Confidential [forensics]

Confidential

Sherlock was able to intercept the transmission of secret data passed between Moriarty's agents. Examine the traffic and try to find confidential information.

Recon

PCAP seems to contain some FTP traffic, which retrieves a few files:

$ tshark -r captured.pcap | grep RETR
   99  15.198669 192.168.1.146 → 192.168.1.252 FTP 82 Request: RETR 4a56sd4a7s6d4a9sd.png
  721  18.027876 192.168.1.146 → 192.168.1.252 FTP 87 Request: RETR 4a7s6d4a9sd64as4d69asd.jpg
  810  21.083331 192.168.1.146 → 192.168.1.252 FTP 83 Request: RETR 56d5a86sd58a97s5da.png
 1071  23.094712 192.168.1.146 → 192.168.1.252 FTP 84 Request: RETR 7f47a6df8sadf4a8d4f.jpg
 1112  24.923426 192.168.1.146 → 192.168.1.252 FTP 82 Request: RETR a78d5f87a5897as5d.jpg
 1703  26.581193 192.168.1.146 → 192.168.1.252 FTP 68 Request: RETR mi6.mp4
17410  33.014122 192.168.1.146 → 192.168.1.252 FTP 74 Request: RETR database.kdbx

FTP traffic contains a Keepass database: database.kdbx that we can export from the pcap.

Bruteforce

Bruteforce the Keepass database with JTR + rockyou.txt;

$ keepass2john database.kdbx > crackme
$ ./john --wordlist=/home/dsc/hax/rockyou.txt crackme
$ ./john --show crackme
crackme:blowme!
1 password hash cracked, 0 left

Open Keepass database, use password blowme! and inspect the password of a person named "Andrea" to view the flag.

Flag

FLAG{bru73_p455w0rd_4ll_n16h7_l0n6}