Official Mission Pinpossible Discussion

Official discussion thread for Mission Pinpossible. Please do not post any spoilers or big hints.

Comments

  • The given image is the emulation of the real hardware?

  • Type your comment> @alienum said:

    The given image is the emulation of the real hardware?

    No, as I understood its just an intercepted data. There should be a software to read it.

  • could someone help me? I don't how to read the file. I downloaded an app but I need help

  • Very popular soft/hardware for this kind of stuff, import the file and see what data you can get out of it. The image is not just decoration

    0x41

  • Could anyone give me a hand? I've decoded the data using a logic analyser but its still not making much sense to me

  • Type your comment> @megroooster said:

    Could anyone give me a hand? I've decoded the data using a logic analyser but its still not making much sense to me

    I think the given image is the hint

  • man, im so confused. i exported this data as CSV and wrote a py script to just parse the data, and there is zero info on what the flag can be

  • Having issues here myself, I've "worked" with Oscis and MC since my / their childhood but I'm unable to make anything out of it. If that's supposed to be binary data then 1.) it's quite a lot and the analysers wont export it as needed (or I don't know how), that means I could be noting down bits till 2:00 a.m. 2.) no idea how to make 12 keys from 2 bits.

  • edited July 22

    This was a really cool challenge. I've always wanted to get into hardware hacking, but never had the opportunity to do so. I feel like this was a decent crash course.

    However, I keep noticing what look to me like discrepancies in the bit stream that don't match everything I've been reading about the protocol. Has anyone else noticed these? I just can't figure them out. I've already completed the challenge, but it's driving me kind of nuts not understanding these small details.

    opt1kz
    https://i.imgur.com/4jXzPqJ.png
    404 Friend Not Found

  • How exactly do you do this?
    i got a logic analyser, exported the result as csv but how would you get a flag from this?

  • Type your comment> @opt1kz said:

    This was a really cool challenge. I've always wanted to get into hardware hacking, but never had the opportunity to do so. I feel like this was a decent crash course.

    However, I keep noticing what look to me like discrepancies in the bit stream that don't match everything I've been reading about the protocol. Has anyone else noticed these? I just can't figure them out. I've already completed the challenge, but it's driving me kind of nuts not understanding these small details.

    Feel free to DM me.

  • Type your comment> @opt1kz said:

    This was a really cool challenge. I've always wanted to get into hardware hacking, but never had the opportunity to do so. I feel like this was a decent crash course.

    However, I keep noticing what look to me like discrepancies in the bit stream that don't match everything I've been reading about the protocol. Has anyone else noticed these? I just can't figure them out. I've already completed the challenge, but it's driving me kind of nuts not understanding these small details.

    pm me with more details, i think i know what you're talking about

    0x41

  • any hints, please !

  • i got the csv file what next ?

  • @Wh1rlw1nd even i am stuck at the CSV , not seeing any proper connections

  • Was fun %) Hints to whom stuck at csv: you see some data transferred to device. Carefully check given jpeg image and identify/google carefully all devices on it. Next - google for how sent via i** interface data converted to the signals on main device. After just decode data on pins according to the datasheet %)) Sounds hard but it is really easy. Or if you have exactly the same hardware just sent bitstream to it ^)))) (I haven't and had to decode little bit using python) PS: I think that my hint does not violate rules? If after this hint somebody still stuck - pm me, I will give proper link which includes all needed initial data (in Russian but I think google translate will help)

  • I can't figure out the file format and what software can read it. Can anyone help?

  • edited August 29

    @GenIntel said:
    I can't figure out the file format and what software can read it. Can anyone help?

    The LOGICDATA is a file which contains electric pulses. I use Saleae Logic to interpret and see the information. It is kind of powerful, but I do not know if other tools are needed for reaching the flag.

  • edited August 30

    @BlackVS said:
    Was fun %) Hints to whom stuck at csv: you see some data transferred to device. Carefully check given jpeg image and identify/google carefully all devices on it. Next - google for how sent via i** interface data converted to the signals on main device. After just decode data on pins according to the datasheet %)) Sounds hard but it is really easy. Or if you have exactly the same hardware just sent bitstream to it ^)))) (I haven't and had to decode little bit using python) PS: I think that my hint does not violate rules? If after this hint somebody still stuck - pm me, I will give proper link which includes all needed initial data (in Russian but I think google translate will help)

    I have interpreted and analyzed the LOGICDATA file, but how do I know what the information sent is used for?
    I thought reading the Arduino libraries for the protocol used would be useful, but lots of garbage is inserted in the stream as far as the C file shows (between initialization and sending stuff there are lots of packets, for example).

  • Well, as @opt1kz said, I have very much enjoyed this challenge being my first attempt at hardware hacking. My advice is this: just use the picture and read about some bus and some LCD controller. After that, make sure to identify the pins and what they do, and write a simple python script to decode the whole thing.

    A really good introduction to hardware hacking, I think.

    Sociaslkas

  • can someone please confirm if the flag for this challenge respects this format? HTB{password}
    I've written several python scripts to try different approaches, but i'm currently stuck with byte interpretation, should be very straight forward but i think there is something i'm missing...

    marcos10soares

  • Type your comment> @marcos10soares said:

    can someone please confirm if the flag for this challenge respects this format? HTB{password}
    I've written several python scripts to try different approaches, but i'm currently stuck with byte interpretation, should be very straight forward but i think there is something i'm missing...

    I confirm that.

    Sociaslkas

  • Is possible to get the flag with the Software of logic An.... or the right path is write my own python script?

  • As like many of you, able to convert the data with the right analyzer... exported via .csv for further analysis, but I'm totally lost. The datasheet for the LCD device is no help to me (or I have no clue how to interpret it). Anyone have any helpful nudges? Thanks!

    Hack The Box

  • Type your comment> @socialkas said:

    Type your comment> @marcos10soares said:

    can someone please confirm if the flag for this challenge respects this format? HTB{password}
    I've written several python scripts to try different approaches, but i'm currently stuck with byte interpretation, should be very straight forward but i think there is something i'm missing...

    I confirm that.

    wasn't easy for a beginner like me, but it was fun

    marcos10soares

  • edited October 21

    Finally got it after 2 days of research!
    I don't know if it's possible to avoid writing a script
    But basically all the hints already mentioned in the forum are super helpful (Thx @BlackVS for the hints)

  • Type your comment> @BlackVS said:

    Was fun %) Hints to whom stuck at csv: you see some data transferred to device. Carefully check given jpeg image and identify/google carefully all devices on it. Next - google for how sent via i** interface data converted to the signals on main device. After just decode data on pins according to the datasheet %)) Sounds hard but it is really easy. Or if you have exactly the same hardware just sent bitstream to it ^)))) (I haven't and had to decode little bit using python) PS: I think that my hint does not violate rules? If after this hint somebody still stuck - pm me, I will give proper link which includes all needed initial data (in Russian but I think google translate will help)

    Hi, can you share additional links about datasheets, it seems that I can't find proper one because I can't convert data properly... TNX

Sign In to comment.