Task desc

In this task, just like in the previous Operation Oni, we need to analyze disk.flag.img and find the files related to the flag there.

Autopsy

We will use Autopsy for analysis. Instructions for creating a project and uploading the file under investigation can be found in the write-up Operation Oni.

In the /root directory, we find three files that provide us with information about actions on the flag:

image_2

File analysis

let’s look at the files .ash_history, flag.txt, flag.txt.enc:

image_3

we see the openssl command that is very similar to what we have seen in Eavesdrop task:

openssl uses AES with a block length of 256 bits, adding salt to the contents of flag.txt and the key unbreakablepassword1234567.

Let’s decrypt our flag.

VM kali

Decryption

Since AES is a symmetric algorithm, like 3DES from task Eavesdrop, the decryption process is the same:

  • Export the file flag.txt.enc
  • Let’s use the command we found:
openssl aes256 -d -salt -in flag.txt.enc -out decrypted_flag.txt -k unbreakablepassword1234567

image_4

picoCTF{h4un71ng_p457_1d02081e}