đź“”
UnderTheWire
  • Introduction
  • Century
    • Century 0 -> 5
    • Century 5 -> 10
    • Century 10 -> 15
  • Cyborg
    • Cyborg 0 -> 5
    • Cyborg 5 -> 10
    • Cyborg 10 -> 15
  • Groot
    • Groot 0 -> 5
    • Groot 5 -> 10
    • Groot 10 ->15
  • Oracle
    • Oracle 0 -> 5
    • Oracle 5 -> 10
    • Oracle 10 -> 15
  • Trebek
    • Trebek 0 -> 5
    • Trebek 5 -> 10
    • Trebek 10 -> 15
Powered by GitBook
On this page
  • Groot 0 -> 1
  • Groot 1 -> 2
  • Groot 2 -> 3
  • Groot 3 -> 4
  • Groot 4 -> 5

Was this helpful?

  1. Groot

Groot 0 -> 5

PreviousCyborg 10 -> 15NextGroot 5 -> 10

Last updated 4 years ago

Was this helpful?

Groot 0 -> 1

Grab creds from the slack and login via SSH:

ssh groot1@groot.underthewire.tech
Password: groot1

Groot 1 -> 2

The password for groot2 is the last five alphanumeric characters of the MD5 hash of this system’s hosts file.

Get-FileHash C:\Windows\System32\drivers\etc\hosts -Algorithm MD5
Password: 464c3

Groot 2 -> 3

The password for groot3 is the word that is made up from the letters in the range of 1,481,110 to 1,481,117 within the file on the desktop.

$word = (Get-Content .\elements.txt);$list = ""; 1481110..1481117 | ForEach-Object {$list += $word[$PSItem]} ; $list
Password: hiding

Need a more efficient method, if exists

Groot 3 -> 4

The password for groot4 is the number of times the word “beetle” is listed in the file on the desktop.

(Get-Content .\words.txt) -split ' '| ?{$_ -like 'beetle'} | Measure-Object
Password: 5

Same as Century 14 -> 15

Groot 4 -> 5

The password for groot5 is the name of the Drax subkey within the HKEY_CURRENT_USER (HKCU) registry hive.

Get-ChildItem HKCU:\ -Recurse | Select-String Drax
Get-ChildItem  -Path "HKCU:\Software\Microsoft\Assistance\Drax"
Password: destroyer
https://overpoweredshell.com/Exploring-PowerShell-6-Character-Ranges/