1st March 2024 / Document No. D24.102.XX
Prepared By: sebh24
Challenge Author(s): sebh24
Difficulty: Easy
Classification: Official
Phreaky is an easy forensics challenge involving detecting SMTP exfiltration and reconstructing the exfiltrated file to retrieve the flag.
In the shadowed realm where the Phreaks hold sway, A mole lurks within leading them astray. Sending keys to the Talents, so sly and so slick, A network packet capture must reveal the trick. Through data and bytes, the sleuth seeks the sign, Decrypting messages, crossing the line. The traitor unveiled, with nowhere to hide, Betrayal confirmed, they'd no longer abide.
- Familiarity with network protocol analyzers
- Detecting SMTP exfiltration
- Analyzing the SMTP protocol
- Reconstructing files
Enter the artifacts provided along with their file hash here.
- phreaky.pcap
We are provided with a pcap and a scenario to locate the insider threat within the Phreaks. As per any packet capture we import into the Brim tool initially to locate the conversations and hosts within the packet capture.
We see a large array of traffic, particularly a large amount on port 25 (SMTP). Delving into the File Activity tab we locate numerous zip files, seemingly sent as hash values.
Selecting the Wireshark symbol, we are open to locate the specific PCAPs within Wireshark and view the TCP stream.
It seems the files themselves are files sent via emails from Caleb within the Phreaks to the resources email within The Talents. This looks like a potential insider threat to me. Interestingly they also have a password associated with the email.
We next import our PCAP into Network Miner, which extracts the email & zip files into a folder and we can import each of them into an email client.
We are able to view each email is associated with a password and the password decompresses the relevant zip file. This indicates Caleb attempted to avoid detection by sending the specific file in zipped chunks.
We now have unzipped all the zip files sent via email.
The files look to be in 15 parts, which we can join utilizing fjoiner.exe:
And the flag is located!