# Blood Bash
![Category](http://img.shields.io/badge/Category-Forensics-orange?style=for-the-badge) ![Points](http://img.shields.io/badge/Points-10-brightgreen?style=for-the-badge)

## Details

>We've obtained access to a system maintained by bl0ody_mary. There are five flag files that we need you to read and submit. Submit the contents of flag1.txt.
> Username: `bl0ody_mary`
> Password: `d34df4c3`
> `bloodbash.deadface.io:22`

First we connect to shell using the suplied credentials.
❯ ssh [email protected]
[email protected]'s password:
[email protected]:~$

Next we run: `ls -R` and see the follwiwng;

[email protected]:~$ ls -R
'De Monne Customer Portal.pdf' Documents Downloads Music Pictures Videos






so we try reading the flag using: `cat Documents/flag1.txt`


## flag{cd134eb8fbd794d4065dcd7cfa7efa6f3ff111fe}

Original writeup (https://github.com/CTSecUK/DEADFACE_CTF_2021/blob/main/Write-ups/Forensics/Blood%20Bash%20(10%20Points).md).