Sagemcom F@st 2404 Original Firmware

Greetings, future me or anyone else who may stumble upon this message.

Have you encountered the unfortunate situation of being compelled to use a Sagemcom F@st 2404 ADSL modem? Perhaps you were daring enough to install OpenWRT on it, only to realize that you lack the necessary 3.3V serial cable to proceed past the “firstboot” screen.

Fear not, for Uncle Dimme once again comes to the rescue! No need to delve deep into the abyss of scouring Tunisian telecom-company forums in search of the original firmware.

Here’s a simple solution for you:

  1. Download the Original Firmware from here (F2404_3_33_8a4_fs_kernel_NONE.DAT.zip) and unzip it – hooray!
  2. Press and hold the reset button on the modem.
  3. Power up the modem while continuing to hold the reset button.
  4. After approximately 20 seconds, observe the power LED turning red, and then release the reset button.
  5. Connect an Ethernet cable and manually configure your PC’s IP address to 192.168.1.2.
  6. Open your web browser and go to 192.168.1.1, then proceed to flash the firmware.
  7. Allow a minute for the process to complete.
  8. Reboot your router using the web interface.
  9. Embrace the joy of your less-than-stellar, sluggish ADSL internet.

May your online ventures be filled with perseverance and patience!

Can you capture the flag?

Preface

HEY! Stop cheating! Go back to the CTF and try to solve it on your own!

The required resources to solve this CTF are now offline.

During the last year or so I created a CTF out of boredom. I posted a QR code / string to various friends, work colleagues, and on-line forums where I expected people to be able to solve it.

This is the QR code which decodes to:

#QBdg%HGILH&R9vch)NBTAt5.X3oWb\BxMbn5,GR0wTQ*0xuHBc=

Sadly nobody has been able to solve it so far, which I find a bit strange. No way I’m that awesome that I have created the best way to obfuscate data on the Internet? Probably the right person to solve it has not yet come along, or maybe I wasn’t effective enough at spreading the CTF to enough people capable of solving it.

Anyway, here is the solution.

Step 1

By looking at the string the solver should recognize the striking similarity it has with a base64-encoded string, indicated by the “=” character at the end of the string. However there seem to be a bunch of other characters that do not belong in a base64 string.

A closer look will reveal that, starting with the first character, every 6th character after that doesn’t belong in a base64 string. So there is a pattern. Let’s remove every 6th character and see that we have left:

Base 64 string: QBdgHGILHR9vchNBTAt5X3oWbBxMbn5GR0wTQ0xuHBc=
Characters that don’t belong: #%&).\,*

Now we have a valid base64 string! Let’s decode it and see what we get:

@`borALy_zlLn~FGLCLn

Yeah, it doesn’t make much sense. The solver is now supposed to recognize that the base64 string decodes to binary data. Why would that be the case? Let’s go back to the extra chars that don’t make sense, why did we have those chars there? It is highly possible that the binary data is actually encrypted data and the extra chars are the key. What is the simplest cipher for binary data encryption? The XOR cipher. Alright, let’s write a small script to test this hypothesis:

<?php
$string = "QBdgHGILHR9vchNBTAt5X3oWbBxMbn5GR0wTQ0xuHBc=";
$key = "#%&).\,*";

// Base64 decode
$dec = base64_decode($string);

// XOR decode $dec with $key
for ($i = 0; $i < strlen($dec); $i++) {
  $dec{$i} = $dec{$i} ^ $key{$i % strlen($key)};
}

// Echo the result
echo $dec;

Wow it worked, we get something that makes sense:

c2F5LW15LW5hbWUuY3J5b2Rldi5jb20=

Now let’s base64 decode this and see what we get:

say-my-name.cryodev.com

Step 1 completed.

Step 2

Step 1 provided us with a hostname. Let’s open it up in a browser and see what we get:

Those Greeks have concealed my writing, keep looking…

Interesting, not much information here. But wait, “say-my-name” must be a reference to something. Name -> Domain Name System -> DNS. Alright, let’s see if there are any TXT DNS records for this subdomain:

$ host -t TXT say-my-name.cryodev.com
say-my-name.cryodev.com descriptive text "/bobby-tables"

Step 2 completed.

Step 3

Step 2 revealed a TXT DNS record. It returns "/bobby-tables". So let’s append that to the hostname previously found and visit http://say-my-name.cryodev.com/bobby-tables:

An XKCD comic appears… named exploits_of_a_mom.jpg. Is there an SQL injection vulnerability on the site? Maybe, but currently we cannot find any GET/POST variables on the site to exploit. Let’s keep looking… The solver should recognize that the image ends with .jpg. XKCD comics are always .png! Oh wait, one more thing. Do you remember this quote from earlier?

Those Greeks have concealed my writing, keep looking…

The solver is now supposed to think of Steganography. A quick Wikipedia search reveals:

The word steganography comes from New Latin steganographia, which combines the Greek words steganós (στεγανός), meaning “covered or concealed“, and -graphia (γραφή) meaning “writing“.

Got it now? There must be a message steganographically hidden within the .jpg image. A quick Google search reveals that the most common steganography tool in Linux is steghide. Let’s see if that can decode anything:

$ steghide --extract -sf exploits_of_a_mom.jpg 
Enter passphrase: # try without a passphrase
wrote extracted data to "message.txt".
$ cat message.txt 
?mom

Step 3 completed.

Step 4

Step 3 revealed what we desperately needed all along, a GET variable! Let’s visit http://say-my-name.cryodev.com/bobby-tables/?mom and see what we get:

Come on, I’m spoon-feeding you now!

Alright alright, let’s assign some value to ?mom e.g. http://say-my-name.cryodev.com/bobby-tables/?mom=1:

Name: Robert

Interesting, a reference to Robert “Bobby Tables” from the comic. Let’s seek for an SQL injection at ?mom, e.g. using something like http://say-my-name.cryodev.com/bobby-tables/?mom=1' OR 'x'='x:

Name: Robert
Name: https://www.youtube.com/watch?v=6Ejga4kJUts
Name: https://www.youtube.com/watch?v=jxjeqCd6Zm0
Name: https://upload.wikimedia.org/wikipedia/en/0/00/Machine_Head_album_cover.jpg

Step 4 completed.

Step 5

In step 4 we injected a GET variable and retrieved a bunch of database entries in the form of various links. The first link points to the Cranberries song “Zombie” with the unforgettable chorus “In your head, in your head“. RIP Dolores :'( The second and third links both refer to a band named “Machine Head“.

Did you get it yet? Yes we have to check the HTTP header! A quick inspection in your favorite browser’s inspection tool reveals the following entries that don’t belong there:

Step 5 completed.

Step 6

Step 5 revealed a telnet server and a telnet key. Let’s make a telnet connection and see what we get:

$ telnet bofh.cryodev.com 666
Trying 83.212.84.234...
Connected to bofh.cryodev.com.
Escape character is '^]'.
OQZaPmlBB1wKIGILaSooGFZRfkk7HnY0CgctVxFIUUcHJmUZBHw8B24rcgsbP2YIKXQnJX0oOlsiaDgWIXMPMXo1eEInIHYBUSoKBHggCXk4fwQJDHNBRjsyKkIBeHoVF1lXEX0wYh0jMGUQAnYZKlBcLk4xdwJLCwcyLGofdE00P2UfaSVPA30kelsoCmEJDHMQQBEDXFM3DGVCBHNfBH0/RAcYW1cEKmQrKlE5UQUxeBYMDGMbIHo1NUQPWmEfVDVCD20NAVsoN1sJMnMURBMiOk0CHAoIHHMgEVEvCRkgMG0WKAEncA==
Connection closed by foreign host.

Very interesting, yet another base64 string. Can we decode it directly?

9Z>iA\
 bi*(VQ~I;v4
-WHQG&e|<n+r?f)t'%}(:["h8!s1z5xB' vQ*
x 	y8	sAF;2*BxzYW}0b#0ev*P\.N1wK2,jtM4?ei%O}$z[(
a	s@\S7eBs_}?D[W*d+*Q9Q1xc z55DZaT5Bm
[(7[	2sD":M
s Q/	 0m('p

It doesn’t seem so, we get binary data again. Oh wait, we have the X-Telnet-Key from earlier! Let’s run the XOR cipher once more with the new key and the new base64 string and see what we get:

<?php
$string = "OQZaPmlBB1wKIGILaSooGFZRfkk7HnY0CgctVxFIUUcHJmUZBHw8B24rcgsbP2YIKXQnJX0oOlsiaDgWIXMPMXo1eEInIHYBUSoKBHggCXk4fwQJDHNBRjsyKkIBeHoVF1lXEX0wYh0jMGUQAnYZKlBcLk4xdwJLCwcyLGofdE00P2UfaSVPA30kelsoCmEJDHMQQBEDXFM3DGVCBHNfBH0/RAcYW1cEKmQrKlE5UQUxeBYMDGMbIHo1NUQPWmEfVDVCD20NAVsoN1sJMnMURBMiOk0CHAoIHHMgEVEvCRkgMG0WKAEncA==";
$key = "h4cK3rM4nh4x0rz";

// Base64 decode
$dec = base64_decode($string);

// XOR decode $dec with $key
for ($i = 0; $i < strlen($dec); $i++) {
  $dec{$i} = $dec{$i} ^ $key{$i % strlen($key)};
}

echo base64_decode($dec);

And the result is:

Congratulations! You solved the riddle! There is no prize, I’m too poor for that, I was just bored and made this. Let me know if you would like to brag: <my email here>

Step 6 completed.

Conclusion

So, that’s the CTF. Do you think it was too complicated? I think the first step was the hardest, once you recognize the XOR cipher and the fact that it can be reused in step 6 the CTF is not that complicated.

Anyway, I will leave the infrastructure for this CTF up and running for a few more weeks if anyone wants to verify my solution, but then I will take it down.

Thanks for reading!

PS: Don’t try to hack my server using the intentionally created SQL injection, it will not work ;)

Mollymawk tests

Yes, I am alive. I know I haven’t posted anything in three years. There are many reasons behind this, but I will leave this for another time.

As I mentioned in an earlier post, I got into this aviation thing back in 2015. Since then, I have taken it further and completed a commercial pilot’s license with multiple engine and instrument ratings and some other stuff. What does this all mean? I can now fly the big birds for money if an operator decides to hire me. But to the big question, how do you get an operator to hire you?

It is not a simple task; you have to submit countless applications and be prepared never to hear back from anyone. They say there is a pilot shortage, hmm…? If you are lucky, you might be called to an assessment. What? You don’t know what an assessment is? Don’t worry. I got you covered.

In the aviation industry, assessments are what job interviews are in any other field of work. But since pilots are rich (we are rich, right? somebody, please confirm?), assessments have to be complicated money and time-consuming processes. I was partially lucky and got called to an assessment for an operator called SunExpress. Spoiler alert: I didn’t get the job. I have nothing but good things to say about SunExpress. They are very professional in what they are doing and have high standards for their pilots. The reason I failed in my assessment is purely my own fault.

It basically works like this: You get a phone call, which is some kind of unofficial first interview. If they are happy with you after the phone call, you get invited to do an online ITEP English proficiency test. If you pass the ITEP test, you get invited to do some psychometric tests at SunExpress’s own premises. If you pass the psychometric tests, you get invited to do a simulator test-flight in a full-motion Boeing 737-800 simulator. The simulator was a lot of fun to fly, but this is as far as I got. If you pass the simulator test, you get invited to a formal interview, and if you pass the interview, you get the job! Phew…

Boeing 737-800 Simulator
Boeing 737-800 Full Motion Simulator

So what are the psychometric tests? They are the Mollymawk psychometric tests, also used by other operators like CargoLux and Pegasus Airlines. They are split into two categories: skill tests and aptitude tests. The skill tests test your knowledge in math, science, and English. Those were the easy ones for me. The aptitude tests test your memory, orientation skills, and ability to multitask, divided into three computer “games” named “Working Memory” “Spatial Orientation” and “Time Sharing”.

To do the Mollymawk tests, you have to purchase two packages: skill and aptitude tests. Each package costs 150€, and if you fail one subject or game in one package, you have to re-purchase the whole package to do the failed test again. The first time I did the Mollymawk tests, I passed the skill tests but failed the aptitude tests. Thus I had to re-purchase the aptitudes package to do the tests a second time. Luckily the second time, I passed. You only get one second chance. In total, I spent 450€, not counting travel expenses, as a part of what essentially is a job interview for a job that I didn’t get.

I felt that more practice would give me a better chance to pass the aptitude tests on the first go. The aptitude tests are essentially a form of primitive computer games. When you purchase the aptitudes package, they give you 10 practice runs in each game you can play at home. They argue that the learning curve is logarithmic and that after 10 practice runs, you have asymptotically reached your optimum ability in playing the games, but I doubt that. As anyone knows, practice makes perfect. So I decided to code my own version of the games and help other pilots truly reach the optimum before doing the final tests.

I have created a Mollymawk test practice website, where I have implemented my own version of the Mollymawk games. A user can register an account and purchase one of the three time-limited packages for playing the games. The games may be played unlimited times!

I have also implemented an interface for the users to track their progress as they are getting better:

Why do I ask for money and not put it out for free if I truly care about the other pilots? Somehow, I have to make back the money I lost during my earlier “job interviews”. After-all, pilots are rich. We rich guys, right? Do we have no problems paying 19€ instead of 150€ for doing the tests a second time?

Anyhow, if you are a pilot and in need of my services, I truly hope I helped and wish you the best of luck!

And remember, when in doubt, go around! (preferably above 1000 feet GND in IMC, unlike me).

Flying airplanes and living life

So I haven’t written anything on this website for quite some time. Nothing much has happened since my last post, besides one little thing. I took my private pilot’s license (PPL), which I am very proud of. I am certified to fly small single-engine piston (SEP) airplanes up to 5700 kg and land them on land, not water. This happened at the end of June 2015, so it has actually been a while. Since then, I have logged a little more than 70 hours of flight time, mainly on Cessnas 172 and 152. In September 2015, I started working on my night rating (NQ) to fly during the night. I still have one hour of flight left before I get this rating, but the school, some school in south Sweden (ha!) that I went to, had their teaching permission revoked due to some administrative hurdles. Hopefully, they will get it back sometime in March, and I will finish my rating.

One more thing that I have been doing is studying ATPL theory at TFHS, the aviation school of Lund University (I can’t seem to detach myself from this university). I’m still at the stage where I’m doing my school exams before moving on to the EASA exams. I should complete those sometime in early summer (ha-ha summer in Sweden), and then I should attempt the EASA exams. A really nice tool for helping me in my ATPL studies is the aviation exam. They are not paying me anything for writing about them here, I really find them useful, and I want to share my experience with other students.

So long people, be happy and enjoy life!

Oh, and by the way, here is a video of the first flight of the year in snowy Sweden:

First solo and first cross-country solo flight

My 30th hour in the air is approaching. The required hours for a PPL license are 45. I really like flying. It’s something that grows on you. So far, I have performed a few hours of solo flight, which means that you are alone in the cockpit flying the airplane. The cross-country solo flight is a longer version of a longer flight to navigate to a nearby airport. Enjoy the videos!

Flight lessons

Last year in September, I started taking lessons towards a private pilot’s license (PPL) for airplanes. There is an aviation club nearby (http://www.eslovsflygklubb.se/) that also functions as a pilot academy. It is a great feeling seeing the earth from above =)

Here are some videos from my first few flight lessons. More will come. Subscribe to my YouTube channel if you want to get updates immediately.

Dirty Filthy PCBs

I just received 10 PCBs that I ordered from dirtypcbs.com a couple of weeks ago. I have to say that the quality is amazing. For $14, they are not dirty at all! They lack gold-plated pads, unlike PCBs from OSHpark, but if that is none of your concerns, then it’s a go! I don’t claim that OSHpark is obsolete now, but for simple prototyping, when you want to be allowed to make mistakes, dirtypcbs are filthy enough to allow you to do that.

image

Mooltipass compile and flash guide for MacOSX

Mooltipass

Mooltipass is an open source offline password keeper that started off at Hackaday as an idea from Mathieu Stephan. I am one of the few lucky beta-testers and as such I would like to explain in this guide how to compile and flash its firmware from source. This guide is written for Mac OSX 10.9.

1. First of all: I DO NOT TAKE RESPONSIBILITY IF YOUR MOOLTIPASS AND/OR DVD PLAYER EXPLODES AND/OR YOUR WIFE DUMPS YOU! FOLLOW THIS GUIDE AT YOUR OWN RISK, IT REPRESENTS THE UNOFFICIAL VIEW OF THE VOICES IN MY HEAD.

2. Second, get the required tools. If you don’t already have MacPorts, download and install it from their website.

3. Once this is done, install git, binutils, gcc, avr-gcc, avr-libc and dfu-programmer from MacPorts. Just a note: I already had xcode installed on my mac, so this did it for me. If you install all of these tools and still have problems at compiling, try installing the Command Line Tools.

sudo port install git binutils gcc48 avr-gcc avr-libc dfu-programmer

4. Get the latest source code from github:

git clone https://github.com/limpkin/mooltipass.git

5. Define that you are a beta-tester ;) and compile the source code:

cd mooltipass/source_code
sed -i "" "s/XXXXXXX/BETATESTERS_SETUP/" src/defines.h
make

6. Set your mooltipass in DFU mode:

  1. Disconnect your mooltipass (if connected).
  2. Insert your smartcard upside down, with the chip-side up.
  3. Connect your mooltipass.

7. Flash your newly compiled firmware:

sudo dfu-programmer atmega32u4 erase
sudo dfu-programmer atmega32u4 flash mooltipass.hex

8. Disconnect your mooltipass, remove the smartcard, connect your mooltipass and insert the smart card.

9. Profit?

Folk racing

Racing is something that I always wanted to do but never really got to it. A couple of weeks ago, I went folk racing with a friend at a nearby track. It was great fun! This month I booked a second time, and in the future, I will probably get my own crappy racing car provided that I find a parking spot for it.

Here is a video from the race a couple of weeks ago: