Another long run of a 24hrs CTF. My Team ByteForc3 ended 15th (too good) overall :). It was a gr8 CTF.

back

Here are some of the challs:

Forensics

  1. Time Matters

  2. Time Problems

Time Matters

timem01

A simple (yet it took our 1337 time) memory forensics challenge. Fired up volatality and ran a profile scan. timem02

Win7SP1x86

Next ran a pslist scan but no suspicious processes were found except for a bunch of chrome.exe’s. (the chrome-series plugins for volatility were’nt of any help to this chall but will return in the next one :P).

python2 vol.py --plugins=plugins/ -f ../for1.raw --profile=Win7SP1x86 pslist

A filescan lead to some interesting files and reference.

timem03

However there were a lot of files but only two things caught us:

0x000000001e24bcd0      2      1 R--rwd \Device\HarddiskVolume2\Users\studio\Desktop\steghide
0x000000001e45e730      8      0 R--rwd \Device\HarddiskVolume2\Users\studio\Desktop\DS0394.jpg

Meaning , a JPEG and a steghide who doesn’t love that.

Dumping the jpeg with:

python2 vol.py --plugins=plugins/ -f ../for1.raw --profile=Win7SP1x86 dumpfiles -Q 0x000000001e45e730 --dump-dir .

It was a pic of Leonel Messi with a date reference in the right corner(:at the end of the movie).

29/08/2019

So from here it was simple, the only thing that was left was password. So the password actually pushed us into some deep rabbit holes. First a try of strings on the dump (n00b approach) revealed nothing. Then we extracted the NTLM hashes and tried to crack it but no Luck :( So on waiting and thinking and talking to admin , we ended up using Mimikatz the infamous Red-Team Dagger. (Ofcourse we were stupid enough not to think this before).

time04.png

& yea in no time our password was right there. Messi2020

But wait , Steghide did’nt like the password and so here came the date reference at the bottom right corner of image. (29/08/2019). So Changing the Messi2020 to Messi2019 gave us our pretty flag.

timem05

Securinets{c7e2723752111ed983249627a3d752d6} .

Time Problems

Another Memory Forensics Chall.

tim01

It took relatively less time than the previous one.

Same profile. Win7SP1x86

This time the process and file scan , both did’nt give anything. So seeing a lotta chrome process like previous one. This time the Chrome Plugins were of great help in solving the challenge.

So starting with chromehistory.

tim02

This time there were references to Neymar. Looks like Admin was a serious Football fan :). Aside from Neymar and Corona this one caught our attention.

 26 http://52.205.164.112/ 	2     1 2020-03-20 11:57:23.309102      N/A     

Going to the IP gave us ::

tim03

By this time Hint was updated for the chall.

Time capsule works! For sure!

This pointed to using wayback or this http://timetravel.mementoweb.org/.

tim04

And there was our flag with 6 empty places for us to fill.

Securinets{█████_1s_my_f4vorit3_Pl4yer}

Upon using the Neymar reference it filled the first place perfectly.

So the final flag was:

Securinets{neymar_1s_my_f4vorit3_Pl4yer}

This was all.

Thanks For reading out.