Advertisement
Guest User

Untitled

a guest
Aug 3rd, 2017
958
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.95 KB | None | 0 0
  1. #Flag Step Progression (this assumes the user already determined the `13.56.108.41` address in previous flags)
  2.  
  3. ##Grab SSL for email pivot
  4.  
  5. * This could have been done multiple ways, but Censys would have been easiest.
  6.  
  7. Specifics of the cert found at the IP were as follows:
  8.  
  9. * **metadata.added_at**: `2017-07-06T20:52:58+00:00`
  10. * **parsed.__expanded_names**: `com, x64-corp.com, prod02.x64-corp.com`
  11. * **parsed.fingerprint_sha1**: `136baff94917a2107dda8dbe582815331e86e230`
  12. * **parsed.issuer.organizational_unit**: `Rafaela.Pereira@x64-corp.com`
  13. * **parsed.issuer_dn**: `CN=prod02.x64-corp.com, OU=Rafaela.Pereira@x64-corp.com, O=x64Corp, L=SanFransisco, ST=CA, C=US`
  14. * **Validity**: `2017-07-05 18:22:38 to 2018-07-05 18:22:38 (365 days, 0:00:00)`
  15.  
  16. The key pivot takeway here would be the email address: `Rafaela.Pereira@x64-corp.com`
  17.  
  18. ##Find additional account information
  19. * A basic Google search for the email address would have led to the following Pastes:
  20. * `hxxps://pastebin[.com/2nZ5BLav`
  21. * This would have given you the following additional information:
  22. * DOB: 11 April 1983
  23. * Twitter: @i4mrafaela
  24. * `hxxps://pastebin[.com/hpkBJgDg`
  25. * This was a false pivot and led nowhere (kisses)
  26. * The Twitter account has mostly useless posts except for one hint that hints at the nickname `Donovan`
  27. * Since they have a Twitter, they might have a Facebook?
  28. * Searching the email address on Facebook would lead us to this profile:
  29. * `hxxps://www.facebook[.]com/profile.php?id=100019421580542`
  30.  
  31. ###Facebook
  32. * Hints on the Facebook page:
  33. * Nickname: donovan
  34. * Multiple hints would have led the user here (Profile website is submit ID for malwr & fave quote is sample hash) :
  35. * `hxxps://malwr[.]com/analysis/MjEyM2U1MmIzM2JmNDYzNTk5YmQ5YWNiOGRkMDNjNmU/`
  36. * Response to one of the comments on July 20 was a password:
  37. * `??42|french|MONDAY|type|EXPECT|were|TEACHER|82??`
  38.  
  39. ##File Analysis
  40. Once the user figured out the Malwr and hash hints, it would have led to the following report:
  41. * `hxxps://malwr[.]com/analysis/MjEyM2U1MmIzM2JmNDYzNTk5YmQ5YWNiOGRkMDNjNmU/`
  42.  
  43. File Specifics:
  44. * **FILE NAME**: 5.jpg
  45. * **FILE SIZE**: 6888 bytes
  46. * **FILE TYPE**: JPEG image data, EXIF standard 2.3
  47. * **MD5**: `422ac9912efaa7ae6bf4160bbf9d5da2`
  48. * **SHA1**: `ecdba596e0ba8e3ec0f3147980ed22faf0fcf020`
  49. * **SHA256**: `316908561be9ce44349610a0753357198d32b41079d6d9e3d6883146ce6d193f`
  50.  
  51. ##EXIF Data
  52. * **File Type**: JPEG
  53. * **MIME Type**: image/jpeg
  54. * **Processing Software**: `pyExifToolGui 0.5`
  55. * **Image Description**: `ZmlmdHktdHdvLm5pbmUuc2l4dHktZml2ZS50d28tdHdlbnR5LWZpdmU=`
  56. * **Artist**: `Rafaela Pereira`
  57. * **Copyright**: `x64-corp`
  58. * **User Comment**: `eff-tee-pee`
  59.  
  60. * The fact that the Processing Software is `pyExifToolGui 0.5` would lead an analyst to believe that possible exif modification had been performed.
  61. * Image description is a Base64 encoded string, decodes to: `fifty-two.nine.sixty-five.two-twenty-five` | `52.9.65[.]225`
  62. * User Comment is: `eff-tee-pee` (FTP)
  63.  
  64. The information within the exif would have led the analyst to the following: `ftp://52.9.65[.]225`
  65.  
  66. ##Accessing FTP (Getting the Flag!)
  67. * Site location: `ftp://52.9.65[.]225`
  68. * Username: previously listed as a username on the Facebook page - `donovan`
  69. * Password: previously posted as a comment on the Facebook page - `??42|french|MONDAY|type|EXPECT|were|TEACHER|82??`
  70.  
  71. Once the analyst reaches this page, they are met with a file whose contents were:
  72. * `"Amidst the mists and coldest frosts he thrusts his fists against the posts and still insists he sees the ghosts"`
  73.  
  74. ##How you could have cheated
  75. * The avatar for the social media counts was intentionally chosen. A reverse image search would have led to the movie/book title: `Donovan's Brain`
  76. * A search for the nickname "Donovan", plus the word "brain", would have also led to the title
  77. * An example wikipedia entry lists one of the books more popular quotes:
  78. * `"Amidst the mists and coldest frosts he thrusts his fists against the posts and still insists he sees the ghosts."`
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement