BSides Perth — CTF Writeup

A big thank you to ASD and ACSC for creating this fun CTF. Below is a summary of the challenges I have solved and a short writeup for each. Enjoy 😊

OT

  1. 1.0 — OT Challenge Start

    Soooooo — our powerstation has "sploded. We think it was because we spent last year's maintenance budget on a really bitchin' end-of-year party — but just to be sure we'd like someone to investigate. Fortunately one of our drones from Sector 7-G was running a packet capture on a "Kali" box (whatever that is) when the 'splosion happened. Can you have a squiz at the attached packet capture and just make sure it was our underfunded maintenance budget that was at fault, and not our non-existent security budget that's to blame. kthxbai!!

    Question: What is the MD5 of the unzipped file?
    Example response: 1b000000000000000000000000000000
    Answer: 1b249a0deb35a7f9f65ddd111594c6de

  2. 1.1 — Understanding the network 1

    Question: What is the IP of the powerstation PLC?
    Example response: 9.87.654.321
    Answer: 123.123.123.123

  3. 1.3 — Understanding the comms

    Question: What is the IP of the remote, completely non-suss, nothing-to-see-here connection?
    Example response: 234.456.78.9
    Answer: 159.100.6.69

  4. 1.5 — Understanding the System

    Question: What is the OT protocol used by the PLC?
    Example response: Ping
    Answer: Modbus

  5. How it was solved

    This was a quick google search, of that kinf of protocols that is used by Operational Technology, what stood out to me when I searched for modbus as a filter on Wireshark in my Kali was a packet called Read Device Identification which helped me solve the next few challenges.


    Kali Screenshot

    This screenshot was used to solve 1.7 and 1.6

  6. 1.7 — Recon 3

    Question: What is the Function code (int) the attacker used to get this information?
    Example response: 1
    Answer: 43

  7. 1.6 — Recon 2

    Question: What is the model name of the targeted PLC?
    Example response: DodgyPLC
    Answer: SimaticPCS7

Networking

  1. 2.0 — Switch Challenge Start

    While you're at it — we've received an email telling us that there is some unrelated malicious activity on our switches, and possibly our DC. We've gathered up some artifacts and put them in a zip for you. I'm sure this activity will be fine...

    Question: What is the MD5 of the artifacts.zip file?
    Example response: 61D6000000000000000000000000000
    Answer: 61d659285022dfc19d0553181a0d09b3

  2. 2.2 — MITRE Framework

    Question: What is the MITRE ATT&CK technique number of the technique used to gain initial access to the router?
    Example response: T1234
    Answer: T1110

  3. 2.3 — Which Account

    Question: Which account was successfully logged into by the actor on the router initially?
    Example response: svc_nessus
    Answer: operator

  4. 2.9 — Flash

    Question: The actor has added malware to the device. What is the filename of this malware?
    Example response: evil.exe
    Answer: a.tcl

  5. 2.11 — Pivot to Switch

    Question: What MITRE technique number was used by the attacker to be able to get onto the switch?
    Example response: T1234
    Answer: T1078

  6. 2.5 — Did they also get the admin account?

    It looks like they also managed to crack the superadmin account!
    Question: What is the password?
    Example response: P@ssw0rd
    Answer: letmein

    How it was solved

    I have to be honest this was one of those challenges I solved with the help of a friend, all I really did was spot the hash of the right user which as per the description says superadmin but as I was on a phone during the first day of BSides (well what could really go wrong) I ended up getting the solved hash from my friend, so a bit of a team effort for that one.