Control4 Flag 2
Sat, 24 Apr 2021 12:45:27
Challenge Submit the contents of flag.txt, found in USB storage on the device. Device Control4 Device Location: 192.168.10.174 Port: A bunch Exploit: Default SSH credentials Getting the flag Look through USB devices. didn’t find anything. ~# cd /mnt/media/usb/ /mnt/internal/usb# ls Looking for USB devices ~# dmesg | grep usb <6>[42949373.260000] usbcore: registered new interface driver usbfs <6>[42949373.260000] usbcore: registered new interface driver hub <6>[42949373.260000] usbcore: registered new device driver usb <6>[42949373.…
Sat, 08 Aug 2020 13:22:15
After doing some research on the control4 product, we found that there is a default root password. user password root t0talc0ntr0l4! Getting the flag The flag is located on the SD card, so we go look in /mnt/sd/ $ cd /mnt/sd/ $ ls Flag.txt flash lost+found We found the flag, and now we can cat it out and capture it.