Det store nissehack: Gerningsgnomens Afsløring

Challenge Name:

Det store nissehack: Gerningsgnomens Afsløring

Category:

Det store nissehack

Challenge Description:

Efter omfattende efterforskning har du samlet flere spor om gerningsgnomens aktiviteter.

Nu har Julens Politi brug for din hjælp til at færdiggøre politirapporten med præcise detaljer om hændelserne og de stjålne data. Kan du sikre, at rapporten bliver komplet og klar til julens retsopgør?

Link til rapportskabelonen: https://tryhackme.com/jr/nisseh4ck2o24

Approach

The final task consists of a comprehensive quiz to consolidate all the information gathered during the previous four tasks:

quiz

Here’s how the information was collected and processed:

QuestionTask answer was found inWhere answer was foundAnswer
Compromised username1Auth.log line of loginKanelknaser
Santa’s pin number3Final page with Santa intel2412
Rudolph’s intolerance3Final page with Santa intelgulerødder
Keys for Elf postal service codebook3Final page with Santa intelNissehue, Sukkerstang, Guirlande, Kræmmerhus, Julekugle
Santa’s private phone number4Private bin document+299 12 34 56
Attacker’s IP1Auth.log line of login209.38.243.124
Attacker’s email2Found on the certificatedatagnasker@proton.me
Domain, the email was used to createa certificate for2Site of the taskbitbibliotek.dk
Attacker’s real name3Found on his x.com accountBørge Madsen
Attacker’s hometown3Found on his Stack Overflow accountFensmark
Company the attacker is working for2Found on the certificateGnomerne Aps
Company hometown2Found on the certificateRingsted

With all the answers filled in, the report was successfully completed:

formula filled out

Upon submission, we received the confirmation of success:

success

Flag

NC3{hU5k_aT_sKr1v3_r4Pp0Rt}

Reflections and Learnings

This challenge offered valuable insights into forensic investigation and data correlation across multiple sources. Some key takeaways include:

  1. Importance of Log Analysis: Leveraging log files such as auth.log proved crucial in tracing malicious activities and identifying compromised credentials and IPs.

  2. Using Metadata Effectively: Information embedded in certificates and social media profiles helped piece together the attacker’s identity and affiliations.

  3. Holistic Approach: Cross-referencing diverse data sources, such as Stack Overflow, x.com, and internal files, highlighted the necessity of a well-rounded investigation strategy.

  4. Patience in Challenges: Systematically solving individual tasks before tackling the final quiz was instrumental in ensuring a thorough understanding of the case.

This challenge was a testament to the power of methodical investigation and the importance of verifying information across multiple channels. It also emphasized the value of documentation and report writing in forensics, which ensures clarity and completeness in presenting findings.