Description

Solution

We’re presented with a file called lockedbox, this file apparently is Makeself archive.

[ihuomtia@pc alocked_box]$ file lockedbox    
lockedbox: POSIX shell script executable (binary data), self-executable archive, Makeself 2.5.0

We’ll just extract the content of it using binwalk as shown below.

[ihuomtia@pc alocked_box]$ binwalk -e lockedbox    
  
DECIMAL       HEXADECIMAL     DESCRIPTION  
--------------------------------------------------------------------------------  
0             0x0             Executable script, shebang: "/bin/sh"  
840           0x348           Unix path: /usr/ucb/echo; then  
875           0x36B           Unix path: /usr/ucb/echo"  
931           0x3A3           Unix path: /usr/xpg4/bin; then
[...]
18176900      0x1155B84       Zlib compressed data, default compression  
18178934      0x1156376       Zlib compressed data, best compression  
18199124      0x115B254       Zlib compressed data, best compression

Next up, we got a bunch of files, after checking all of them the most interesting one was 4986 as it contains some useful files.

[ihuomtia@pc alocked_box]$ cd _lockedbox.extracted/  
[ihuomtia@pc _lockedbox.extracted]$ ls  
4986         99AB55.zip   9BF0A0.zip   AE4720.zip   B06ACA.zip   B43FC3.zip                                                           setuptools  
960A85.zip   99F430.zip   9CB636.zip   AEE062.zip   B15A2A.zip   BAF365.zip  
97A000.zip   9A0E19.zip   A1FE83.zip   AFDC3F.zip   B1F3F7.zip  'ǶmÛ¶mÛ¶mÛ¶mܱîØÖ'$'\035''ÛúÇÊK²Jª'$'\302\222''^õ¢'$'\027''gÓ§OW}'  
98DE7A.zip   9AC287.zip   ADBA65.zip   B068F7.zip   B2F078.zip   pip
[ihuomtia@pc _lockedbox.extracted]$ file 4986    
4986: POSIX tar archive

Lets’s extract it and see what’s inside.

[ihuomtia@pc _lockedbox.extracted]$ tar xvf 4986    
./.packaged_python/python/bin/2to3  
./.packaged_python/python/bin/2to3-3.11  
./.packaged_python/python/bin/idle3  
./.packaged_python/python/bin/idle3.11
[...]
./.packaged_python/python/share/man/man1/python3.11.1  
./_packaged_startup.sh  
./lockbox.py  

Basically there’s a file named lockbox.py, this file contains a bunch of fake flags, maybe to confuse anyone that uses grep?

[ihuomtia@pc _lockedbox.extracted]$ cat lockbox.py    
flag0 = 'flag{cfcd208495d565ef66e7dff9f98764da}'  
flag1 = 'flag{c4ca4238a0b923820dcc509a6f75849b}'  
flag2 = 'flag{c81e728d9d4c2f636f067f89cc14862c}'  
flag3 = 'flag{eccbc87e4b5ce2fe28308fd9f2a7baf3}'  
flag4 = 'flag{a87ff679a2f3e71d9181a67b7542122c}'
[...]
flag995 = 'flag{2bcab9d935d219641434683dd9d18a03}'  
flag996 = 'flag{0b8aff0438617c055eb55f0ba5d226fa}'  
flag997 = 'flag{ec5aa0b7846082a2415f0902f0da88f2}'  
flag998 = 'flag{9ab0d88431732957a618d4a469a0d4c3}'  
flag999 = 'flag{b706835de79a2b4e80506f582af3676a}'  
FLAG_PREFIX = "flag{%s}"  
  
print(FLAG_PREFIX % "3a50c5e41a1c3eee6dcddca9e04992e0"

As shown from the source running this Python file will print out the flag.

[ihuomtia@pc _lockedbox.extracted]$ python lockbox.py    
flag{3a50c5e41a1c3eee6dcddca9e04992e0}  

And here’s the flag: flag{3a50c5e41a1c3eee6dcddca9e04992e0}