Drive Discovery
Description
SIV Pipeline Forensics Group 1
Solution
└─$ cat DriveDiscoveryDescriptionPUBLIC.txt
We took an image of a suspicious USB drive - can you investigate it in more detail?
We think the user may have tried to cover their tracks.
└─$ file nothinginterestinghere.001
nothinginterestinghere.001: DOS/MBR boot sector MS-MBR Windows 7 english at offset 0x163 "Invalid partition table" at offset 0x17b "Error loading operating system" at offset 0x19a "Missing operating system"; partition 1 : ID=0xee, start-CHS (0x0,0,2), end-CHS (0x0,254,63), startsector 1, 4294967295 sectors
Mount the device and inspect contents
└─$ sudo kpartx -av nothinginterestinghere.001
add map loop0p1 (254:0): 0 16384 linear 7:0 128
└─$ sudo mount /dev/mapper/loop0p1 /mnt/tmpmount
The disk contains an unclean file system (0, 0).
Metadata kept in Windows cache, refused to mount.
Falling back to read-only mount because the NTFS partition is in an
unsafe state. Please resume and shutdown Windows fully (no hibernation
or fast restarting.)
Could not mount read-write, trying read-only
└─$ lta
drwxrwxrwx - root 5 May 10:27 .
drwxrwxrwx - root 5 May 10:20 ├── $RECYCLE.BIN
drwxrwxrwx - root 5 May 10:20 │ └── S-1-5-21-639041105-3361198938-2770361221-1000
.rwxrwxrwx 129 root 5 May 10:20 │ └── desktop.ini
drwxrwxrwx - root 5 May 10:24 ├── Pictures
.rwxrwxrwx@ 28k root 5 May 10:23 │ ├── image1.jpg
.rwxrwxrwx@ 37k root 5 May 10:23 │ ├── image2.png
.rwxrwxrwx@ 63k root 5 May 10:24 │ └── image3.png
drwxrwxrwx - root 5 May 10:21 ├── Recipes
.rwxrwxrwx 1.1k root 5 May 10:21 │ ├── 'Chickpea & Spinach Stir-Fry over Quinoa'
.rwxrwxrwx 853 root 5 May 10:21 │ ├── 'Greek-Style Chicken & Avocado Wraps'
.rwxrwxrwx 934 root 5 May 10:21 │ └── 'Sheet-Pan Salmon & Veggies in Foil'
drwxrwxrwx - root 5 May 10:28 ├── Secrets
.rwxrwxrwx 187 root 5 May 10:26 │ └── 'note to self.txt'
drwxrwxrwx - root 5 May 10:21 └── 'System Volume Information'
.rwxrwxrwx 12 root 5 May 10:21 └── WPSettings.dat
Hmmm
└─$ cat Secrets/note\ to\ self.txt
NOTES:
1. Make sure to delete flag.txt before giving this USB drive to anyone.
2. Apparently there's a really secure type of encryption called Base64, I should look into using that.
Use strings
└─$ strings nothinginterestinghere.001 | grep NOTES -A5
NOTES:
1. Make sure to delete flag.txt before giving this USB drive to anyone.
2. Apparently there's a really secure type of encryption called Base64, I should look into using that.
FILE0
U1ZCUkd7ZDNsMzczZF9uMDdfZjByNjA3NzNuXzI4MzAyOTM4Mn0=
FILE0
Decode
└─$ echo 'U1ZCUkd7ZDNsMzczZF9uMDdfZjByNjA3NzNuXzI4MzAyOTM4Mn0=' | base64 -d
SVBRG{d3l373d_n07_f0r60773n_283029382}
Flag: SVBRG{d3l373d_n07_f0r60773n_283029382}
Cleanup
# 1. Unmount the mount point
└─$ sudo umount /mnt/tmpmount
# 2. Delete the device mappings created by kpartx
└─$ sudo kpartx -dv nothinginterestinghere.001
del devmap : loop0p1
loop deleted : /dev/loop0
# 3. (Optional) Detach the loop device if it's still mapped
sudo losetup -D
Last updated