Tags: forensics filesystem 

Rating: 5.0

# Encrypted Storage 1
Category: Forensics

Points: 359

Solved by: staccah_staccah

## Problem

Our client was attacked by some ransomware. Maybe it was separatist dwarves?
He send us encrypted filesystem. Decrypt it, he need some data from secure storage.

## Writeup

Let's start by analyzing the file with the file command and see that it is an ext4 filesystem.
We mount it with the command:
```
mount -t ext4 filesystem /mnt/disk1
```
Here we find 4 folders, each with a file inside that appears to be corrupt.
Analyzing their hexdump, however, we can see that 4 bytes have been added to the beginning of each file.
![hexedit](./hexedit.png)
By removing them (and saving them for later) we get the original files.
In particular, one of the files is a zip in which there is a flag.txt file, but to extract it you need a password.
After looking in vain for password clues within the other files, I tried bruteforce and it worked:
![rockyou](./rockyou.png)

Finally we find the flag contained in flag.txt: `kks{n0t_s3cur3}`

Original writeup (https://github.com/r00tstici/writeups/tree/master/kksCTF_2020/Encrypted%20Storage%201).