CyberDefender - L'espion

CyberDefender - L’espion

Challenge: https://cyberdefenders.org/blueteam-ctf-challenges/73

Scenario

You, as a soc analyst, have been tasked by a client whose network was compromised and brought offline to investigate the incident and determine the attacker’s identity.

Incident responders and digital forensic investigators are currently on the scene and have conducted a preliminary investigation. Their findings show that the attack originated from a single user account, probably, an insider.

Investigate the incident, find the insider, and uncover the attack actions.

Tools

  • Google Maps
  • Google Image search
  • sherlock

Q1

File -> Github.txt: What is the API key the insider added to his GitHub repositories?

Recon

直接在github key word search,就找到了 圖片.png

Flag: aJFRaLHjMXvYZgLPwiJkroYLGRkNBW

Q2

File -> Github.txt: What is the plaintext password the insider added to his GitHub repositories?

Exploit

還是和上一題一樣慢慢找,終於找到一個base64的密碼 圖片.png

1
2
>>> b64decode(b'UGljYXNzb0JhZ3VldHRlOTk=')
b'PicassoBaguette99'

Flag: PicassoBaguette99

Q3

File -> Github.txt: What is the plaintext password the insider added to his GitHub repositories?

Recon

像第一題一樣直接key word search 圖片.png

Flag: xmrig

Q4

What university did the insider go to?

Recon

看了第一個hint,發現可以用linkedin找大學

Flag: Sorbonne

Q5

What gaming website the insider had an account on?

Exploit

這一題是通靈,答案是steam,但是其實在此刻(2023/11/06),這個帳號已經消失了,所以就算用sherlock,都會找不到

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
$ conda create --name sherlock python=3.10 -y
$ pip install -r requirements.txt
$ python sherlock/sherlock.py EMarseille99
[*] Checking username EMarseille99 on:

[+] CNET: https://www.cnet.com/profiles/EMarseille99/
[+] Dealabs: https://www.dealabs.com/profile/EMarseille99
[+] G2G: https://www.g2g.com/EMarseille99
[+] GitHub: https://www.github.com/EMarseille99
[+] Lolchess: https://lolchess.gg/profile/na/EMarseille99
[+] Twitter: https://twitter.com/EMarseille99
[+] Virgool: https://virgool.io/@EMarseille99
[+] Whonix Forum: https://forums.whonix.org/u/EMarseille99/summary
[+] metacritic: https://www.metacritic.com/user/EMarseille99

[*] Search completed with 9 results

Flag: steam

Q6

What is the link to the insider Instagram profile?

Recon

直接google search: Émilie Marseille

Flag: https://www.instagram.com/emarseille99/

Q7

Where did the insider go on the holiday? (Country only)

Recon

直接看IG的貼文,可以用image search搜尋圖片,發現這就是新加坡濱海灣金沙飯店 未命名.jpg

Flag: Singapore

Q8

Where is the insider’s family live? (City only)

Recon

可以先觀察IG post 1IG post 2 圖片.png 圖片.png

Exploit

第一張圖片可以看到若隱若現的國旗,可能是Jordan / Palestine / United Arab Emirates,這三個國家的國旗都很像,再看第二張圖片可以發現有一個高塔,幾乎確定就是杜拜塔,也很符合他的國家(United Arab Emirates)

Flag: Dubai

Q9

File -> office.jpg: You have been provided with a picture of the building in which the company has an office. Which city is the company located in?

Recon

直接找hippodrome theatre chinese quarter就知道是在英國的Birmingham

Flag: Birmingham

Q10

File -> Webcam.png: With the intel, you have provided, our ground surveillance unit is now overlooking the person of interest’s suspected address. They saw them leaving their apartment and followed them to the airport. Their plane took off and has landed in another country. Our intelligence team spotted the target with this IP camera. Which state is this camera in?

Recon

直接丟到image search就知道是university of notre dame,就在印第安納州

Flag: INDIANA