SHAshank Redemption

deadface 2022

Problem Description

There is some internal back-and-forth at ESU regarding which file was exfiltrated by DEADFACE. They’ve asked us to determine “the hash of the file”. When asked what kind of hash, they responded “It doesn’t matter - anything so that we can verify the integrity of the data stolen”. See if you can find a hash for the file stolen by DEADFACE within the packet capture.

Submit the flag as flag{hash}.

Use the packet capture from Scans.

Write Up

Going to the bottom of the same TCP stream used in “The Root of All Evil” we can see the command sha1sum being ran.

This command outputs the Sha1 hash of the file.

PCAP showing SHA hash

Flag

flag{334a3d4f976cdf39d49b860afda77d6ac0f8a3c6}