Home >

Cyber Defense CTF > Forensics

Back <> Next

NOTE - The resources needed for this challenge are on the Cyber Defense CTF Triage Workstation VM on our hosted platform.

Let’s dabble a bit on the offensive side. There is a user named crimson with admin privileges on the Triage Workstation. Use any method you prefer to get the user’s password. The password is the flag.

You are able to download tools to the workstation if need be

For this challenge we are directed again to the Cyber Defense CTF Triage Workstation, and told that there is a user on the system named ‘Crimson’. The objective is to retrieve their password.

We can do this quite easily if we use Mimikatz!

Once mimikatz is downloaded and extracted, we can open a cmd prompt as the System user:

psexec -i -s cmd.exe

Then we can start mimikatz and dump the NTLM hashed passwrods for all the users and look for the user Crimson.

.\mimikatz.exe

privilege::debug

lsadump::sam

crimson_initate_1

Now that we have the NTLM hash all we need to do is crack it using your software of choice. I went with Crackstation for this, which cracked the hash without any issue, since it was a weak password.

crimson_initate_2

Note: This flag does not need to be in the leveleffect{} wrapper.

Back <> Next