Forensic

Sunday 20 August 2017, 15:06  #1
Forensic - Ugly duckling
qesuto
  • 1 posts

I’ve been banging my head on this one for days. Even pretended the bin file was raw bitmap image without the header, but no joy.
Any hint would be most appreciated.

Wednesday 30 August 2017, 15:56  #2
Forensic - Ugly duckling
quirkdorky
  • 2 posts

There exists a commercial product that the title refers to and that is being used in the scenario outline. Look into how that works.

Wednesday 16 May 2018, 17:59  #3
Forensic - Ugly duckling
l3chuck
  • 4 posts

I’m pretty stuck on this too. I didn’t find any commercial tool. Is this about the Ugly Duckling theorem?

Friday 18 May 2018, 20:27  #4
Forensic - Ugly duckling
l3chuck
  • 4 posts

Ok, I got a hint on the IRC channel. Thanks!

Friday 27 July 2018, 01:18  #5
Forensic - Ugly duckling

I’m stuck too, seems to have something to do with the rubber duck ...

Sunday 25 November 2018, 21:23  #6
Forensic - Ugly duckling
lockedbyte
  • 2 posts

It is involved in Rubber Ducky?

Tuesday 11 December 2018, 18:59  #7
Forensic - Ugly duckling
Dragon
  • 1 posts

I found out what product the title refers to, and was able to get the initial payload. It however simply downloads another executable via powershell and executes that. I have no idea where to go from there, and IRC wasn’t exactly helpful. It’s also not quite clear where/what the password for the challenge is. Any help would be appreciated.

Monday 3 August 2020, 14:50  #8
Forensic - Ugly duckling
jemphare
  • 2 posts

If you got the executable you are almost done, search for text.

Saturday 19 August 2023, 18:41  #9
Forensic - Ugly duckling
MaLevi4
  • 2 posts

Hi There!

1. You should guess that our intruder has used USB Rubber Ducky attack.
2. When you get next-stage executable you should firstly check strings inside it.