20    0x4f8b90    MOVQ AX, 0x8(SP)            
  init_sat.go:20    0x4f8b95    CALL strings.ToLower(SB)
  init_sat.go:20    0x4f8b9a    MOVQ 0x10(SP), AX
  init_sat.go:20    0x4f8b9f    MOVQ 0x18(SP), CX
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;strings.ToLower&lt;/code&gt; function is part of the &lt;a href="https://golang.org/pkg/strings/#ToLower"&gt;Go standard library&lt;/a&gt;. As the name suggests, it converts a string to lowercase and returns the resulting string.&lt;/p&gt;

&lt;p&gt;We can assume that one of the &lt;code&gt;MOVQ&lt;/code&gt; instructions is moving the lowercase string into a register. We can continue to follow the program flow to figure out whether it is the &lt;code&gt;AX&lt;/code&gt; or &lt;code&gt;CX&lt;/code&gt; register.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  init_sat.go:24    0x4f8ba4    CMPQ $0x5, CX
  init_sat.go:24    0x4f8ba8    JNE 0x4f8bbc    
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;This code block compares &lt;code&gt;0x5&lt;/code&gt; to the value in the &lt;code&gt;CX&lt;/code&gt; register and then jumps to a memory address if it is not equal. For now we can assume that &lt;code&gt;CX == 5&lt;/code&gt; and follow that branch of execution. In this case the program continues directly after the &lt;code&gt;JNE&lt;/code&gt; instruction.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  init_sat.go:24    0x4f8baa    CMPL $0x74697865, 0(AX)
  init_sat.go:24    0x4f8bb0    JNE 0x4f8bbc                
  init_sat.go:24    0x4f8bb2    CMPB $0xa, 0x4(AX)  
  init_sat.go:24    0x4f8bb6    JE 0x4f8ca6
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;The instructions above compare multiple values with the contents of the &lt;code&gt;AX&lt;/code&gt; register. The first instruction compares &lt;code&gt;0x74697865&lt;/code&gt; to &lt;code&gt;AX&lt;/code&gt; followed by a comparison of &lt;code&gt;0xa&lt;/code&gt; with &lt;code&gt;AX&lt;/code&gt; offset by 0x4 bytes. &lt;/p&gt;

&lt;p&gt;Converting the literal values (represented in hexadecimal) to ASCII, we note that they translate to 'tixe' and the newline character. Reversing the text (due to LSB format) reveals the string 'exit\n'.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OTYZyrkp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/qJCtIEI.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OTYZyrkp--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://i.imgur.com/qJCtIEI.png" alt="alt text" title="Running the binary"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Obviously these instructions are checking if the user entered 'exit' to quit. We can then conclude that the &lt;code&gt;JE&lt;/code&gt; instruction will jump to a memory address which prints "Exiting, goodbye" before terminating the program.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--reRxFl9d--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jpg0pmad3c2qwsve02k4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--reRxFl9d--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jpg0pmad3c2qwsve02k4.png" alt="Alt Text" title="Print goodbye string before exiting"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This is interesting, but not exactly what we are after. We need to know what name for the satellite the program is expecting. Let's take a look where the execution jumps to when &lt;code&gt;CX != 5&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight plaintext"&gt;&lt;code&gt;  init_sat.go:21    0x4f8bbc    CMPQ $0x7, CX
  init_sat.go:21    0x4f8bc0    JNE 0x4f8bdc                
  init_sat.go:21    0x4f8bc2    CMPL $0x696d736f, 0(AX)
  init_sat.go:21    0x4f8bc8    JNE 0x4f8bdc                
  init_sat.go:21    0x4f8bca    CMPW $0x6d75, 0x4(AX)
  init_sat.go:21    0x4f8bd0    JNE 0x4f8bdc                
  init_sat.go:21    0x4f8bd2    CMPB $0xa, 0x6(AX)
  init_sat.go:21    0x4f8bd6    JE 0x4f8c89
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;At this point we can probably infer that the &lt;code&gt;CX&lt;/code&gt; register is storing the length of the entered string. Previously the &lt;code&gt;CMPQ&lt;/code&gt; instruction checked for &lt;code&gt;0x5&lt;/code&gt; and the instructions that followed were looking for 'exit\n' - a five byte string. The first instruction in this code block is comparing &lt;code&gt;0x7&lt;/code&gt; to the &lt;code&gt;CX&lt;/code&gt; register, implying that the satellite name is seven characters in length.&lt;/p&gt;

&lt;p&gt;Again, the instructions execute a string comparison. The first &lt;code&gt;CMPL&lt;/code&gt; compares 0x696d736f, or 'imso' with &lt;code&gt;AX&lt;/code&gt;. If this passes, it then compares 0x6d75 ('mu') with &lt;code&gt;AX&lt;/code&gt; offset &lt;code&gt;0x4&lt;/code&gt; bytes. The final comparison checks for the familiar newline character. Reversing and putting it altogether we get &lt;code&gt;osmium\n&lt;/code&gt; - a seven character string!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--EwhzFUDm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/eu9dk7a8nfsngcpik8s4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--EwhzFUDm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/eu9dk7a8nfsngcpik8s4.png" alt="Alt Text" title="Successfully connecting to the satellite"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Sniffing out the flag
&lt;/h1&gt;

&lt;p&gt;After connecting to the satellite we are prompted with several options. The first option is of particular interest.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4ODmM8e4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bq8n6pvgvuhbb1zdb3va.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4ODmM8e4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bq8n6pvgvuhbb1zdb3va.png" alt="Alt Text" title="Displaying config data"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here we can see the &lt;code&gt;username&lt;/code&gt; and &lt;code&gt;password&lt;/code&gt; printed to the screen. Unfortunately the &lt;code&gt;password&lt;/code&gt; has been redacted. The config data response also includes a link to a Google doc which has a single base64 encoded string.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight"&gt;&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nv"&gt;$echo&lt;/span&gt; &lt;span class="s2"&gt;"VXNlcm5hbWU6IHdpcmVzaGFyay1yb2NrcwpQYXNzd29yZDogc3RhcnQtc25pZmZpbmchCg=="&lt;/span&gt; | &lt;span class="nb"&gt;base64&lt;/span&gt; &lt;span class="nt"&gt;-d&lt;/span&gt;
Username: wireshark-rocks
Password: start-sniffing!
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;



&lt;p&gt;As suggested let's fire up wireshark and start sniffing! Once we setup wireshark to sniff the correct interface, we need to reconnect to the satellite to capture the packets that send the config data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zurwj_UB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/2rzeeb3rmzcdthqj60wr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zurwj_UB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/2rzeeb3rmzcdthqj60wr.png" alt="Alt Text" title="Filtered TCP capture"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To filter the noise, we can search the packet bytes for the "Username" string, as shown in the screenshot above. We can then follow the TCP stream to reveal the plaintext password.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ncFFQevw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/01tm66ju3zr315mnbpo3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ncFFQevw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/01tm66ju3zr315mnbpo3.png" alt="Alt Text" title="TCP stream revealing password"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;That's it! We have successfully solved this CTF challenge by first reversing the Go binary to find the satellite name, connecting to the satellite and finally sniffing for the password which was returned in plaintext over the wire. &lt;/p&gt;

</description>
      <category>security</category>
      <category>cyber</category>
      <category>ctf</category>
      <category>hacking</category>
    </item>
  </channel>
</rss>
