Skip to main content

Shiba Insider

What is the response message obtained from the PCAP file?

Let's open the insider.pcap file using Wireshark.

1

Let's follow the TCP stream via Follow > TCP Stream.

2

Answer

use your own password

 

What is the password of the ZIP file?

The answer to the previous question told us to use our own password.

If we look at the TCP stream we can see a string sent by us that might be a password.

3

The string has two == signs at the end. This is an indication that the string has been encrypted using Base64.

Let's use Cyberchef to decode it.

4

Answer

redforever

 

Will more passwords be required?

We can now unzip file.zip using the redforever password.

$ unzip file.zip 
Archive: file.zip
[file.zip] ssdog1.jpeg password:
inflating: ssdog1.jpeg
inflating: README.txt

As there are no more Zip files, we can safely say that no more password will be required.

Answer

No

 

What is the name of a widely-used tool that can be used to obtain file information?

The exiftool utility can be used to obtain file information such as the metadata.

Answer

Exiftool

 

What is the name and value of the interesting information obtained from the image file metadata?

Let's look at the file metadata using the exiftool utility as mentioned previously.

$ exiftool ssdog1.jpeg 
ExifTool Version Number : 12.42
File Name : ssdog1.jpeg
Directory : .
File Size : 84 kB
File Modification Date/Time : 2021:09:26 16:07:52-04:00
File Access Date/Time : 2021:09:26 16:07:57-04:00
File Inode Change Date/Time : 2023:09:17 11:04:50-04:00
File Permissions : -rw-rw-r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.01
Resolution Unit : None
X Resolution : 1
Y Resolution : 1
XMP Toolkit : Image::ExifTool 11.88
Technique : Steganography
Technique Command : steghide
Image Width : 1080
Image Height : 1018
Encoding Process : Baseline DCT, Huffman coding
Bits Per Sample : 8
Color Components : 3
Y Cb Cr Sub Sampling : YCbCr4:4:4 (1 1)
Image Size : 1080x1018
Megapixels : 1.1

All the information is pretty standard for an image except for the Technique : Steganography field. Steganography is used to hide information in other information most notably images.

Answer

Technique : Steganography

 

Based on the answer from the previous question, what tool needs to be used to retrieve the information hidden in the file?

The steghide tool needs to be used retrieve the hidden information.

Technique                       : Steganography
Technique Command : steghide

Answer

StegHide

 

Enter the ID retrieved.

Let's use the steghide utility to retrieve the ID.

$ steghide extract -sf ssdog1.jpeg 
Enter passphrase:
wrote extracted data to "idInsider.txt".

The sf flag is used to specify the name of the stego file.

$ cat idInsider.txt 
0726ba878ea47de571777a

Answer

0726ba878ea47de571777a

 

What is the profile name of the attacker?

Let's look at our own user profile.

5

If we look at the user profile, we can see that the user IDs are included in the URI.

https://blueteamlabs.online/home/user/26e1135472d925e971ea68

What if we replace this ID with the one we retrieved: 0726ba878ea47de571777a.

6

We have our attacker.

Answer

bluetiger