Took the Byte

Notes

This is the third HTB challenge I have done. This challenge was created by CharlesTruluck. It has an easy rating and is worth 20 points.

Objective

Someone took my bytes! Can you recover my password for me?


Solution

Well, the clue prompt doesn't really give me much to go on here, so lets just jump in and see what files we have. Unzipping the file dumps just a single file named password. Pasted image 20220911200618

Using cat just dumps illegible data. Pasted image 20220911200627

Strings doesn’t find anything useful. byte-1

I took a look at the HTB forums. On page 1 I saw a reference to using a hex editor. Using xxd I can see the hex contents of the file. Pasted image 20220911200727

I still have no idea what this is, but the hex byte ff is repeated a ton here. Ok, I'll upload this file to cyberchef and see what that makes of it. I had to drag/drop the file in to cyberchef, for whatever reason it didn't like uploading through the dialog prompt. Once uploaded, I ran the recipe named 'Magic' because it attempts to process the input data and recommend other operations that could help make sense of it… Nothing was found during the initial run. Pasted image 20220911200806

Ok, as it says in the output box, next I tried by modifying an operation argument, specifically enabling Intensive Mode. Alright, now the recipe result says that if I run the XOR recipe with the bit ff, I will wind up with a .zip. So I add the XOR recipe with the correct settings, get a result with the PK magic byte. Pasted image 20220911200833

I am able to unzip the file from within cyberchef and get the flag. Pasted image 20220911200844

Flag

HTB{27AjFDkqi1wJ}

Next: USB Ripper