Rating:

[中文](./readme_zh.md) [English](./readme.md)

Challenge attachment download link (maybe will not work in future):

[deepinreal](https://share.weiyun.com/5JMqJdT) (weiyun)

[deepinreal](https://pan.baidu.com/s/1O-A-lbRRADLYqK0y9UDX-w) (baiduyun)

[deepinreal](https://drive.google.com/drive/folders/1qrSPaE1V39a4W3yP8lXHfXAX_SuOIbYk) (google drive)

[deepinreal](https://mega.nz/#F!SiInRaKA!SBtuAQrevLcjO823h1tnPg) (mega)

[deepinreal](http://222.85.25.40/deepinreal/) (mycloud)

# DeepInReal WriteUp

Extract the `zip` file with `z01` file, we got three files.

![1](./img/1.png)

We have a look at `from-officer.txt`。

![2](./img/2.png)

According to the `officer`'s message, we can search for the most common and weak password in the world.

![3](./img/3.png)

According to `wikipedia`, the first result is `123456` in 2019.

So we use `WinAES` to decrypt the `recovered.bin` file.

![4](./img/4.png)

We got the decrypted file named `recovered.bin.decrypted`. And we have a look at the file's header.

![5](./img/5.png)

The original file name is `linj.vmdk`, it's a `vmdk` file.

The file's header had been modified. We can modify it back to normal.

![6](./img/6.png)

We attach the vmdk file in vmware and boot it.

We need password to login the system. The password hint is `headers`.

So `i_love_kdmv` is the password.

![7](./img/7.png)

![8](./img/8.png)

When we logined, there is a sticker paper on the desktop.

According to the hint, we press `win+x` to open `windows ink` panel.

![9](./img/9.png)

We can see `bitlock` on the `sketchpad`. We click into the `sketchpad`.

![10](./img/10.png)

Here is our bitlock password `linj920623!@#`.

![11](./img/11.png)

We decrypt the bitlocker disk.

![12](./img/12.png)

There are two files we should focus on.

![13](./img/13.png)

A ethereum wallet file and a password dictionary.

We try to write a script to brute it.

```
import eth_keyfile
import json

fp = open('ethpass.dict', 'r')
wallet = json.loads(open('UTC--2019-07-09T21-31-39.077Z--266ed8970d4713e8f2701cbe137bda2711b78d57', 'r').read())

while True:
try:
password = fp.readline().strip().encode('ascii')
if len(password) <= 0 :
print("password not found")
break
except:
continue
try:
result = eth_keyfile.decode_keyfile_json(wallet, password)
except:
continue
print(password)
print(result)
break
```

![14](./img/14.png)

We got the result. Password: `nevada`. Private key: `VeraCrypt Pass: V3Ra1sSe3ure2333`.

We find the VeraCrypt file in forensic software.

![15](./img/15.png)

![16](./img/16.png)

But we could not find the file in vmware's vm.

We find a `.mylife.vera` delete script in boot folder.

![17](./img/17.png)

So we can dump the file in some ways.

Use the password to decrypt the `.vera` file and mount it.

![18](./img/18.png)

We can find `184` files in the folder.

![19](./img/19.png)

`readme` file gave us a hint 'there is `185` file in this folder'. So there is a hidden file.

The filesystem is `NTFS`. So the suspect may uses `ntfs ads` to hide the secret file.

We can use `dir /r` to find the hidden file `528274475768683480.jpg:k3y.txt:$DATA`.

![20](./img/20.png)

Use command `notepad 528274475768683480.jpg:k3y.txt` to read the hidden file.

![21](./img/21.png)

We got the password `F1a9ZiPInD6TABaSE`.

The computer had installed `phpStudy` and `Navicat`, we boot the `mysql server` and try to find the flag zip.

![22](./img/22.png)

The databases' name are the same with `.sql` file name in bitlocker `gambling` folder.

![23](./img/23.png)

We can compare the database and find out the differences.

Database `tencent` have a extra table `auth_secret`.

![24](./img/24.png)

There is a `base64 encoded` flag zip inside.

![25](./img/25.png)

We use the password `F1a9ZiPInD6TABaSE` to decrypt the `flag.txt` file.

![26](./img/26.png)

We got the flag.

Flag: `de1ctf{GeT_Deep3r_1N_REAl_lifE_fOrEnIcs}`

Original writeup (https://github.com/De1ta-team/De1CTF2019/tree/master/writeup/misc/DeepInReal).