Here is your weekend challenge. Let’s try something different this week
#The Challenge
A group of Black Hats, known as the Cr4king GuYs are doing very bad things in the Internet, so your team have decided to stop them. Your colleagues have hacked into one of their computers and they’ve found a hidden partition that may contain interesting information.
So, they dumped the partition into a file and gave it to you, the in-house forensic analyst, to figure out if there is something interesting in there.
#Your Goal
Retrieve the passwords in the disk image to finally obliterate those skids.
To probe you solved the challenge, post the passwords you found in the comments. Use the spoiler tag so your solution is not seen by other people trying to solve the challenge. Be free to provide a brief write-up explaining how did you solve the challenge
This is a very basic challenge so there is only two hints.
Hint1: This is a forensic challenge not a cryptographic one
Hint2:
The straightforward to crypt a file with gpg is something like this:
$ gpg -c thefile
$ rm thefile
In case you are not familiar with mount, once you get the partition image (check previous challenges for that)
It was a word of warning, just in case. I do not want anybody to destroy their own data.
Are you using windows to solve the challenge?. It should be possible to mount the file on windows but I cannot give much support on that. Otherwise, please post/PM the errors to get an idea of what may be the problem. In the old days it was a bit more tricky to mount a file but nowadays the mount command should just work.
Telling us how to generate the file would be a huge help to me. It would enable me to explore the method used so I can understand the gibberish better. And I’d assume that in the scenario you described I would know how said file was generated
In my case, I download Salamander and opened the target file. It allows viewing of hex data and also loads images. I found:
First Credentials
Secret Service: Malware DB Pass: 1234
Second Credentials
Secret Service: C&C Servers Pass: g0d
Third Credentials
Secret Service: Secure Cloud Pass: sex
The hacker thought it was safe using a very strong key with GPG, but he didn’t properly deleted the original file that remains there. Salamander helps us with deleted file but since its no much of a deal, we can just hexedit and cat
Too bad I don’t understand forensics well enough (yet) to complete this challenge. Kudos to @sergeantsploit for finding such a straightforward solution and writing a detailed explanation though!
I have a number of passwords but they don’t seem to work when entered in the little prompt that pops up. Am I finished, or should I have a pass for this little prompt? EDIT: Ok, read Sergeantsploit’s answer above and think I got it, thanks for the challenge @0x00pf !
Here’s roughly what I did:
cat b64 | base64 -d | gunzip > disk_dump.img (already saw the original name from base64 -d and file)
mount disk_dump.img /mnt
cd’d into the disk and saw the secret.txt.gpg…
doing cat secret.txt.gpg | gpg brings up the pass prompt
strings disk_dump.img gives:
mkmkfs.fat
NO NAME FAT12
This is not a bootable disk. Please insert a bootable floppy and
press any key to try again …
ECRET TXT
"I"I
SECRET~1GPG
"I0I
The Cr4king GuYs
List of passwords to access our secret services
Malware DB: 1234
C&C Servers: g0d
Secure Cloud: sex
Not sure if that’s it, none of those passwords work in the prompt.