min read

Wargames CTF - Compromised

Wargames CTF - Compromised Write-up

Compromised

Compromised

Given evidence.zip file with Where aRe you? hint.

Let's unzip it and see what we have.

unzip

It's looks like a lot of Windows folders and files with useless .ini and .lnk extensions. Let's try to find something interesting.

interesting

Looks like I found a flag.png file. Let's try to open it.

flag

Hmm, it's seems like a corrupted file. Or... maybe not? Let's check it with terminal.

flag

Ahaa, it's a zip file. Let's unzip it.

flag

It's a flag.txt file, But it's password protected.

Instead of brute force it, I decided to check all the folders to find more files.

flag flag

I found a files with .rdp extension. It's a Remote Desktop Connection file. That's mean It previously had a connection to another computer.

In Terminal Server Client folder I found a file with .bin extension and .bmc extension. I tried to google about it and find and article to a Medium post about it.

Medium Post

It says that .bin file is a memory dump file and .bmc is a memory map file.

I use terminal to check the .bin file.

flag

It has the same header as the Medium post. That's RDP8bmp format. Let's try to convert it to a image.

I use the same tools as the Medium post.

flag

It's hard to see, with a lot of scattered images. So I found another workaround to combine it all together.

flag flag

It's looks like a screenshot of a Windows desktop. Let's try to find something interesting.

flag

Ahaa, a zip password, let's try to unzip the flag.txt file and get the flag.

flag