Tags: forensics 

Rating:

# Client01 (75 PTS)
### Description
>Attached file is the homepage of the client01. He knows the flag.

Flag: ```SharifCTF{43215f0c5e005d4e557ddfe3f2e57df0}```

### Files

- [client01.tar.gz](https://github.com/VoidHack/write-ups/blob/master/SharifCTF%208/forensics/client01/client01.tar.gz)

### Solution

![](https://github.com/VoidHack/write-ups/raw/master/SharifCTF%208/forensics/client01/images/folders.png)

After extracting the archive we can see a lot of strange folders, but I'll give you a little hint: we're interested only in ```.thunderbird```. That's an email client, so we're going to look at inbox messages (```/.thunderbird/5bd7jhog.default/ImapMail/imap.gmail.com/INBOX```).

![](https://github.com/VoidHack/write-ups/raw/master/SharifCTF%208/forensics/client01/images/message.png)

What a luck! There's a message containing ```flag``` right in its subject! Look below, you see a link, didn't you?
Yes, this is a file hosting, where we can download the file called ```file```.

So, how can we open it? Try to use binwalk:

```
C:\Users\Vova\Desktop\SharifCTF8> echo import binwalk; binwalk.scan('-B', 'file') | python
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
100 0x64 Zlib compressed data, default compression

C:\Users\Vova\Desktop\SharifCTF8>
```

Um, zlib? Not from 0x00? It's strange, we need look INSIDE that file.

![](https://github.com/VoidHack/write-ups/raw/master/SharifCTF%208/forensics/client01/images/chunks.png)

Wow, see that chunks? It's seems like a PNG file, but... for now it is not PNG, it's ```NG``` file.
Let's add a single byte to the header:

![](https://github.com/VoidHack/write-ups/raw/master/SharifCTF%208/forensics/client01/images/header.png)

OK, now we can open it.

![](https://github.com/VoidHack/write-ups/raw/master/SharifCTF%208/forensics/client01/images/half.png)

Oops, someone stole a half of the flag! But we still can submit it.

Original writeup (https://github.com/VoidHack/write-ups/tree/master/SharifCTF%208/forensics/client01).