Skip to content

Instantly share code, notes, and snippets.

@grutz
Last active Dec 20, 2015
Embed
What would you like to do?
CMIYC 2013: Challenge 9 Info
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ tar -xvf Challenge9_street.tar.xz
drwxr-sr-x root/root 0 2013-08-01 20:12 Challenge9_street/
-rw-r--r-- root/root 329 2013-08-01 20:12 Challenge9_street/README
-rw-r--r-- root/root 67108864 2013-08-01 20:12 Challenge9_street/efs.dd
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ cd Challenge9_street
grutz@beelzebubba:Challenge9_street$ cat README
The filesystem in this .dd image has some encrypted files within it.
If you recover any of the passwords needed to decrypt the files,
submit them like any other password crack (each plaintext on a line
by itself).
If you manage to decrypt the files, they will give you some hints
about some of the plaintexts used by Company3.
grutz@beelzebubba:Challenge9_street$ fdisk -l efs.dd
Disk Challenge9_street/efs.dd: 67 MB, 67108864 bytes
2 heads, 1 sectors/track, 65536 cylinders, total 131072 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0x06d9f508
Device Boot Start End Blocks Id System
efs.dd1 128 125055 62464 7 HPFS/NTFS/exFAT
grutz@beelzebubba:Challenge9_street$ mkdir loop
grutz@beelzebubba:Challenge9_street$ sudo mount -o ro,loop,offset=65536 efs.dd loop
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment