less than 1 minute read

Overview

  • Points: 100

Description

We recovered this file from the disk of a potential threat actor. Can you find out what they were up to?

Attached

web.zip

Analyzation

Check the login.json file

{"nextId":2,
"logins":[
    {"id":1,
    "hostname":"https://yoteachapp.com",
    "httpRealm":null,
    "formSubmitURL":"https://yoteachapp.com",
    "usernameField":"",
    "passwordField":"",
    "encryptedUsername":"MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECJs6PTFwzrMiBAiRmXcD4tn3bw==",
    "encryptedPassword":"MGIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECBZPCW+NjkpUBDieso9w5lPvD85RNcErLbGTXdamyji7ZKcL9FHxjnvt1WqwcVCsOETgCWCgwCg1jJmAW/MYugOoqQ==",
    "guid":"{8ee7f027-974b-48cb-b9aa-29fc5a728c39}",
    "encType":1,
    "timeCreated":1688943236140,
    "timeLastUsed":1688943236140,
    "timePasswordChanged":1688943236140,
    "timesUsed":1,
    "encryptedUnknownFields":null}],
"potentiallyVulnerablePasswords":[],
"dismissedBreachAlertsByLoginGUID":{},
"version":3}

We need to login to yoteachapp.com by the given encoded account.

Solution

Use firefox_decrypt.py to decrypt the account

py firefox_decrypt/firefox_decrypt.py ./.mozilla/firefox/
Website:  https://yoteachapp.com
Username: ''
Password: 'UeMBYIbgPqNiSWzOVguTbccMOnLirDoEGTjgiqNrbOvwzynbyN'

Login and find the flag.

The flag is

ictf{behold_th3_forensics_g4untlet_827b3f13}