Stolen Mount

Challenge 26: An intruder has infiltrated our network and targeted the NFS server where the backup files are stored. A classified secret was accessed and stolen. The only trace left behind is a packet capture (PCAP) file recorded during the incident. Your mission, should you accept it, is to discover the contents of the stolen data.


Solution

  1. Start the machine and open the the pcapng file in Wireshark for analysis.

  2. A password hash is mentioned, we crack the password using crackstation easily.
    Pasted image 20250318173306.png

  3. We are already provided with NFS communication. After Analyzing a bit, it is observed that hidden_stash.zip file is transferred being transferred.
    Pasted image 20250318172426.png

  4. Since its a zip file, we know it starts with PK (Magic bytes)

  5. Copy the content of packet which starts with in raw format.
    Pasted image 20250318172749.png

  6. We need to convert the raw hex data to binary and then extract the zip.

    import binascii
    
    # Read the hex dump from a file (or use a string directly)
    hex_data = """<Add the Raw data here>"""
    
    bin_data = binascii.unhexlify(hex_data.replace("\n", ""))
    
    with open("extracted.zip", "wb") as f:
        f.write(bin_data)
    
    print("ZIP file created. use unzip with password to extract its content")
    
  7. Extract the content and view the image, it is a QR code. Resolve the QR code using mobile phone. That is the answer.