Skip to content

The Return of the Yeti

I had the Advent of Cyber '23 on my calendar for Dec 1, and I wasn't sure what I was in for, this would be my first AOC, so, while I had some free time I logged the day before only to see there's another room released on my dashboard

imsorryimlazy

ooh a Side Quest, I wonder if I can do something there while I wait for the main event

QR code social media, finding the room

So in the try hack me Advent of Cyber '23 Side Quest room it says the first of four challenges will be a hidden room that you can get access to via QR code parts hidden in there social pages between Tuesday, 28th November and Thursday, 30th November, hey! today is the 30th, so I can go looking for them ahead of time and be prepared.

imsorryimlazy

so lets get looking

first I try there linked-in, scroll to find what was posted on the dates provided in the clue (between Tuesday, 28th November and Thursday, 30th November)

imsorryimlazy

huh 🥚👀 lets see what that link gets us

imsorryimlazy

ahh, so its a bisected qr-code, I thought it would be multiple QR codes with data in them that you had to read, but this is interesting because if theres only one QR code maybe I can use the parts of it to figure out the rest, but first I should find what else is available

well thay gave us a list, so lets follow it in order.

There discord is up next, im already there so lets see whats up

imsorryimlazy

a text channel made just for this room, lets see, pinned mesages

imsorryimlazy

ooh nice, now there's only one more part relaced, socal media on the list no 3

Instagram, oh well time to make a fake account so I can access the posts

![note] instagram is being horrid, and while writeing this I wasnt able to get a screenshot never the less:

ah ha here it is imsorryimlazy

hmm ok so I have most of the qrcode, but not that top left section,

lets see what each part dose and see if we can still get the data

repairing the qr code early

So, what is a qr code made of ?

a quick google brought me here: https://www.maketecheasier.com/how-qr-codes-work/

imsorryimlazy

mmhm mhmm, lots of reading, probably important,

looks like im missing one of those positioning markers, the timeing data, format info, and "content" cool

what is that though?

imsorryimlazy

ok so, im missing error correction information and maybe some data too, or atleast part of it will be missing

lest smooch what I have already together, and add in a marker and some timing pattens

imsorryimlazy

k then, I cant decode that from my phone, there might be a tool to recover it maybe?

google led me to this site https://merri.cx/qrazybox/ a qr code Analysis and Recovery Toolkit, noice

what happens when I upload my art project to it?

imsorryimlazy

detected nice, OOH tools, I like those

imsorryimlazy

yes yes yes give me the data

imsorryimlazy

wooo I did it yayyy

imsorryimlazy

aww 302, redirect, shucks, wrong link. or at least its not entirely garbage, just something isnt right

Lets sanity check first, is the room even there?

imsorryimlazy

dms :

imsorryimlazy

later in the main chat

imsorryimlazy

alright then, lets see whats wrong with my qrcode

lets look at that tool list and try something else, data sequence analysis, sounds good, I know some of the data is corrupt because it was split in 4 parts and I don't think an open bracket can be part of a URL

imsorryimlazy

aah yeah, that message data is being read wrong because the missing data was just replaced with white or 0 values

well the edit tool lets us paint each bit as either black 1, white 0, or Gray ?

lets pain the missing bits and try to get the data again

imsorryimlazy

yep missing data, lets see what we can use to help us, back in that tools section there was something called Reed-Soloman Decoder, used for "errors and erasures correction"

now that sounds like a wikipedia rabbithole waiting to happen so ima ignore that and just press buttons and see what happens :3

imsorryimlazy

well thats good, theres some reed-soloman blocks detected, lets try it

imsorryimlazy

HA, pure skill, biggest brain ez no luck needed

Into the room

and I'm the first person in the room 0w0

![note] hi I'm currently writing this post bursting though this room, and didn't actually take any screen shots, but here's a time line from the room showing the 4 people to get into the room before the final part of the QR code is released imsorryimlazy I got in at about 14:44 on the 30th, but I wasn't alone for long

I have to make use of this head start and get onto the tasks

OK SO DONT PANIC, YOU MIGHT BE ABLE TO FINISH THIS ROOM BEFORE ANYONE ELSE

what do we have (clue vision active)

imsorryimlazy

and the questions

imsorryimlazy

ooh a packet dump from a wifi connection, wireshark time :3

Wireshark

imsorryimlazy

well thats question 1 done :3

imsorryimlazy

"What's the password to access the WiFi network?"

well we have alot of data here, and first thing I always do in Wireshark is get a higher level view of what's going on with its statistics tools, first thing first, what kind of data do we have, lets look at the protocol hierarchy

imsorryimlazy

imsorryimlazy

ok lots of wifi stuff, lots of data, but most interestingly a little slither of 802.1x authentication stuff, lets filter for that useing the right click menus

imsorryimlazy

imsorryimlazy

ooh nice, 2 4-way-handshake authentications, and its wep/wp2 ?

4-way Handshake

google time and today we get : https://securitytutorials.co.uk/how-to-capture-crack-wpa-wpa2-wireless-passwords/

nice. so we can use aircrack-ng to crack this, if I save it as a pcap format, and this is a ctf so its probably in the rockyou.txt wordlist

aircrack-ng Downloads/van.pcap -w /usr/share/wordlists/rockyou.txt

imsorryimlazy imsorryimlazy

imsorryimlazy

heh nice, so lets put that into Wireshark to decrypt the traffic and go back to the protocol hierarchy to see what we have now

imsorryimlazy

ok so some TCP data, alot is TLS encrypted, some is RDP, and some is just unencrypted data.

lets look at this another way, now we have decrypted the 802.1x data, we should see addresses, so lets go to another one of the fue tools in Wireshark I know, the Conversations view

imsorryimlazy

ok 3 devices, 8.8.8.8 is just googles dns so we can ignore that, whats going on in TCP land? and lets sort by packets so we see whats most chatty

imsorryimlazy

ok so; lots of small packet examples that only last a tiny amount of time, from the same device, across alot of ports, so thats a packet scanner

but the other two very chatty ports are 3389 and 4444 3389 is RDP so we were kind of expecting that, but whats 4444?

cant find anything on google, lets look at the traffic

imsorryimlazy

imsorryimlazy

oh hello is that the word power shell I see !

lets follow the TCP stream

imsorryimlazy

imsorryimlazy

oh someone has been very naughty this year

imsorryimlazy

but thay did leave me a gift

imsorryimlazy

RDP Certificate

looks to be the local Remote Desktop certificate in base64 so lets reverse that with a tool provided to us by GCHQ! everyone's favourite CyberChef!

imsorryimlazy

and hey presto, we get a certificate! and its got a password... less nice,

I tried Christmas the wifi password, I tried BFC123, the password in the introtext, but no luck

its at this point dear reader, that I realise someone else has joined the room and has answered all the questions I have, spooked, I want to get that first place!

so I try cracking that certificate to try and read the RDP data and see what it could hold a bit of googling tells me that you can use john the ripper to crack a pkcs12

so off I go crackin again, this is just a ctf so it should be relatively easy, just throw rockyou.txt at it, right?

well after a long LONG time (1h)

imsorryimlazy

GAAAH, I waited on all of rockyou and an hour of john brute-forceing just to get the word I already filled in for question 3

fine, we have the certificate, lets see what we get when we now decrypt the RDP traffic

RDP Clipbord

google powers fire up again i found this from unit42-palo altone tworks

so lets get the key, then add it into wireshark

imsorryimlazy

great, more layers of readable data, so lets look at the updated protocol hierarchy to see what we can read

imsorryimlazy

ooh clipbord plaintext :3 lets sort this by length to try and find big chunks of text

imsorryimlazy

ooh

anks for looking into this 
Having Frost-eau in the case is for sure great!
ps I'll copy the weird file I found and send
 it to you through a more secure channel
 Regards
 Elf McSkidy

so something is getting sent and we can try to figure out whats happening though the clipbord text

ill go though all of the 53 packets and try and pull out all the text in timeline order

https://mail.google.com/mail/u/0/?tab=rm&ogbl#inbox

1337-0

hanks for looking into this 
Having Frost-eau in the case is for sure great!
ps I'll copy the weird file I found and send
 it to you through a more secure channel
 Regards
 Elf McSkidy

yetikey1.txt

dpxSet-Clipboard -value (Get-Content \Desktop\secret.txt.txt)

1-1f9548f
[REDACTED - you will have to do the room yourself to get this one]
154ef2834

well that looks like the rest of our questions anscered

imsorryimlazy