From 25a748043cff6dca13c043f7b853d9bcda45401b Mon Sep 17 00:00:00 2001 From: Eun0us Date: Thu, 26 Mar 2026 18:45:15 +0000 Subject: [PATCH] screens: add screenshots to ESP/Jnouner_Router/README.md --- ESP/Jnouner_Router/README.md | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/ESP/Jnouner_Router/README.md b/ESP/Jnouner_Router/README.md index 37793cb..de47c90 100644 --- a/ESP/Jnouner_Router/README.md +++ b/ESP/Jnouner_Router/README.md @@ -58,7 +58,9 @@ a custom UDP protocol (JMP) to exfiltrate the final flag. ## Solution -### Setup — Flash the firmware +### Setup +![esptool flashing firmware to ESP32](https://git.espilon.net/Eun0us/ESPILON-CTF-2026-Writeups/raw/branch/main/screens/esptool_flash.png) + — Flash the firmware ```bash esptool.py --chip esp32 --port /dev/ttyUSB0 --baud 460800 write_flash -z \ @@ -77,7 +79,9 @@ screen /dev/ttyUSB0 115200 --- -### Flag 1 — Console Access (100 pts) +### Flag 1 — Console Access +![UART admin console authentication](https://git.espilon.net/Eun0us/ESPILON-CTF-2026-Writeups/raw/branch/main/screens/jnouned_uart.png) + (100 pts) The UART console presents a `jnoun-console>` prompt requiring a password. @@ -101,7 +105,9 @@ Flag 1 is printed on success. --- -### Flag 2 — 802.11 TX (200 pts) +### Flag 2 — 802.11 TX +![802.11 frame capture with flag payload](https://git.espilon.net/Eun0us/ESPILON-CTF-2026-Writeups/raw/branch/main/screens/jnouned_wifi.png) + (200 pts) From the admin console, read device settings: