Nissrensics: Forkromet Mellemgasfordeler

Challenge Name:

Nissrensics: Forkromet Mellemgasfordeler

Category:

Forensics

Challenge Description:

Har lige haft Julemandens kane til mekaniker, han påstår at mellemgaslederen rasler og skal udskiftes - det bliver vist dyrt.

Nå, det kan jeg ikke vurdere, nu vil jeg hjem og spille NC3's jule CTF! Hmm hvad var mit kodeord igen - godt min browser har det forkromede overblik!

OBS: Samme image som i "Nissrensics: Vandrestien"

Nissrensics: Vandrestien

The challenge name (translated) strongly hints at Chrome (“forkromet”), and the description clearly points toward stored browser passwords.

We have already solved a similar challenge involving Firefox’s credential store, so this appears to be the Chrome equivalent, with an extra twist.

Approach

The goal is to recover a password saved in Google Chrome on Windows.

The first step is locating Chrome’s credential database and determining whether the password is there, and if stored passwords can be decrypted offline, or whether another approach is required.

On Windows, Chrome stores saved credentials in the following file:

/Users/Nisseya/AppData/Local/Google/Chrome/User Data/Default/Login Data

This file is a SQLite database, so I opened it using DB Browser for SQLite and inspected the logins table:

Chrome Login Data

As expected, multiple credentials related to the CTF were present. However, the passwords themselves were stored as encrypted blobs.

Chrome Password Encryption on Windows

Chrome does not store passwords in plaintext. Instead:

Evolution of Chrome Encryption

Chrome’s encryption has evolved over time:

Identifying the Encryption Version

Extracting the first few bytes from a password entry revealed in hex:

76 32 30

Which corresponds to:

v20

This indicates Chrome v20-style encryption, which is relatively new.

Unfortunately, at the time of solving this challenge:

This ruled out a clean offline solution.

Leveraging Previous Findings

In the previous challenge (Mørkets Dal) we recovered what strongly appeared to be the Windows password for the user.

If correct, this opens a much simpler path: Boot the disk image and let Chrome decrypt its own passwords.

Booting the Disk Image

To do this, I:

The system booted successfully:

VM image boots

The VM presented a Windows login screen. Interestingly with Russian localization:

VM starts

Using the recovered credentials:

Username: Nisseya
Password: Nichkiya

Login was successful.

Accessing Chrome’s Password Manager

Upon login, Chrome opened automatically, strongly suggesting that booting the image was the intended solution for this challenge.

Vm starts with Chrome open

Navigating to:

Chrome → Passwords and autofill → Google Password Manager

Chrome prompted for the Windows password (which we already had).

Chrome password manager on the VM

And there it was, the stored credential containing the flag.

Final part of this series can be found in Lykke(H)julet

Flag

NC3{Deltager_Nisseya_i_ctfen}

Reflections and Learnings

This challenge highlights several important forensic and security concepts:

Overall, this was a well-designed challenge that reinforces a key forensics lesson: Sometimes the easiest way to decrypt data is to let the original system do it for you.