Web
Description
by Eth007
We recovered this file from the disk of a potential threat actor. Can you find out what they were up to?
Attachments: web.zip
Solution
Using dumpzilla explore the profile I stumbled something interesting.
└─$ py dumpzilla.py ./.mozilla/firefox/8ubdbl3q.default/ --History
Execution time: 2023-07-23 19:35:42.503972
Mozilla Profile: ./.mozilla/firefox/8ubdbl3q.default/
...
Last visit: 2023-07-10 02:53:53
Title: PALMS Backchannel Chat | The new alternative to Todaysmeet
URL: https://yoteachapp.com/supersecrethackerhideout
Frequency: 2
...
After viting URL and enter username we are redirected to https://yoteachapp.com/password/64ab39b5b13dfb00148ea72f and we are asked for password.
After going through the files we find logins.json
{
"nextId": 2,
"logins": [
{
"id": 1,
"hostname": "https://yoteachapp.com",
"httpRealm": null,
"formSubmitURL": "https://yoteachapp.com",
"usernameField": "",
"passwordField": "",
"encryptedUsername": "MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECJs6PTFwzrMiBAiRmXcD4tn3bw==",
"encryptedPassword": "MGIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECBZPCW+NjkpUBDieso9w5lPvD85RNcErLbGTXdamyji7ZKcL9FHxjnvt1WqwcVCsOETgCWCgwCg1jJmAW/MYugOoqQ==",
"guid": "{8ee7f027-974b-48cb-b9aa-29fc5a728c39}",
"encType": 1,
"timeCreated": 1688943236140,
"timeLastUsed": 1688943236140,
"timePasswordChanged": 1688943236140,
"timesUsed": 1,
"encryptedUnknownFields": null
}
],
"potentiallyVulnerablePasswords": [],
"dismissedBreachAlertsByLoginGUID": {},
"version": 3
}
Luckily for us there's Firefox Decrypt tool.
└─$ py firefox_decrypt/firefox_decrypt.py ./.mozilla/firefox/
Website: https://yoteachapp.com
Username: ''
Password: 'UeMBYIbgPqNiSWzOVguTbccMOnLirDoEGTjgiqNrbOvwzynbyN'
Great, let's login. And we are in.
Ctrl+F to search for ictf
[*] flag found: ictf{behold_th3_forensics_g4untlet_827b3f13}
Flag: ictf{behold_th3_forensics_g4untlet_827b3f13}
Note
I found the stored username in given path, but it wasn't required.
└─$ sqlite3 ./.mozilla/firefox/8ubdbl3q.default/storage/default/https+++yoteachapp.com/ls/data.sqlite
SQLite version 3.40.1 2022-12-28 14:03:47
Enter ".help" for usage hints.
sqlite> .tables
data database
sqlite> SELECT * FROM data;
YoLoginJWT@https://yoteach-cloud.herokuapp.com/|29|1|0|0|{"JWT":false,"Profile":false}
yo/chatter|65|1|0|0|{"name":"hacker42","uuid":"c876d4f0-31bc-4a62-866a-0d8fd26e75d9"}
restore-send-field|65|1|0|0|how did they get you to be so realistic lol. you almost fooled me
Last updated