-
Pihole
Sat, 01 May 2021 14:01:03
Challenge Submit the contents of flag.txt, found in USB storage on the device. Device Location: 192.168.10.172 Ports: 22, 80 Admin interface: https://192.168.10.172/admin Possible Exploit https://frichetten.com/blog/cve-2020-11108-pihole-rce/
-
Mosquitto Flag 2
Sat, 24 Apr 2021 09:41:43
Challenge See if you have the patience to scratch the itch; patience is key. Mosquitto bites are so annoying! Except, in this case.. you can become an admin. Connect at: x.x.x.x:1883 using iot:iot Web Portal: http://x.x.x.x Solve Look at the new Mosquitto server, connecting using the following command mosquitto_sub -h x.x.x.x -p 1883 -u iot -P iot -t "#" Grab the text that looks like a flag. Base64 decode the username and password.…