Post

TryHackMe - Block

TryHackMe - Block

In this challenge, we have been given on zip file named evidence.zip. We have to extract it and look into the files to answer the questions. This challenge was more of a blue team kind of challenge imo. Let’s start the challenge.

After unzipping the zip file we get two files: lsass.DMP and traffic.pcapng.

What is the username of the first person who accessed our server?

We will use tool called pypykatz to analyze lsass.DMP file. Rune the following command to get minidump from our dmp file:

1
$ pypykatz lsa minidump lsass.DMP

Username 1

Analyse the output to get username as mrealman

What is the password of the user in question 1?

In the same output, we can get user’s NTHash: 1f9175a516211660c7a8143b0f36ab44 We can use crackstation to crack the hash and get password: Blockbuster1

We will skip question 3 for now.

What is the username of the second person who accessed our server?

After scrolling a bit in the same output, we can get our second user as answer: eshellstrop

Username 2

What is the hash of the user in question 4?

We can get NT hash for the user the from the same output. I tried to crack this hash from crackstation but was not able to do it, but we only require hash as our answer: 3f29138a04aadc19214e9c04028bf381

What is the flag that the first user got access to?

Back to question 3, it was tricky to find the answer for this. I load traffic.pcapng file in wireshark and found NTLMSSP authentication being used. So we have to decrypt the data to get results. After some research, I found this blog to move forward: Blog.

According to this blog we have to add our password in Edit -> Preferences -> Protocols -> NTLMSSP -> NT Password in wireshark. After this I found file named clients156.csv: CSV File 1

Now, we will export this file from File -> Export Objects -> SMB. Look into the exported file to get the flag:

Flag 1

What is the flag that the second user got access to?

For this flag, we do not have password for the second user like first user and I was not able to crack it either. I found this blog that suggests how to use NT hash to decrypt data in wireshark: Blog

According to the blog we need to create one keytab file and load it in wireshark to decrypt traffic data. First we need keytab.py and edit it to use 23(RC4) as key type for NT hash.

Keytab file

Save this file and run it to get keytab file:

1
$ python3 keytab.py keytab.kt 

Now, go to Edit -> Preferences -> KRB5 and load keytab.kt file. We can notice one more .csv file called clients978.csv. CSV File 2

Now, export this file and read it to get the flag:

Flag 2

This post is licensed under CC BY 4.0 by the author.