Shiba Insider
What is the response message obtained from the PCAP file?
Let's open the insider.pcap
file using Wireshark.
Let's follow the TCP stream via Follow > TCP Stream
.
Answer
use your own password
What is the password of the ZIP file?
The answer to the previous question told us to use our own password.
If we look at the TCP stream we can see a string sent by us that might be a password.
The string has two ==
signs at the end. This is an indication that the string has been encrypted using Base64.
Let's use Cyberchef to decode it.
Answer
redforever
Will more passwords be required?
We can now unzip file.zip
using the redforever
password.
$ unzip file.zip
Archive: file.zip
[file.zip] ssdog1.jpeg password:
inflating: ssdog1.jpeg
inflating: README.txt
As there are no more Zip files, we can safely say that no more password will be required.
Answer
No
What is the name of a widely-used tool that can be used to obtain file information?
The exiftool
utility can be used to obtain file information such as the metadata.
Answer
Exiftool
What is the name and value of the interesting information obtained from the image file metadata?
Let's look at the file metadata using the exiftool
utility as mentioned previously.
$ exiftool ssdog1.jpeg
ExifTool Version Number : 12.42
File Name : ssdog1.jpeg
Directory : .
File Size : 84 kB
File Modification Date/Time : 2021:09:26 16:07:52-04:00
File Access Date/Time : 2021:09:26 16:07:57-04:00
File Inode Change Date/Time : 2023:09:17 11:04:50-04:00
File Permissions : -rw-rw-r--
File Type : JPEG
File Type Extension : jpg
MIME Type : image/jpeg
JFIF Version : 1.01
Resolution Unit : None
X Resolution : 1
Y Resolution : 1
XMP Toolkit : Image::ExifTool 11.88
Technique : Steganography
Technique Command : steghide
Image Width : 1080
Image Height : 1018
Encoding Process : Baseline DCT, Huffman coding
Bits Per Sample : 8
Color Components : 3
Y Cb Cr Sub Sampling : YCbCr4:4:4 (1 1)
Image Size : 1080x1018
Megapixels : 1.1
All the information is pretty standard for an image except for the Technique : Steganography
field. Steganography is used to hide information in other information most notably images.
Answer
Technique : Steganography
Based on the answer from the previous question, what tool needs to be used to retrieve the information hidden in the file?
The steghide
tool needs to be used retrieve the hidden information.
Technique : Steganography
Technique Command : steghide
Answer
StegHide
Enter the ID retrieved.
Let's use the steghide
utility to retrieve the ID.
$ steghide extract -sf ssdog1.jpeg
Enter passphrase:
wrote extracted data to "idInsider.txt".
The sf
flag is used to specify the name of the stego file.
$ cat idInsider.txt
0726ba878ea47de571777a
Answer
0726ba878ea47de571777a
What is the profile name of the attacker?
Let's look at our own user profile.
If we look at the user profile, we can see that the user IDs are included in the URI.
https://blueteamlabs.online/home/user/26e1135472d925e971ea68
What if we replace this ID with the one we retrieved: 0726ba878ea47de571777a
.
We have our attacker.
Answer
bluetiger