Introduction
The “Security Unveiled” challenge in the Yukthi CTF 2024 Finals offered an immersive experience, focusing on advanced digital forensics, credential recovery, and exploiting vulnerabilities. Participants engaged with real-world cybersecurity issues, gaining hands-on experience with critical skills required to secure privileged access in a simulated IT setting. Aspiring IT students can apply these techniques to their studies in Selfmade Ninja Lab’s cloud lab training, enhancing their practical cybersecurity knowledge
What You Will Learn
This challenge provided an in-depth look into various aspects of cybersecurity and digital forensics:
- Disk image analysis and data recovery techniques.
- Deciphering encrypted data to extract credentials.
- Conducting network scans to identify service entry points.
- Web application security testing to exploit vulnerabilities.
- Real-world application of cybersecurity concepts in a CTF context.
Challenge 1: Credential Hunt
Story
Accepted into Bout Tech, an IT company devoid of a conventional hierarchical structure, the task at hand was to recover the previous maintainer’s work credentials from a raw image file left behind. This initial step was crucial for accessing the maintainer dashboard, pivotal for my new role.
Challenge Flow
-
Disk Image Analysis: Starting with
sdb1.img
, the challenge involved mounting the image and exploring its contents.sudo mkdir /mnt/image_mount sudo losetup -fP --show ./sdb1.img sudo mount /dev/loop0p1 /mnt/image_mount cd /mnt/image_mount ls -l
-
Decrypting Data:
Encountering
data.json.enc
, a file encrypted with OpenSSL, and discovering the.Trash
directory, which led to the crucial find ofreport.docx
. After converting the DOCX to a zip and extracting,bout.jpg
was found.-
Finding report.docx:
-
Extracting bout.jpg: Using steghide, a decryption key was retrieved from
bout.jpg
.mv report.docx report.zip unzip report.zip steghide extract -sf bout.jpg
-
-
Credential Recovery: With the decryption key, the
data.json.enc
file was decrypted to reveal the username and password.openssl enc -aes-256-cbc -d -in data.json.enc -out data_decrypted.json -pass pass:jhdfe98hh
Credentials found:
{ "username":"clat", "location":"us", "pass":"clat@098" }
-
Accessing the Dashboard: After conducting a network scan, port 80 was found to be open. The recovered credentials allowed dashboard access, revealing the first flag.
- Network Scan:
-
Dashboard Access:
After I logged in with the above credentials, I got my first flag in the dashboard section.
Challenge 2: Security Breach
Story
After getting into the system, I discovered I needed admin access to do my job. The website had two login methods: one with a username and password and another with a token sent to your email.
Challenge Flow
-
Exploring Login Methods:
The token-based login caught my interest, especially since I didn’t have the admin privileges required for deeper access.
-
Finding an Admin User:
I found an admin email, wilson@bout.com, which seemed like a lead to gaining admin access.
-
Token System Exploit: I noticed a flaw in the token system that allowed requesting a token for both my account and the admin’s with a single submission:
wilson@bout.com&clat@bout.com
-
Receiving the Admin Token: The exploit worked, and I received an email with the admin token.
-
Admin Access Achieved:
Armed with the admin token, I proceeded to log into the admin area of the website. This crucial step allowed me to navigate the secured sections and ultimately, locate the second flag. Successfully gaining admin access not only demonstrated the vulnerability within the token system but also underscored the importance of rigorous security practices in web applications.
Conclusion
The “Security Unveiled” challenge in Yukthi CTF 2024 Finals highlighted key cybersecurity strategies and vulnerabilities, offering an ideal scenario for students and professionals alike. Through Selfmade Ninja Lab’s cloud lab training, aspiring IT students can develop these critical skills, preparing them for real-world cybersecurity challenges. This CTF provided valuable insights into digital forensics, credential recovery, and web application security—skills crucial for maintaining robust, secure systems in today’s digital landscape.