Post

L3AK CTF Forensics

Challenge : AiR

Categorie : Forensics

AIr.JPG

We were provided with a Disk image, and we need to find the wifi Password.

If you are familiar with Windows and wireless network, or with quick search ,this path should be interesting С:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\[**Interface** Guid]

Going there we can get the {E22F466D-15CE-438C-9245-B25EB9E980E5}.xml file where the Wifi SSID name and Password are stored. Searching for how to decrypt the password leeds to a bunch of tools, most of them are useless in our case as they don’t support external profiles. Only with “WirelessKeyView” we could import an external profile,but unfortunately the decrypted password was incomplete, for some reason. Keep looking we found this tool https://www.nirsoft.net/utils/dpapi_data_decryptor.html

Where we can Decrypt DPAPI data from external drive and a specified string which is the keyMaterial hex string from the XML file. And we got the flag.

Flag : L3AK{BL0b_D3crypt1n9_1s_n0_n3w_t0_u_r1ght?}

This post is licensed under CC BY 4.0 by the author.