Tags: pentest
Rating:
# MI6configuration - Writeup (Solve any local VM challenge basically)
Writeup Author - @refr4g
We know that the password for decrypting the volume is the first name of the James Bond character "Q". After a bit of googling, we found that it was Major Boothroyd, who is known as Q (which stands for Quartermaster). We found the password for decrypting the volume and it is "major".
We will export the virtual machine (appliance), and on that machine we will insert the ubuntu installation iso file so that we can get a live ubuntu.
![Screenshot](https://raw.githubusercontent.com/CyberHeroRS/writeups/main/BYUCTF/2023/Pentest/MI6configuration/1.png)
Now boot into the ubuntu installation, and select try ubuntu. Then open terminal and login as root.
We have to list block devices and see on which partition are system files of challenge.
![Screenshot](https://raw.githubusercontent.com/CyberHeroRS/writeups/main/BYUCTF/2023/Pentest/MI6configuration/2.png)
We can see that /dev/sda5 device is LUKS crypted and thats what we are looking for, on that device are system files of challenge.
Now we will decrypt it using cryptsetup.
![Screenshot](https://raw.githubusercontent.com/CyberHeroRS/writeups/main/BYUCTF/2023/Pentest/MI6configuration/3.png)
We can see that device has been successfully decrypted.
Mount decrypted root partition to /mnt.
![Screenshot](https://raw.githubusercontent.com/CyberHeroRS/writeups/main/BYUCTF/2023/Pentest/MI6configuration/4.png)
Root partition is successfully decrypted. Now we can get all flags for the challenge.
![Screenshot](https://raw.githubusercontent.com/CyberHeroRS/writeups/main/BYUCTF/2023/Pentest/MI6configuration/5.png)
* **Flag 1** - `byuctf{anonymous_ftp}`
![Screenshot](https://raw.githubusercontent.com/CyberHeroRS/writeups/main/BYUCTF/2023/Pentest/MI6configuration/6.png)
* **Flag 3** - `byuCTF{cronjobzz}`
![Screenshot](https://raw.githubusercontent.com/CyberHeroRS/writeups/main/BYUCTF/2023/Pentest/MI6configuration/7.png)
* **Flag 4** - `byuctf{sudo_mi6configured}`