Sneaky methods for capturing the “Geolocation Flag(s)” for Hack.lu CTF

I decided that this post should could be summed up pretty quickly with just a few pictures, so I’m doing this in more of a blurb format than a blog post :)

The challenge:

Selection_004

This was to allow some wiggle rooms for teams solving the same challenges.

 

geoSelection_005

Loved this challenge, was a lot of fun brainstorming ideas!

 </p>

 

Pharming my blog readers (sorry about that)

#

Sorry guys, CTF fever!

 

 

 

Luring people to my blog via Reddit posts and false Pastebin(s)

geoSelection_003

Selection_001

 

Creating a script to use all international TOR exit nodes

 

Tmux is the best thing since sliced bread

Tmux is the best thing since sliced bread

Mild amounts of proxy scraping

Pretty fruitless attempt sadly (already had many countries at this point)

Pretty fruitless attempt sadly (already had many countries at this point)

#

Making my forum signature image the “secret” link

geoSelection_006

(This works because the browser still does an automatic GET request for images, regardless of whether or not they are actually a proper image format). I ended up stirring up an international thread on the forum I used just to obtain more obscure country flags 😉

Again, sorry about farming you guys for flag points but their was no malware or anything – just a small bit of JSON!

Till next time,

-mandatory

Matthew Bryant (mandatory)

Matthew Bryant (mandatory)
Security researcher who needs to sleep more. Opinions expressed are solely my own and do not express the views or opinions of my employer.