Deadface CTF 2024

Deadface CTF 2024 Writeup


Forensic challenges

Big Fish

PCAP analysis:

Netcat is downloaded after the POST request to notice.html

Password

PCAP Analysis:

Suscpicious Sender

Content of frame 13010:


Traffic Analysis

Wild Wild West

PCAP analysis

Export SMB objects - Deadface.txt


Phantom Operation

Right Time

Memory forensic:

Bad Processes

Flag = PID of the malicious process executed by the victim

1sass.exe and 945f.exe

Netcat use port 7523 after a lsass dump lunched by winupdate.exe PID 8460

System Information

The attacker obtained the victim's system information; identify the file where this information was stored.


OSINT

circle-info

A hacker group claims that they were able to identify Albert Bourla's password by looking into his background.

The flag format is flag{pet dog's name1*thesis publication year$pet dog's name2+Golden Cross of the Order of the Redeemer receipt date (MM-DD-YYYYY)}

Dog's name:

Golden Cross of the Order of the Redeemer:

“On April 5, 2022, Chairman and CEO of Pfizer Albert Bourla was honored with Greece's top civilian award for his efforts in developing a life-saving COVID-19 vaccine. Greek President Katerina Sakellaropoulou presented Dr. Bourla with the Golden Cross of the Order of the Redeemer,”

Thesis publication year:

“Bourla's doctoral thesis (1991) is titled "Effect of melatonin implants on”

Last updated