Points: 500

Tags: forensics 

Poll rating:

You snuck into the building. You logged into the mainframe and checked a few things out. Time ran out, but you gave yourself remote access before you got out. After connecting again, you're able to survey the box more and add a collection script before you're disconnected. Later on, you realize your typical remote access is no longer available. Suspecting you've been detected, you connect with a different access and remove your collection task.

Remove any entries in the log that you are responsible for creating. The flag is the MD5 hash of the clean log file with your entries removed. Remember, you simply need to be perfect. In other words, it is the entries you created directly or very closely related entries the system created because of your activity at the time of your interaction. Do not clean entries that clearly would have existed without your activity. The clean log file is what you would use to replace the dirty log file with if you connected again and only wanted to remove your entries from your past activity. You are only removing entries, not creating or modifying any entries.

The number of bytes of the clean log is 4,618,880 bytes, which should tell you exactly how many entries need to be cleaned. If your clean log file is smaller, you cleaned too much; if it's is bigger, you have not cleaned enough; if it's the same size, you have not cleaned the right entries.

If you believe you have removed all of the right entries (your log file size is the same or very close) and your flag is not working, contact mod mail, but be prepared with a list of entries you have removed and an explanation of why you removed the entries you did or didn't remove certain entries you weren't sure about.

Hints: Process accounting logs have a specific format that can be read and cleaned up easily. Understanding which processes you are responsible can be tricky, but observing the username, tty, PID/PPIDs, and timestamp fields are invaluable. Read the story description for an understanding of what to look for!

There is extensive admin activity, including repeated use of system status commands for monitoring, in the logs too. The interactions you have are more nuanced and shorter in the the number of processes and duration. It may help to find unique processes. The following commands will be helpful for looking through the log: lastcomm --pid -f log | tac | nl -v 0 | less and dump-acct log | nl -v 0 | less. There are entries you need to clean that are associated with a tty session, a pty session, and with no session at all.

Once you find the inital attacker activity, you know that everything comes after that chronologically from the story.

The flag format is: uiuctf{md5_hash_of_clean_log_here}

author: drdinosaur

Writeups

ActionRatingAuthor team
Read writeup
not rated
BreakPoint
You need to authenticate and join a team to post writeups