image.png

IP Address: 172.25.200.200

Port: 9002

Want to run this Docker container locally?

docker run -d -p 9002:80 --restart always --name ctf-base64 joshbeck2024/ctf-base64-rev-shell-flag-k
<http://172.25.200.200:9002>

image.png

This time, we have a webpage with a form that expects encoded content. (If you play with the form field, you can see that it decodes from Base64 correctly.

Let’s just test it out. A great site that you’ll use all the time for encoding/decoding and encryption/decryption is CyberCheck

Google: CyberChef

Untitled

Can see here that Hello World will Base64 encode to: SGVsbG8gV29ybGQ=

Let’s paste that into the Flag K submission field and submit.

image.png

In this case, we’ll want to Base64 encode our reverse shell payload. Note: The technique here is one that you’ll utilize —very— often.

First, open up a file called rev.shell using pico

pico rev.shell

image.png

This is the reverse shell code from Flag B and Flag N write ups. Save this file and close it.