Crimson Initiate
Home >
Cyber Defense CTF > Forensics
Back <> Next
NOTE - The resources needed for this challenge are on the Cyber Defense CTF Triage Workstation VM on our hosted platform.
Let’s dabble a bit on the offensive side. There is a user named crimson with admin privileges on the Triage Workstation. Use any method you prefer to get the user’s password. The password is the flag.
You are able to download tools to the workstation if need be
For this challenge we are directed again to the Cyber Defense CTF Triage Workstation, and told that there is a user on the system named ‘Crimson’. The objective is to retrieve their password.
We can do this quite easily if we use Mimikatz!
Once mimikatz is downloaded and extracted, we can open a cmd prompt as the System user:
psexec -i -s cmd.exe
Then we can start mimikatz and dump the NTLM hashed passwrods for all the users and look for the user Crimson.
.\mimikatz.exe
privilege::debug
lsadump::sam
Now that we have the NTLM hash all we need to do is crack it using your software of choice. I went with Crackstation for this, which cracked the hash without any issue, since it was a weak password.