Nissrensics: Ræv og Nøgler

Challenge Name:

Nissrensics: Ræv og Nøgler

Category:

Forensics

Challenge Description:

Har været på udkig efter julegaver til min nissenevø og kom til at oprette en profil. Nu bliver jeg spammet med reklamer for legetøj, det er seriøst ræv og nøgler.

OBS: Samme image som i Nissrensics: Vandrestien

Nissrensics: Vandrestien

The challenge description strongly hints at browser activity and user profiles, with wordplay around ræv (fox) and nøgler (keys), suggesting Firefox and credential storage.

Approach

Continuing our journey through Nisseya’s disk image, this task focuses on identifying a user profile that was created while browsing for Christmas gifts.

Given the hint about foxes and keys, Firefox immediately stood out as the likely attack surface. We know from the previous task that Firefox was installed and used on the computer The goal was to determine:

Looking through Firefox browse history

Inspecting Firefox’s web history revealed extensive browsing on BR.dk, a major Danish toy retailer:

Firefox web history

The browsing pattern shows navigation through multiple toy categories, consistent with shopping behavior. Toward the end of the session history, the activity suggests that a purchase or account interaction occurred, possibly involving a gift card.

Since the challenge title also mentions keys, the next logical step was to investigate whether login credentials were saved.

Firefox password manager

Compared to Chrome, Firefox’s password manager is relatively permissive:

Given this, I attempted the simple approach first.

I used the well-known Python tool firefox_decrypt to extract saved credentials from the Firefox profile.

The relevant Firefox directory was extracted from the disk image:

/Users/Nisseya/AppData/Local/Mozilla

After placing it alongside firefox_decrypt, I ran:

$ py firefox_decrypt.py firefox

Select the Mozilla profile you wish to decrypt
1 -> Profiles/mnstpyk2.default
2 -> Profiles/x8lplqao.default-release

The script successfully decrypted the stored credentials:

Website:   https://nc3ctf.dk
Username: 'Nisseya'
Password: 'megetlangtogsv▒rtkodeord'

Website:   https://www.br.dk
Username: ''
Password: 'NC3{Ildraevens_hemmelighed_brudt}'

There are minor encoding issues with the NC3 login password, but this does not affect the outcome.

The important takeaway is that no master password was set, allowing full credential recovery from the local Firefox profile.

Series continues in Mørkets dal

Flag

NC3{Ildraevens_hemmelighed_brudt}

Reflections and Learnings

This challenge highlights several important forensic and security lessons:

Overall, this was a well-designed follow-up challenge that naturally builds on the same disk image while shifting focus from filesystem exploration to user behavior and credential hygiene.