Post

Let's Defend: Disclose The Agent

Let's Defend: Disclose The Agent

Challenge Link: https://app.letsdefend.io/challenge/disclose-the-agent Log file: /root/Desktop/ChallengeFile/smtpchallenge.pcap

Question 1

What is the email address of Ann’s secret boyfriend?

The file for this challenge was a PCAP so I loaded it up in Wireshark. The question asks for an email address and I knew I could use Wireshark to search through packets with regex. Luckily I had an email address regex pattern handy from another project. I used the following Wireshark display filter to search for packets with email addresses.

1
frame matches "[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+"

This gave me six packets with results.

The last result shows a message sent between “Ann Dercover” using the email address sneakyg33k@aol.com and an anonymous user with the email address mistersecretx@aol.com.

The content of the message implies the two have an intimate relationship.

This is likely the secret boyfriend.

Answer:

mistersecretx@aol.com

Question 2

What is Ann’s email password?

Since I now had Ann’s IP address and knew this was specifically an email password I changed the display filter to only include this IP address and SMTP packets.

1
ip.src == 92.168.1.159 && smtp

I then discovered a result that appeared to be a Base64 encoded password:

To decode the data I right clicked the packet, and selected Protocol Preferences > Decode Base64 encoded AUTH parameters to ensure it was checked. This would decode the password for me.

Answer:

558r00lz

Question 3

What is the name of the file that Ann sent to his secret lover?

This time I used a regex to search for possible file names. This pattern basically just searches for any amount of characters then a file extension such as “.ext”. This can create false positives such as domain names so it is not perfect.

The full display filter used is below:

1
ip.src == 192.168.1.159 && frame matches "\b[\w,\s-]+\.[A-Za-z0-9]{1,5}\b"

This led me to a packet that looked a little suspicious. Upon closer inspection I found the word document Ann sent to her secret boyfriend.

Answer:

secretrendezvous.docx

Question 4

In what country will Ann meet with her secret lover?

I had hoped there was a quick way to just download the attachment found in the email but I could not find one. Instead I ended up downloading the Email file connected to the attachment instead. I did this by going to File > Export Objects > IMF.

This brought up all IMF objects found within the PCAP file which includes the .eml file I needed.

I saved this file to the same folder as the challenge file. Next I needed to open the email to get to the attachment. After researching a few different ways I discovered the easiest thing to do was to open the email in Thunderbird, then save the attachment.

I saved the file to the challenge directory, then opened it in the pre-installed LibreOffice.

The document quickly gave me my answer. It appears they are meeting in Mexico.

Answer:

Mexico

Question 5

What is the MD5 value of the attachment Ann sent?

To get the MD5 hash value I opened the directory in the terminal and ran the following command:

1
md5sum secretrendezvous.docx

Answer:

9e423e11db88f01bbff81172839e1923

This post is licensed under CC BY 4.0 by the author.