Posts

Showing posts from April, 2013

BSides London 2013 Challenge 5

Image
Another BSides London 2013 challenge! I didn't enter as I had already managed to get my hands on a ticket at the time this one was released. I did, with the help of some colleagues, complete the challenge to fill some spare time I had at the weekend. There was no back story associated with this challenge. You were simply provided with a PDF document , and told to follow the clues until you came across a secret code, a subject line and an email address to which these could be sent . I should also add that although this post shows the most direct route to the final answer, we did find ourselves following a few red herrings and banging our heads against a few proverbial brick walls. Stage 1: The text of the PDF document give clues as to how to complete this stage. Within the seemingly random text is this string: guvfgrkgvfwhfgnqvfgenpgvbasebzgurernypunyyratr When decoded using ROT13 this becomes: th istextisjustadistractionfromtherealchallenge There is also thi

BSides London 2013 Challenge 3

Image
Determined to win a ticket to Security BSides London 2013 and undeterred by my previous failure , I completed the third challenge posted by MWR Labs. I wasn't successful, but I learnt a little about hacking Android apps and decided to share my answer so that others might learn something too. The premise of this challenge is that you are hired by BigCorp to assist in acquiring evidence to prove that an employee is guilty of attacking their IT systems. They have discovered that the employee is using an Android app called Evil Planner, and they want you to find any vulnerabilities that might allow them to access and decrypt any incriminating information stored within the app. Ultimately, the IT wizards at BigCorp will use any vulnerabilities to compromise the employee's device to install a piece of custom malware to extract and decrypt data stored within the Evil Planner app. Below is my submission: The .apk file containing the app was downloaded from the MWR website  and

BSides London 2013 Challenge 2

Image
Earlier this year I completed a challenge to win tickets to Security BSides London 2013. The challenge can be found here . Unfortunately, I wasn't one of the first three to submit a correct answer, I didn't write the best submission and I wasn't even lucky enough to win the prize draw. I had a great time figuring this out anyway, and figured I'd post my solution online. The premise is simple. Fat Dex owns a diner and he believes that the owner of a rival eatery, Iggy, has stolen his secret recipe for cheese on toast. He has acquired a USB stick from one of her employees, Jamie, that contains an encrypted file that he believes will prove Iggy's guilt. Dex has employed Packet Tracy, a private investigator, to decrypt the file and discover who stole the recipe. It's a classic whodunit with a computer forensics twist!  Below is my submission: My name is Oleg McNolegs. I work as a sleuthhound - a private investigator specialising  in computer forensics. I was