TrollCat Forensics Writeups

Forbidden

points 100

challenge description

Agent Troll recieved some file but not able to read the data can you help us?

Author: White_Wolf Forbidden (link is dead but file is attached)

solution

we are given a trollcats.car

1$file trollcats.car 
2trollcats.car: data

on further investigation

1$binwalk trollcats.car 
2
3DECIMAL       HEXADECIMAL     DESCRIPTION
4--------------------------------------------------------------------------------
550            0x32            bzip2 compressed data, block size = 900k

extracting the file

 1$binwalk -e trollcats.car 
 2
 3DECIMAL       HEXADECIMAL     DESCRIPTION
 4--------------------------------------------------------------------------------
 550            0x32            bzip2 compressed data, block size = 900k
 6
 7┌─[@parrot]─[~/Desktop/CTFs/TrollCAT/Forensics]
 8└──╼ $cd _trollcats.car.extracted/
 9┌─[skoki@parrot]─[~/Desktop/CTFs/TrollCAT/Forensics/_trollcats.car.extracted]
10└──╼ $ls
1132
12┌─[@parrot]─[~/Desktop/CTFs/TrollCAT/Forensics/_trollcats.car.extracted]
13└──╼ $cat 32 
14Trollcat{M0zilla_Archive_maaaarls}

flag : Trollcat{M0zilla_Archive_maaaarls}

the_sus_agent

points 251

challenge description

One of our agent is doing something suspicious on the network can you find out?

file Hint: If you got a string it’s useful somewhere but it’s not a flag

Author : white_wolf Mega link

solution

we are given a sus_agent.pcapng

opening the pcap in wireshark

file > export objects > http > save all

gives us a bunch of files but two are important in this case secret.jpg and welcome.jpg

secret.jpg contains a base64 string

1$cat secret.jpg 
2
3aWhvcGV5b3VkaWRub3R0cmllZHRvYnJ1dGVmb3JjZWl0

decoded to

1$cat secret.jpg | base64 -d
2ihopeyoudidnottriedtobruteforceit

which was the steghide password for welcome.jpg

1[@parrot]─[~/Desktop/CTFs/TrollCAT/sus]
2└──╼ $steghide extract -sf welcome.jpg
3Enter passphrase: 
4the file "foryou" does already exist. overwrite ? (y/n) y
5wrote extracted data to "foryou".
6┌─[@parrot]─[~/Desktop/CTFs/TrollCAT/sus]
7└──╼ $cat foryou 
8Trollcat{this_challenge_was_easy_right???}

flag : Trollcat{this_challenge_was_easy_right???}

s3cr3t

points 495

challenge description

After getting trolled alot by Mr.Troll we finally got some files and now he’s hiding some secret with him your mission is to find that secret.

Challenge file link

Author: White_Wolf

NB://I did not solve this challenge on time

solution

we are given a file trollcat.E01 of type

1$file trollcat.E01
2trollcat.E01: EWF/Expert Witness/EnCase image file format

using binwalk and other file carving tools will not be effective in this case so i decided to mount the image

1sudo mkdir rawimage
2sudo mkdir mountpoint
3
4ewfmount file trollcat.E01 rawimage/
5
6mount rawimage/ewf1 mountpoint/ -o ro,loop,show_sys_files,streams_interface=windows

the drive is now accesible and we can navigate through it we get a topsecret.zip under favorites/drive

which contains an encrypted vhdx topsecret.vhdx the following writeup was quite useful https://stuxnet999.github.io/2021/02/06/trollcat-secret.html

Mr_evilpepo_1

points 400

We have caught Mr.EvilPepo and now it is time for you to investigate him we searched his house and we got not much proof we got some report from OSINT department and Our OSINT Investigator told us that he mentioned on his socials “Hack Me if you can, i use same password Everywhere” we have dumped his computer memory and for further investigation we need your help. he typed the flag command somewhere and now he forgot it. can you find it?

File: Challenge File

Flag Format: Trolcat{}

Author: White_wolf

solution

in this we get a memory dump file evilpepo.vmem

from the hint : he typed the flag command somewhere and now he forgot it we will use cmdscan plugin to recover the flag

 1─[@parrot]─[~/Desktop/CTFs/TrollCAT/forensics]
 2└──╼ $volatility -f evilpepo.vmem --profile=Win7SP1x64 cmdscan
 3Volatility Foundation Volatility Framework 2.6
 4**************************************************
 5CommandProcess: conhost.exe Pid: 992
 6CommandHistory: 0x39eb60 Application: cmd.exe Flags: Allocated, Reset
 7CommandCount: 37 LastAdded: 36 LastDisplayed: 36
 8FirstCommand: 0 CommandCountMax: 50
 9ProcessHandle: 0x60
10Cmd #0 @ 0x37e550: helo
11Cmd #1 @ 0x37e570: troollll
12Cmd #2 @ 0x37e590: caaat
13Cmd #3 @ 0x37e5b0: yooooo
14Cmd #4 @ 0x39de90: T
15Cmd #5 @ 0x39dcd0: r
16Cmd #6 @ 0x3a2f00: o
17Cmd #7 @ 0x3a2f20: l
18Cmd #8 @ 0x3a2f40: c
19Cmd #9 @ 0x3a2f60: a
20Cmd #10 @ 0x3a2fb0: t
21Cmd #11 @ 0x3a2fc0: {
22Cmd #12 @ 0x3a2fd0: c
23Cmd #13 @ 0x3a2fe0: o
24Cmd #14 @ 0x3a2ff0: m
25Cmd #15 @ 0x3a3000: a
26Cmd #16 @ 0x3a3010: n
27Cmd #17 @ 0x3a3020: d
28Cmd #18 @ 0x3a3030: s
29Cmd #19 @ 0x3a3040: _
30Cmd #20 @ 0x3a3050: 4
31Cmd #21 @ 0x3a3060: r
32Cmd #22 @ 0x3a3070: 3
33Cmd #23 @ 0x3a3080: _
34Cmd #24 @ 0x3a3090: i
35Cmd #25 @ 0x3a30a0: m
36Cmd #26 @ 0x3a30b0: p
37Cmd #27 @ 0x3a30c0: o
38Cmd #28 @ 0x3a30d0: r
39Cmd #29 @ 0x3a30e0: t
40Cmd #30 @ 0x3a30f0: a
41Cmd #31 @ 0x3a3100: n
42Cmd #32 @ 0x3a3110: t
43Cmd #33 @ 0x3a3120: }
44Cmd #34 @ 0x3a33b0: hope you got it 
45Cmd #35 @ 0x377860: "are you trying to run strings?"
46Cmd #36 @ 0x3a33e0: lolololololol

flag : Trolcat{commands_4r3_important}

Mr_evilpepo_2

points 496

challenge description

Now After some good beating, Mr.EvilPepo saying he hides something on the internet. find it

Note: Use the file provided in Mr.EvilPepo Part-1

AUTHOR: WHITE_WOLF

solution

same file as above for this challenge from the hint ...he hides something on the internet. find it we need to check through some browswer history

 1┌─[skoki@parrot]─[~/Desktop/CTFs/TrollCAT/forensics]
 2└──╼ $volatility -f evilpepo.vmem --profile=Win7SP1x64 pstree 
 3Volatility Foundation Volatility Framework 2.6
 4Name                                                  Pid   PPid   Thds   Hnds Time
 5-------------------------------------------------- ------ ------ ------ ------ ----
 6 0xfffffa8000ca0ae0:System                              4      0     78    506 2021-01-12 13:13:38 UTC+0000
 7. 0xfffffa8001bf6470:smss.exe                         256      4      2     29 2021-01-12 13:13:38 UTC+0000
 8 0xfffffa80028a7630:csrss.exe                         388    368     11    338 2021-01-12 13:13:53 UTC+0000
 9. 0xfffffa8000f0d060:conhost.exe                      992    388      2     51 2021-01-12 13:20:09 UTC+0000
10 0xfffffa80028f9480:winlogon.exe                      420    368      3    109 2021-01-12 13:13:53 UTC+0000
11 0xfffffa800344fb30:explorer.exe                     1568   1548     32    895 2021-01-12 13:14:47 UTC+0000
12. 0xfffffa80020de060:notepad.exe                     3120   1568      1     61 2021-01-12 13:22:27 UTC+0000
13. 0xfffffa8003428a30:cmd.exe                         1492   1568      1     19 2021-01-12 13:20:08 UTC+0000
14. 0xfffffa8003673b30:chrome.exe                      1932   1568     34    856 2021-01-12 13:15:05 UTC+0000
15.. 0xfffffa80036d6b30:chrome.exe                      912   1932      8     84 2021-01-12 13:15:12 UTC+0000
16.. 0xfffffa8000ee9b30:chrome.exe                     1292   1932     13    204 2021-01-12 13:16:11 UTC+0000
17.. 0xfffffa8000e9ab30:chrome.exe                     2324   1932     13    255 2021-01-12 13:16:05 UTC+0000
18.. 0xfffffa8000da1b30:chrome.exe                     2352   1932     20    248 2021-01-12 13:15:37 UTC+0000
19.. 0xfffffa8000e5cb30:chrome.exe                     2896   1932      8    181 2021-01-12 13:15:54 UTC+0000
20.. 0xfffffa8000d97b30:chrome.exe                     2556   1932      7    131 2021-01-12 13:15:38 UTC+0000
21. 0xfffffa8000fc0060:KeePass.exe                     3908   1568     12    324 2021-01-12 13:18:05 UTC+0000
22 0xfffffa80028ba060:csrss.exe                         328    320      8    405 2021-01-12 13:13:52 UTC+0000
23 0xfffffa80027ddb30:wininit.exe                       376    320      3     74 2021-01-12 13:13:53 UTC+0000
24. 0xfffffa8002da0b30:services.exe                     472    376     11    192 2021-01-12 13:13:59 UTC+0000
25.. 0xfffffa8003180890:svchost.exe                     268    472     19    484 2021-01-12 13:14:12 UTC+0000
26.. 0xfffffa8002fab440:svchost.exe                     668    472      8    261 2021-01-12 13:14:06 UTC+0000
27.. 0xfffffa800142db30:sppsvc.exe                     1456    472      4    142 2021-01-12 13:16:56 UTC+0000
28.. 0xfffffa8003236610:svchost.exe                    4016    472     16    344 2021-01-12 13:18:10 UTC+0000
29.. 0xfffffa80030d5b30:svchost.exe                     808    472     16    311 2021-01-12 13:14:06 UTC+0000
30... 0xfffffa8003441b30:dwm.exe                       1556    808      3     80 2021-01-12 13:14:47 UTC+0000
31.. 0xfffffa8003146b30:svchost.exe                     968    472     29    448 2021-01-12 13:14:11 UTC+0000
32.. 0xfffffa8003229570:svchost.exe                     948    472     21    332 2021-01-12 13:14:18 UTC+0000
33.. 0xfffffa80032145c0:spoolsv.exe                     832    472     13    265 2021-01-12 13:14:17 UTC+0000
34.. 0xfffffa80030d3b30:svchost.exe                     836    472     41   1162 2021-01-12 13:14:06 UTC+0000
35.. 0xfffffa8003091370:svchost.exe                     716    472     26    521 2021-01-12 13:14:06 UTC+0000
36... 0xfffffa8003116060:audiodg.exe                    916    716      6    131 2021-01-12 13:14:09 UTC+0000
37.. 0xfffffa800347b890:taskhost.exe                   1748    472      8    142 2021-01-12 13:14:48 UTC+0000
38.. 0xfffffa8002feb970:svchost.exe                     600    472     10    348 2021-01-12 13:14:05 UTC+0000
39... 0xfffffa8000ff1060:dllhost.exe                   2920    600      9    198 2021-01-12 13:19:42 UTC+0000
40... 0xfffffa8000ea3060:dllhost.exe                   1852    600      6     89 2021-01-12 13:22:36 UTC+0000
41... 0xfffffa8000dc3b30:WmiPrvSE.exe                  3400    600      7    114 2021-01-12 13:19:14 UTC+0000
42.. 0xfffffa80023e2060:svchost.exe                     784    472     25    264 2021-01-12 13:15:13 UTC+0000
43.. 0xfffffa800183f650:wmpnetwk.exe                   1640    472     11    218 2021-01-12 13:15:01 UTC+0000
44.. 0xfffffa80032173b0:SearchIndexer.                 1832    472     12    702 2021-01-12 13:15:00 UTC+0000
45... 0xfffffa8003696b30:SearchProtocol                1960   1832      8    387 2021-01-12 13:15:05 UTC+0000
46... 0xfffffa8000d9bb30:SearchFilterHo                1504   1832      6    150 2021-01-12 13:20:40 UTC+0000
47. 0xfffffa8002811b30:lsass.exe                        480    376      7    553 2021-01-12 13:13:59 UTC+0000
48. 0xfffffa80020b7b30:lsm.exe                          488    376     10    149 2021-01-12 13:13:59 UTC+0000

we can see two browsers in use explorer and chrome

volatility lacks an inbuilt plugin for firefox and chrome so we will use a third party for the same

guide and plugins

https://blog.superponible.com/2014/08/31/volatility-plugin-chrome-history/

https://github.com/superponible/volatility-plugins

1volatility --plugins=volatility-pluginss/ -f evilpepo.vmem --profile=Win7SP1x64  chromehistory
2Volatility Foundation Volatility Framework 2.6
3Index  URL
4https://defuse.ca/b/sOOqp4UunTdD0oUjidJFlz                                       Defuse Security's Encrypted Pastebin                                                  2     1 2021-01-12 08:23:00.706346        N/A       

snipped for readability

following the links gives us an encrypted pastebin which needs a password to reveal the flag …..

looking back at the pstree results we can see lsass.exe

Local Security Authority Subsystem Service (LSASS) is a process in Microsoft Windows operating systems that is responsible for enforcing the security policy on the system. It verifies users logging on to a Windows computer or server, handles password changes, and creates access tokens

for this i will use the hashdump plugin to recover NTLM hashes for all users

1┌─[✗]─[@parrot]─[~/Desktop/CTFs/TrollCAT/forensics]
2└──╼ $volatility -f evilpepo.vmem --profile=Win7SP1x64  hashdump
3Volatility Foundation Volatility Framework 2.6
4Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
5Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
6WhiteWolf:1000:aad3b435b51404eeaad3b435b51404ee:2e6a7cf5aabb33a044684dd9c97e88a7:::

user WhiteWolf since he was the author

1echo "2e6a7cf5aabb33a044684dd9c97e88a7" > hash.txt
2john --format=nt hash.txt
3hashcat -m 1000 -a 3 hash.txt

cracking the NTLM hash for user WhiteWolf reveals the password as abracadabra using the password we can now decrypt our encrypted pastebin to reveal the flag

flag : Trollcat{secret_hidden_0nn_th3_1ntern3t}

alternatively you can use mimikatz plugin

https://medium.com/@ali.bawazeeer/using-mimikatz-to-get-cleartext-password-from-offline-memory-dump-76ed09fd3330

Mr_evilpepo_3

points 498

challenge description

The Top Secret file of Mr.EvilPepo is still not discovered this is your last mission of finding the top secret file related to Mr.EvilPepo Good Luck

Note: Use the file provided in Mr.EvilPepo Part-1

AUTHOR: WHITE_WOLF

i did not solve this challenge on time,

i do recommend reading the following writeup

https://stuxnet999.github.io/2021/02/06/trollcat-mrevilpepo.html

….. Thank you for your time,hope you learnt something new :)