Belkasoft CTF 6: Write-up
Kanajam Ananthapurnasai
Cyber Security Specialist | Expert in Bug Hunting, Malware Analysis, and Digital Forensics.
The Plot
The CTF plot develops around a seemingly dull and insignificant incident. A cashier at a corner shop received a fake $50 bill and reported it to the police. Given the absence of other intriguing cases (it seems like you are working in a happy community!) your boss wants you to uncover what happened. Quite unexpectedly, your investigation leads to some significant findings.
Will you be able—using digital forensics only—to expose a well-organized gang involved in counterfeit currency crimes?
Let's begin taking flags!
1. Ident (Baby)
Question
What is the Apple ID used on the imaged iPhone?
Solution
Flag
[email protected] (the task was solved 231 times)
2. Namedrop (Baby)
Question
What is the iPhone owner's full name? Flag format: First name Last name
Solution
Flag
William Phorger (the task was solved 223 times)
3. Conspirators (Warmup)
Question
Which Telegram accounts did the owner discuss shady stuff with? Flag format: @username, @username, @username, ...
Solution
Flag
@Sm00thOperat0r, @locknload771, @JesusStreeton1999, @diddyflowers (this task was solved 172 times)
4. Visit (Tricky)
Question
Where does William live? Flag format: latitude, longitude—or just click the map
Solution
Flag
Nottingham Ave, 7402, Saint-Louis, MO, 63119 (this task was solved 134 times)
5. Username (Baby)
Question
What is the username of the laptop user?
The police searched Phorger's house and seized his laptop. This is your second image; you can now unpack it using the provided password.
Note: from now on, you have 2 images. You would want to look at each one from time to time. You have an option to filter artifacts by data source (preferred way when you are not in rush) or create two Belkasoft X cases to avoid need for filtering artifacts Overview (not recommended for real life, but can save some time for the CTF rush). Below, when we write [iPhone], it will mean that you have to either filter by iPhone data source or to look into your iPhone case (similarly, [Windows]).
Solution
Flag
phorger (this task was solved 188 times)
6. April Paycheck (Warmup)
Flag
7012 (this task was solved 96 times)
7. Party (Tricky)
Question
Where did the gang go to celebrate their success together in March? Flag format: latitude, longitude—or just click the map
Solution
Flag
5453 Magnolia Ave, St. Louis (this task was solved 14 times)
8. Crypto (Warmup)
Question
Which file does the guy keep his encrypted container in? Flag format: full path, e.g. C:\VeraCrypt\MyContainer.vc
Solution
Flag
C:\Users\phorger\Documents\desktop.ini:vault.vhdx (accepted also without ":vault.vhdx"; this task was solved 69 times)
9. Luxury (Warmup)
Question
Which luxurious item did Phorger put his laundered money into? Flag format: full name incl. any codes, e.g. Bugatti Chiron BG744
Solution
Flag
Rolex Submariner Date ref 126619LB (this task was solved 51 times)
10. Vacation (Tricky)
Question
Which concert were Phorger and his girlfriend planning to attend in May? Format: artist, venue, city, e.g. Taylor Swift, Friends Arena, Stockholm
Solution
Flag
Eric Clapton, Accor Arena, Paris (this task was solved 17 times)
11. Illustrator (Warmup)
Question
What's the name of the person who designed the print template for the bills? Flag format: First name Last name
Solution
Flag
Drew Linesworth (this task was solved 36 times)
12. Homebrew Lab (Tricky)
Question
Where is the makeshift lab where they printed the cash located? Flag format: full address, e.g. 314 S Main St, Kirksville, MO
领英推荐
Solution
Flag
900 N 88th St, East St Louis, IL (this task was solved 36 times)
13. Largest Batch (Warmup)
Question
What is the precise moment their largest printing batch was completed? Provide exact timestamp in a common format, e.g. 2023-07-17 17:07:07 UTC
Solution
Flag
02.04.2024 22:44:30 UTC (this task was solved 61 times)
14. Device (Tricky)
Question
What's the printer model they used to print money? For example, Canon Color imageCLASS MF656Cdw
Solution
Flag
HP LaserJet Professional M1132 MFP (this task was solved 51 times)
15. Night Shift (Tricky)
Question
Which ATM did Phorger test his bills on recently? Flag format: bank and street name, e.g. Chase ATM on S Main St
Solution
5. Use wigle.net to find this Wi-FI location by its MAC address, google its name to find some PDFs mentioning the hotspot. Either way, you will figure that this is the network of University City Public Library:
6. Google for ATMs nearby
Flag
Regions Bank ATM on Delmar Blvd (this task was solved 19 times)
16. Mole (Hard)
Question
Who leaked the technical data on the bill validator to the gang? Flag format: First name Last name
Solution
5. Open the file in any PDF viewer. The file turns out to be digitally signed by the insider:
Flag
Kenneth Leek (this task was solved 11 times)
17. Financial institution (Hard)
Question
Which offshore financial institution did the gang bank with? Provide its SWIFT code.
Solution
Well, this is by far the toughest task in the entire CTF! Kudos to the 4 players who were so persistent that they solved this incredibly difficult task.
Navigate to [iPhone] → Artifacts → Overview → Chats. In the chat, the boss says on March 1st, that he opened a Panamanian bank account. Some time later, Chase start communicating using cryptic hex messages:
>>2fce2a77262293ce51775dfc9322937afc115177c2e7e7ce11e377f822e77a93223b773bce9393cebd779c51
<< a9a62f0081ed12650012caed12650012ca
Trace back when the hex communication started—it is January 16th:
>> No messaging apps can be trusted, believe me.
>> Have you got the Shortcut I sent to you? << Yes, Chase, but no idea how to approach its use.
>> Just press Share on any text. And punch in the secret key we agreed on in the box that pops up.
<< addaf04dc94ddaf04ddfc980661fc91e7caac9f0dadac94df1664d0c
In a nutshell, the code turns the key given to it into two numbers—"a" and "b", and then transforms each text character, multiplying it by a and adding b
6. Since there are not so many variations of a and b, you can decrypt the encryption by brute force, leaving only the results made up entirely of printable characters. Here is a sample code for brute-forcing:
7. Try this code for the very first message to test. You will see the following:
It works!
8. So, now try it on the biggest message from the chat, near the discussion of the offshore account:
Flag
CRVBPA2P (this task was solved 5 times)
18. Statement (Hard)
Question
Paste Phorger's entire bank statement here, containing all his offshore transactions.
Solution
3. The bank's site has a login form (requires login and password) and a password recovery option (requires login and card number):
4. On the Windows image, there is a file C:\Users\phorger\Pictures\Capture2.png, which has a screenshot of several transactions in Panamanian balboas
5. If you look at this file in the Hex Viewer, you can see that the PNG marker of IEND is located approximately at 15% from the beginning of the file, and after it, there's a lot of data, which also ends with IEND
6. This is a sign of the Acropalypse bug—the screenshot app first takes a full-screen screenshot and writes it to a file as PNG, and when cropping, it overwrites the file content with the new cropped PNG, but does not truncate the file to the new length—so the tail of the full-screen PNG remains in the file
7. From this tail, you can recover the image, for example, with the Acropalypse-Multi-Tool
8. On the uncropped image, you can see the login "william_phorger" and the card number "1234 9936 8022 7397"
9. Using these details, you can reset the password for the account on crbk.org
10. To download the full transaction history, the bank asks to confirm the operation with a one-time code from a 2FA app
11. Find the iTunes backup inside the Windows image and navigate to pictures inside on the Artifacts → Structure → iPhone → Pictures
12. Among the pictures, there is a deleted screenshot of an export from the Google Authenticator app:
13. You can import it into the Google Authenticator app or decode it with the tool https://github.com/dim13/otpauth, and generate a 6-digit code with the authenticator
14. After entering the code, the bank gives out a CSV with the transaction history:
Webmaster @ Anti-Forensics.com (InfoSec)
7 个月Do you get a trial of Belkasoft X Forensic?