Post

BlackhatMEA2023 USB100 Writeup

Description:

In a shocking turn of events, a malicious actor managed to gain physical access to our victim’s computer by plugging in a rogue USB device. As a result, all critical data has been pilfered from the system. Flag is direct without BHFlagY{} tag.

Solution:

opening the wireshark, we observe multiple files are transferred, most of which are JPEG images

File-Output

Arranging the the packets by length

We find a winPE file which is likely to contain the flag File-Ouput

Copy the value

File-Ouput

Using CyberChef to convert it into .exe

File-Ouput

Running the Executable

File-Ouput

Flag:

BHflagy{1d3cbfa0e052b1729a00950e9fc0f61a3f393bc97c0c74c8ecab1b58cd0f95c32e4c970bdfa6e23371d50680ca0c37f61f7206974d20d5cbb2f00151f4735dde}

This post is licensed under CC BY 4.0 by the author.