Web

Description

by Eth007

We recovered this file from the disk of a potential threat actor. Can you find out what they were up to?

Attachments: web.ziparrow-up-right

Solution

Using dumpzillaarrow-up-right explore the profile I stumbled something interesting.

└─$ py dumpzilla.py ./.mozilla/firefox/8ubdbl3q.default/ --History

Execution time: 2023-07-23 19:35:42.503972
Mozilla Profile: ./.mozilla/firefox/8ubdbl3q.default/
...

Last visit: 2023-07-10 02:53:53
Title: PALMS Backchannel Chat | The new alternative to Todaysmeet
URL: https://yoteachapp.com/supersecrethackerhideout
Frequency: 2

...

After viting URL and enter username we are redirected to https://yoteachapp.com/password/64ab39b5b13dfb00148ea72farrow-up-right and we are asked for password.

After going through the files we find logins.json

Luckily for us there's Firefox Decryptarrow-up-right tool.

Great, let's login. And we are in.

Ctrl+F to search for ictf

circle-check

Note

I found the stored username in given path, but it wasn't required.

Last updated