The Needle

Created: July 31, 2025 3:38 PM Difficulty: Very Easy Category: hardware

This challenge provides us a .bin file, which represents a Linux Kernel ARM boot executable. This file could be analyzed with binwalk getting the following output

binwalk

Here we are interest on the Squashfs filesystem which could be extracted with dd and the following command

dd if=firmware.bin of=filesystem.squashfs skip=538952 bs=1

where if refer to the input file, of identify the output file, the skip flag indicates from where start to extract the file and the bs set the reading bytes as 1. When this command is run we get an .squashfs file that we could analyze using unsquashfs command getting finally the filesystem.

filesystem

At this point we need to found some credentials but we need to locate the script dedicated for login for that we could make a recursive search and filtering by the word login , it could be

grep -r . -e login

Analyzing the output we found the following command telnetd -l "/usr/sbin/login" -u Device_Admin:$sign which gave us the hint to search for the “variable” sign (you could use find . -name sign) getting the file where the password is stored.

At this point we could connect to the HTB endpoint to search the flag.

Home