22 September 2020

Forensics Lessons

by Koosha

Recently I’ve been engaging with some forensics challenges. Honestly this was my first encounter with this category in CTF.

I’ve discovered a lot during the progress of solving and learned a lesson or two.
So I hope sharing them would be useful for you as well. Enjoy :)

Network


By “Network” I mean the case in which you’re given a pcap file to analyze the commutations between different parties present in a network.
I used tshark as the tool for my analysis.

The first lesson I learned here was to study enough about the present protocols.
In my case there were two sides, one sending http packets to another, transferring a PNG file. The catch is, the order was wrong. So my job was to sort the packets in the right order, and then putting them together.
A major time of mine wasted because of the knowledge I was missing about some http request header, so I couldn’t sort the packets properly and got stuck for a good deal of time.

My advise here is to absorb the necessary knowledge about the protocol, so you can analyze the tshark/wireshark output well.
Don’t dig too deep, getting into things not related to the challenge, or too shallow not being able to understand what’s going on.

The Wireshark display filter reference is so helpful to set the tshark/wireshark parameters right and get a nice analysis done.

File System


Tools

Tools play a big role in CTF.
Here are some common tools I used during the challenge:

  1. strings: Collects human readable characters from the file.

  2. file: Recognizes the file format.

  3. binwalk: Walks through a binary to find embedded files according to magic numbers.

  4. hexdump: Dumps hex output of the file.

  5. python: As the magical scripting language!

  6. xxd: Converts a hexdump to binary and vice versa.

Note: Python is a great help in CTFs. A good scripting language is always needed, empowering you to do all kinds of computations and inspections, from deciphering to packet analyzing.

File Header

Different files have different file signatures. This way they can be identified as what they are.
Usually the first bytes of the file are considered as such. They’re also called magic numbers.
For example PNG files start with this sequence of hex values:

89 50 4E 47 0D 0A 1A 0A  

A very significant point of view about files are these magic numbers. After using ordinary tools for collecting info, pay attention to the file’s header and footer.
Maybe it’s corrupted and you should fix it this way. In some cases (including mine!) they miss a few characters among the sequence.

Zlib

Zlib is a data compression library used in various application software.
During the progress of analyzing binaries I used to run the binwalk command on them, in several occasions I faced this message:

Zlib compressed data

First I thought maybe it’s a compressed file embedded in the main binary. But I failed decompressing it using various tools around zlib compression library.
At last I found out the binary was a PNG image, using Zlib library as the means of compression. It makes sense cause PNG has a compression process among other tasks.

So the lesson here is when you execute binwalk and find a library, look up for various software which make use of that library. In our case the PNG file format which includes Zlib for data compression.

Zip and PNG Structures

These are two important file types and the ones I’ve been working with in the challenge.
A bit of knowledge about both would be nice.



So that was it! Hope you learned a piece ;)

tags: forensics - ctf

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.