HTB HackTheBoo 2022 - (Forensics) Trick of Breach
‘Trick or Breach’ was a forensics challenge (day2 out of 5) from HackTheBox’s HackTheBoo CTF.
Network analysis. Exporting data
The only thing that we got for this challenge was a pcap file.
We open the file with wireshark and the only thing that we can see is DNS traffic.
Each request is a query for hex_string.pumpkincorp.com. For each request we can also see a response from the DNS server.
A good starting point would be to get those hex strings and check if they mean anything.
For that, the first step is exporting the data using tshark. (you can also use wireshark for this, tshark was easier for me)
Extracting the data
Now we got the data in a json file we can process it with a tool like jq in order to get only the relevant parts.
First, we want to get only the DNS query out so we’ll use this query for that.
Note: you can (and should) develop that query one step at a time. You start from scratch and add each of its components one at a time so you can understand why each piece is there.
Something that clearly looks ‘wrong’ is that every line appears twice.
That’s because we extracted both the DNS query and the server’s response. It might’ve been a smart thing to either use a tshark filter or a select in jq to get only one of those.
However, we can fix this easily by using awk. We’ll display only the lines that have an even index (so, every other line).
Now we have the data without any duplicates. However, we still need to remove the quotes at the beginning and the last part of each line (“.pumpkincorp.com: type A, class IN”).
The lines are the same length so this is easy to do with awk: we’ll remove the first character and the last 35 characters from every line.
After we add that part, the command looks like this.
Recovering the file
We put the hex strings in CyberChef and use the “Form Hex” operation.
The first characters (PK) hint that this could be a zip file. So we download it and try to unzip it.
The file gets recognized as a Microsoft Excel file. We can unzip that … so we do.
Then, we take a quick look at xl/sharedStrings.xml and we notice our flag.
No need to open the file in Excel :)
Other forensics challenges from this CTF
This CTF released a challenge in each of its 5 categories every day.
I have writeups for all the forensics challenges. Here are some links to them:
- Day 1 - Wrong Spooky Season
- Day 2 - Trick or Breach (you are here)
- Day 3 - Halloween Invitation
- Day 4 - POOF
- Day 5 - Downgrade