AfricanFalls - Windows Image Forensics

What is the MD5 hash value of the suspect disk?

9471e69c95d8909ae60ddff30d50ffa1

What phrase did the suspect search for on 2021-04-29 18:17:38 UTC? (three words, two spaces in between)

# \Users\%userprofile%\AppData\Local\Google\Chrome\User Data\Default\History
password cracking lists

What is the IPv4 address of the FTP server the suspect connected to?

# /[root]/Users/John Doe/AppData/Roaming/FileZilla/filezilla.xml
192.168.1.20

What date and time was a password list deleted in UTC? (YYYY-MM-DD HH:MM:SS UTC)

# rifiuti-vista.exe /$Recycle.Bin/S-1-5-21-3061953532-2461696977-1363062292-1001/
2021-04-29 18:22:17 utc

How many times was Tor Browser ran on the suspect's computer? (number only)

# winprefetchview.exe /folder Y:\Prefetch
0

What is the suspect's email address?

# \Users\%userprofile%\AppData\Local\Google\Chrome\User Data\Default\History
dreammaker82@protonmail.com

What is the FQDN did the suspect port scan?

# /[root]/Users/John Doe/AppData/Roaming/Microsoft/Windows/PowerShell/PSReadLine/ConsoleHost_history.txt
dfir.science

What country was picture "20210429_152043.jpg" allegedly taken in?

# /Users/John Doe/Pictures/Contact/20210429_152043.jpg
# http://exif.regex.info/exif.cgi
zambia

What is the parent folder name picture "20210429_151535.jpg" was in before the suspect copy it to "contact" folder on his desktop?

# Exif Data + Shellbags
# Camera: Lg Electronics LM-Q725K, So it is LG
# Find in shellbags
# Users/Administrator/AppData/Local/Microsoft/Windows/UsrCLASS.dat
# Shellbag Explorer
Camera

A Windows password hashes for an account are below. What is the user's password? Anon:1001:aad3b435b51404eeaad3b435b51404ee:3DE1A36F6DDB8E036DFD75E8E20C4AF4:::

# 
AFR1CA!

What is the user "John Doe's" Windows login password?

# https://miloserdov.org/?p=4129
# 

PS C:\Users\hnl> Y:\x64\mimikatz.exe

  .#####.   mimikatz 2.2.0 (x64) #19041 May 31 2021 00:08:47
 .## ^ ##.  "A La Vie, A L'Amour" - (oe.eo)
 ## / \ ##  /*** Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )
 ## \ / ##       > https://blog.gentilkiwi.com/mimikatz
 '## v ##'       Vincent LE TOUX             ( vincent.letoux@gmail.com )
  '#####'        > https://pingcastle.com / https://mysmartlogon.com ***/

mimikatz # lsadump::sam /system:Y:\SYSTEM /sam:Y:\SAM
Domain : DESKTOP-0J3S8C2
SysKey : ba508bdf20f883c63e72ad2c4d9f6fe2
Local SID : S-1-5-21-3061953532-2461696977-1363062292

SAMKey : da06fb9e37a128afcd210c7fcbee307f

RID  : 000001f4 (500)
User : Administrator

RID  : 000001f5 (501)
User : Guest

RID  : 000001f7 (503)
User : DefaultAccount

RID  : 000001f8 (504)
User : WDAGUtilityAccount
  Hash NTLM: 69dbee1a98d4f53fbccb1fe5ce37c851

Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
    Random Value : e9b0f8fbd777e3589bef64b8fb3c4561

* Primary:Kerberos-Newer-Keys *
    Default Salt : WDAGUtilityAccount
    Default Iterations : 4096
    Credentials
      aes256_hmac       (4096) : 4d2247927a0c04ec09b66d03e7ed55b1a0bbd45970c4eece65a6ab00e9d6859a
      aes128_hmac       (4096) : 5d8ecf3576c098645e45a3281ccc309d
      des_cbc_md5       (4096) : 9d92adfd02cb54e5

* Packages *
    NTLM-Strong-NTOWF

* Primary:Kerberos *
    Default Salt : WDAGUtilityAccount
    Credentials
      des_cbc_md5       : 9d92adfd02cb54e5


RID  : 000003e9 (1001)
User : John Doe
  Hash NTLM: ecf53750b76cc9a62057ca85ff4c850e

Supplemental Credentials:
* Primary:NTLM-Strong-NTOWF *
    Random Value : 7844054d945112afaa36825b3ffcedfc

* Primary:Kerberos-Newer-Keys *
    Default Salt : DESKTOP-0J3S8C2John Doe
    Default Iterations : 4096
    Credentials
      aes256_hmac       (4096) : f01bca09159d454458c28dc002eb8dffe695e21c13dd670a94c62fc3249da4ad
      aes128_hmac       (4096) : b88e45d7cb74f3247815265956391875
      des_cbc_md5       (4096) : b3d691e6dc7a9e73
    OldCredentials
      aes256_hmac       (4096) : f01bca09159d454458c28dc002eb8dffe695e21c13dd670a94c62fc3249da4ad
      aes128_hmac       (4096) : b88e45d7cb74f3247815265956391875
      des_cbc_md5       (4096) : b3d691e6dc7a9e73

* Packages *
    NTLM-Strong-NTOWF

* Primary:Kerberos *
    Default Salt : DESKTOP-0J3S8C2John Doe
    Credentials
      des_cbc_md5       : b3d691e6dc7a9e73
    OldCredentials
      des_cbc_md5       : b3d691e6dc7a9e73


ecf53750b76cc9a62057ca85ff4c850e:ctf2021

Last updated

Was this helpful?