Having fun while learning about and pivoting into the world of DFIR.
by ogmini
Continuing with my writeups on my “fails” or the ones I just couldn’t figure out in the timeframe alloted. I want to talk about how I went about trying to solve the challenge and where I went wrong. This should help me in the future by highlighting weaknesses and areas for improvement. Each post will focus on just one “fail” challenge.
Title: A Shadow of the Real Thing
Description: What is the hashed password for the user “chick”?
This challenge was under the Windows 11 section and worth 25 points making it around a medium difficulty.
The Kali Linux WSL and vhdx file! This one really stung as I had specifically noticed and called out the existence of this in my pre-analysis and hadn’t yet used that knowledge in solving any of the challenges. This will actually be a recurring theme for later “fails” and AARs. Noticing and making note of “interesting” artifacts but not actually connecting the dots or using them.
Linux often utilizes a shadow file for authentication. This file contains usernames, an encrypted/hashed password among other pieces of information. It was as simple as grabbing the shadow file and opening it up as they only asked for the hash.
https://www.man7.org/linux/man-pages/man5/shadow.5.html