Nissrensics: Vandrestien

Challenge Name:

Nissrensics: Vandrestien

Category:

Forensics

Challenge Description:

Er du god til digitale undersøgelser, eller synes du bare, det bliver noget nissrensics? Har du styr på alle Windows nissefakterne, eller giver du op efter `strings`?

Start din rejse med en god lang gåtur gennem mit filsystem.

The handout for this challenge was a 20 GB EnCase disk image, which is not attached here for obvious reasons.

The challenge clearly hints at digital forensics (“nissrensics”) on a Windows system, with an emphasis on filesystem artifacts rather than quick wins using tools like strings.

Approach

For disk image and filesystem forensics challenges, I personally prefer Autopsy due to its excellent GUI, timeline view, and artifact parsing.

For multi-stage challenges like this one, I always start by manually browsing the filesystem to get a feel for the machine:

In this case, the image appears to come from a Windows machine belonging to a user named Nisseya.

File overview

Initial enumeration

A good rule of thumb in Windows forensics is to start with user-controlled locations, especially:

Other things of note:

This will probably be relevant in later tasks ;)

While browsing the Desktop, one folder immediately stood out: Bedstemors fødseldags billeder (Grandmother’s birthday pictures).

This looked like a deliberate breadcrumb rather than a coincidence, so I followed it.

Following the trail

The folder contained another folder. That folder contained another folder. And so on.

After descending roughly 10 directory levels deep, I eventually reached a file named:

Flag

Inside this file was the first flag. Notably, the flag was split and formatted in a way that makes it difficult to find via simple keyword searches, reinforcing the challenge’s hint that this was about walking the filesystem, not shortcutting it.

Next part of the series is

Flag

NC3{Du_fulgte_stien}

Reflections and Learnings

This challenge serves as a classic introductory filesystem forensics task, and it does a few things very well:

Overall, this was a solid warm-up challenge that reinforces a fundamental lesson in forensics CTFs:

Sometimes the intended solution really is just to look around carefully.