CyberDefender - Hunter (Part 3)
Challenge: https://cyberdefenders.org/blueteam-ctf-challenges/32 Part 1: https://hackmd.io/@SBK6401/By1BpZIf6 Part 2: https://hackmd.io/@SBK6401/HJlmeuwfT
:::spoiler TOC [TOC] :::
Tools
==Q21==
One of the installed applications is a file shredder. What is the name of the application? (two words space separated)
Recon
承接上一題,我們已經知道BCWipe就是題目要的答案,也就是類似file shredder的工具,但前面六個字還是沒有想法,看了一下外層資料夾才發現Jetico是啥東西啊,上網查才發現是提供各種data encryption/data wiping/endpoint data protection之類的公司,所以這一題的正確答案是Jetico BCWipe
:::spoiler Flag
Flag: Jetico BCWipe
:::
==Q22==
How many prefetch files were discovered on the system?
Recon
就只是到/root/Windows/Prefetch/
中數有多少的.pf檔案(善用排序)
:::spoiler Flag
Flag: 174
:::
==Q23==
How many times was the file shredder application executed?
Recon
我們已經知道file shredder就是BCWipe這個軟體,那我們如果要知道這個軟體的相關資訊可以直接看prefetch file(就像Part 1 - Q9一樣)
Exploit
從結果可以得知共執行五次 :::spoiler Result
1 |
|
:::
:::spoiler Flag
Flag: 5
:::
==Q24==
Using prefetch, determine when was the last time ZENMAP.EXE-56B17C4C.pf was executed?
Recon
直接看Part 1 - Q9的輸出結果就好了
:::spoiler Flag
Flag: 06/21/2016 12:08:13 PM
:::
==Q25==
A JAR file for an offensive traffic manipulation tool was executed. What is the absolute path of the file?
Recon
通常直覺會是到program file去看一下,不過有時候載下來的軟體可能是portable version,所以我也到downloads去看,發現唯一一個jar file就是burpsuite
:::spoiler Flag
Flag: C:\Users\Hunter\Downloads\burpsuite_free_v1.7.03.jar
:::
==Q26==
The suspect employee tried to exfiltrate data by sending it as an email attachment. What is the name of the suspected attachment?
Recon
用pst viewer瀏覽一下信件就知道了
:::spoiler Flag
Flag: Pictures.7z
:::
==Q27==
Shellbags shows that the employee created a folder to include all the data he will exfiltrate. What is the full path of that folder?
Recon
看一下pictures裡面的資料夾很明顯的Exfil就是我們的目標
:::spoiler Flag
Flag: C:\Users\Hunter\Pictures\Exfil
:::
==Q28==
The user deleted two JPG files from the system and moved them to $Recycle-Bin. What is the file name that has the resolution of 1920x1200?
Recon
這應該是嘗試,如果刪除檔案會直接丟到recycle bin,所以可以直接到這邊去撈,不過從recycle bin撈到的檔案貌似損毀,紙看到應該是貓貓的耳朵
所以可以查看一下原圖是甚麼,我是直接從Pictures裡面的private中撈檔案
剛好檔案大小誠如題目所述
:::spoiler Flag
Flag: ws_Small_cute_kitty_1920x1200.jpg
:::
==Q29==
Provide the name of the directory where information about jump lists items (created automatically by the system) is stored?
Background
- 甚麼是windows jump list
Windows Jump List(視窗跳躍清單)是微軟Windows操作系統的一個功能,它允許用戶在任務欄或開始菜單中快速訪問最近使用的文件或網站。 Jump List通常包含以下元素:
最近打開的文件:這些是您最近打開的文件或應用程序,讓您可以快速重新訪問它們。
固定的項目:您可以將特定文件或應用程序釘選到Jump List中,以便隨時方便訪問。
一些應用程序還可以自定義Jump List,提供特定功能或快速操作的選項。 Jump List通常會顯示在相應應用程序的任務欄圖標上,並提供一個方便的方式來訪問最近的活動。
請注意,某些應用程序可能會選擇不支持Jump List功能,這取決於開發人員的實現方式。
Recon
我直接問ChatGPT後得到以下回答:
The directory where information about jump list items (created automatically by the system) is stored in Windows is:
1%APPDATA%\Microsoft\Windows\Recent\AutomaticDestinations
This directory contains files that store information about recently accessed items and is used by the Jump List feature in Windows. Each file corresponds to a specific application or taskbar icon. Please note that these files are in a binary format and are not meant to be manually modified.
:::spoiler Flag
Flag: AutomaticDestinations
:::
==Q30==
Using JUMP LIST analysis, provide the full path of the application with the AppID of “aa28770954eaeaaa” used to bypass network security monitoring controls.
Recon
該用到新工具的時候了,下載JLECmd後可以直接查看.ms file,就是我們上一題找到的地方,在Recent/CustomDestinations
的地方有這一題著重探到的aa28770954eaeaaa
,export出來之後就可以開始分析
Exploit
1 |
|
我們到了jump list的absolute path之後就可以回去翻他在哪邊,原來是在desktop
:::spoiler Flag
Flag: C:\Users\Hunter\Desktop\Tor Browser\Browser\firefox.exe
:::