Posts TMUCTF 2021 - Symphony of Loss [Forensic]
Post
Cancel

TMUCTF 2021 - Symphony of Loss [Forensic]

Symphony of Loss was one of the forensics challenges in TMU CTF 2021 that only got 3 solves.

The challenge description reads:

1
2
3
After monitoring our company's network, we found some suspicious traffic. 
It seems that some secret data was being transmitted through the network.
Can you inspect the dump of our network traffic and find the secret data?

We are given a pcap file (traffic.pcapng).

PCAP Analysis

It is a very large trace with 29052 packets. After a quick analysys we were able to find the following interesting data:

1
2
3
4
5
6
7
Several HTTP GET requests to elizabethstreetpost.com :

GET/?s=pass+is+not_here
GET/?s=don't+look+any+further,+you+are+wasting+your+time
GET/?s=what+did+i+tell+you????
GET/?s=tmuctf
GET/?s=tmuctf{NOTSOEASYOK???}

A request to http://169.254.248.88/oasjnrfou32r01230.zip that downloads a zip file.

A request to http://www.suzeorman.com/search/results?search=passwd+is+ZmHfPi8643012OrDn4n0

We extracted the .zip file from the pcap. Seeing it is password protected we tried to use the password found in the request to suzeorman.com (ZmHfPi8643012OrDn4n0)

Yay! It works.

ZIP/MP3 Analysis

The .zip contains a mp3 file named Ennio Morricone - Tema D'amore.mp3.

Looking at the metadata (with exiftools) of the mp3 we found there is a thumbnail image embeded in the exif data.

With foremost we were able to extract the album cover as a jpg.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
$ foremost Ennio\ Morricone\ -\ Tema\ D\'amore.mp3 -v

Invocation: foremost Ennio Morricone - Tema D'amore.mp3 -v
Processing: Ennio Morricone - Tema D'amore.mp3

------------------------------------------------------------------
File: Ennio Morricone - Tema D'amore.mp3
Length: 6 MB (7048737 bytes)

Num      Name (bs=512)         Size      File Offset     Comment

0:      00000000.jpg         125 KB             204

1 FILES EXTRACTED

jpg:= 1
------------------------------------------------------------------

cover

There doesn’t seem to be anything useful in the jpg for now, so we moved on to analyze the mp3 further.

Inspecting the mp3 file in Audacity we can clearly see there is something weird going on with one of the tracks:

waveform

Looking at the spectrogram of the weird part we are able to find what seems like a fake flag:

spectrogram

TMUCTF{1Mp0rTAnt_bUt_n0T_FLaG}

Looking for a place where this text could be useful, we thought of the extracted jpg.

The most common tool for hidding text inside jpg with a passphrase is steghide so we run the tool as follows:

1
2
3
4
5
6
7
$ steghide extract -sf cover.jpg
Enter passphrase: TMUCTF{1Mp0rTAnt_bUt_n0T_FLaG}
wrote extracted data to "flg.txt".


$ cat flg.txt
TMUCTF{7h3r3_4r3_50_M4ny_7h1n65_H1dd3n_D33p_1n51d3}

Giving us the final flag :)

TMUCTF{7h3r3_4r3_50_M4ny_7h1n65_H1dd3n_D33p_1n51d3}

This post is licensed under CC BY 4.0 by the author.
Contents