Rating:

Players will download the disk image and analyse it with some forensics tool, e.g. `FTKImager` or `Autopsy`. I like [FTKImager](https://www.exterro.com/digital-forensics-software/ftk-imager) for file recovery but [Autopsy](https://www.autopsy.com/download) has some extra features to pull out interesting files, patterns, indicators etc.

![Image](https://github.com/Crypto-Cat/CTF/raw/main/ctf_events/2024/intigriti_24/forensics/password_management/images/0.PNG)

Players will find 13 images that were deleted (and recycle bin emptied), but this doesn't erase them fully!

![Image](https://github.com/Crypto-Cat/CTF/raw/main/ctf_events/2024/intigriti_24/forensics/password_management/images/1.PNG)

So, let's extract them.

![Image](https://github.com/Crypto-Cat/CTF/raw/main/ctf_events/2024/intigriti_24/forensics/password_management/images/2.PNG)

12 of the images are AI generated, the last one is a photograph of a password: `SevenSuns397260`

![Image](https://github.com/Crypto-Cat/CTF/raw/main/ctf_events/2024/intigriti_24/forensics/password_management/images/3.jpg)

Players can find reference of interesting website visit `https://super-really-real-bank.com` in the web data.

![Image](https://github.com/Crypto-Cat/CTF/raw/main/ctf_events/2024/intigriti_24/forensics/password_management/images/4.PNG)

A bit of a hint that players should focus on browser history but it is encrypted!

```json
{
"nextId": 2,
"logins": [
{
"id": 1,
"hostname": "https://super-really-real-bank.com",
"httpRealm": null,
"formSubmitURL": "",
"usernameField": "",
"passwordField": "",
"encryptedUsername": "MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECPe0E72Bq278BAiGUkKH0HzoSg==",
"encryptedPassword": "MFoEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECNF/qseckS4/BDBYcrwEBJ5T2lxluEtiFPFfypt58TEfdDyZBaUN/7HFp4I02jsv/XKzazHG/NOHFNk=",
"guid": "{c3899385-98e9-4900-b9de-1fabf67ed153}",
"encType": 1,
"timeCreated": 1728583953428,
"timeLastUsed": 1728583953428,
"timePasswordChanged": 1728583953428,
"timesUsed": 1,
"syncCounter": 1,
"everSynced": false,
"encryptedUnknownFields": "MDIEEPgAAAAAAAAAAAAAAAAAAAEwFAYIKoZIhvcNAwcECN2bf71w2iK/BAiWVos1I88Zqw=="
}
],
"potentiallyVulnerablePasswords": [],
"dismissedBreachAlertsByLoginGUID": {},
"version": 3
}
```

Let's extract the Firefox browser data! It's Windows, so the profiles will be stored at `C:\Users\cat\AppData\Roaming\Mozilla\Firefox\Profiles\`

We can use a tool like [firefox decrypt](https://github.com/unode/firefox_decrypt) to get some juicy passwords, cookies etc (providing we have the master password).

Players use the password they found earlier to unlock the data (`SevenSuns397260`), then in the cookies/saved passwords will be the flag.

```bash
python firefox_decrypt.py /home/crystal/Desktop/pass_management/profile/

Master Password for profile /home/crystal/Desktop/pass_management/profile/:

Website: https://super-really-real-bank.com
Username: 'cat'
Password: 'INTIGRITI{4n_unf0r7un473_53r135_0f_m1574k35}'
```

Flag: `INTIGRITI{4n_unf0r7un473_53r135_0f_m1574k35}`

Original writeup (https://crypto-cat.gitbook.io/ctf-writeups/2024/intigriti/forensics/password_management).