Another long run of a 24hrs CTF. My Team ByteForc3 ended 15th (too good) overall :). It was a gr8 CTF.
Here are some of the challs:
Forensics
-
Time Matters
-
Time Problems
Time Matters
A simple (yet it took our 1337 time) memory forensics challenge. Fired up volatality and ran a profile scan.
Win7SP1x86
Next ran a pslist scan but no suspicious processes were found except for a bunch of chrome.exe’s. (the chrome-series plugins for volatility were’nt of any help to this chall but will return in the next one :P).
python2 vol.py --plugins=plugins/ -f ../for1.raw --profile=Win7SP1x86 pslist
A filescan lead to some interesting files and reference.
However there were a lot of files but only two things caught us:
0x000000001e24bcd0 2 1 R--rwd \Device\HarddiskVolume2\Users\studio\Desktop\steghide
0x000000001e45e730 8 0 R--rwd \Device\HarddiskVolume2\Users\studio\Desktop\DS0394.jpg
Meaning , a JPEG and a steghide who doesn’t love that.
Dumping the jpeg with:
python2 vol.py --plugins=plugins/ -f ../for1.raw --profile=Win7SP1x86 dumpfiles -Q 0x000000001e45e730 --dump-dir .
It was a pic of Leonel Messi with a date reference in the right corner(:at the end of the movie).
29/08/2019
So from here it was simple, the only thing that was left was password. So the password actually pushed us into some deep rabbit holes. First a try of strings on the dump (n00b approach) revealed nothing. Then we extracted the NTLM hashes and tried to crack it but no Luck :( So on waiting and thinking and talking to admin , we ended up using Mimikatz the infamous Red-Team Dagger. (Ofcourse we were stupid enough not to think this before).
& yea in no time our password was right there.
Messi2020
But wait , Steghide did’nt like the password and so here came the date reference at the bottom right corner of image. (29/08/2019). So Changing the Messi2020
to Messi2019
gave us our pretty flag.
Securinets{c7e2723752111ed983249627a3d752d6}
.
Time Problems
Another Memory Forensics Chall.
It took relatively less time than the previous one.
Same profile.
Win7SP1x86
This time the process and file scan , both did’nt give anything. So seeing a lotta chrome process like previous one. This time the Chrome Plugins were of great help in solving the challenge.
So starting with chromehistory
.
This time there were references to Neymar. Looks like Admin was a serious Football fan :). Aside from Neymar and Corona this one caught our attention.
26 http://52.205.164.112/ 2 1 2020-03-20 11:57:23.309102 N/A
Going to the IP gave us ::
By this time Hint was updated for the chall.
Time capsule works! For sure!
This pointed to using wayback or this http://timetravel.mementoweb.org/.
And there was our flag with 6 empty places for us to fill.
Securinets{█████_1s_my_f4vorit3_Pl4yer}
Upon using the Neymar reference it filled the first place perfectly.
So the final flag was:
Securinets{neymar_1s_my_f4vorit3_Pl4yer}
This was all.
Thanks For reading out.