FM03 - 250pts
Last updated
Was this helpful?
Last updated
Was this helpful?
Download the Veracrypt volume and find a way to get the flag. Contents: dir_volume
Challenge Files:
During the competition, a hint was emailed out that said the file for this challenge is a VeraCrypt encrypted volume since no one had solved the challenge after 24 hours.
We can try a brute force approach to decrypt the volume since no other files are provided, such as a memory dump of the system that could contain the password. More information about potential attacks can be found in the ().
Brutefocing this volume is possible because the password is early in the . My GTX 1060 Mobile GPU can do about 150 H/s without any configuration changes to hashcat
.
The following modes are available in hashcat
:
Let's try mode 13722
since that is the default in VeraCrypt. Starting cracking with: hashcat -a 0 -m 13722 dir_volume /usr/share/wordlists/rockyou.txt
.
hashcat
output:
The password redwings
is shown in the hashcat
output.
We can mount the volume using VeraCrypt's GUI with password redwings
. The flag is in Flag/flag.txt
.
Us3_5tr0ng_P@55w0Rds!