Skip to content

Commit 30229af

Browse files
committed
2 parents da1529e + 73608e5 commit 30229af

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

public/content/writeups/themulestealer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Decoding the base64 string , we get an image of a rabbit, Indeed this guy is ver
1818

1919
So i decided to check out the webpage we got before , maybe i missed something? Since the captcha was not visible properly the next step ( obviously ) would be to check out the page-source.
2020

21-
It was all normal other than that there’s another link present that reads its a mp4 file [`https://verifycert.task.sasc.tf/video/cat_rabbit.mp4`](https://verifycert.task.sasc.tf/video/cat_rabbit.mp4) , well maybe we will see a bunny hopping around this time but to my horrors its was a `POWERSHELL` script!!!
21+
It was all normal other than that there’s another link present that reads its a mp4 file [Suspicious MP4: cat_rabbit.mp4](https://verifycert.task.sasc.tf/video/cat_rabbit.mp4) , well maybe we will see a bunny hopping around this time but to my horrors its was a `POWERSHELL` script!!!
2222

2323
### POWERSHELL.PS1
2424

@@ -207,4 +207,4 @@ print("Decrypted data", decrypted_data.decode('utf-8', errors='ignoree'))
207207

208208
and Voila!!!!
209209

210-
We get our flag : `SAS{c475_w17h_r4bb17_34r5_c4n_d3liv4r_m4lw4r3}`
210+
We get our flag : `SAS{c475_w17h_r4bb17_34r5_c4n_d3liv4r_m4lw4r3}`

0 commit comments

Comments
 (0)