SANS Holiday Hack 2023
  • 🌴Overview
  • 🆙Linux PrivEsc
  • 🃏Na'an
  • 🎣Phish Detection Agency
  • 😼Hashcat
  • 🧝Elf Hunt
  • 🐚Certificate SSHenanigans
  • 📒Active Directory
  • 🚪Space Island Door Access Speaker
  • 📸Camera Access
  • 🚀Missile Diversion
  • 🏴‍☠️I'm Gonna be King of the Pirates!
Powered by GitBook
On this page
  • Objective Description
  • Solution

Hashcat

Location - Island of Misfit Toys: Scaredy Kite Heights

Objective Description

Crack the hash! The terminal gives us the following:

In a realm of bytes and digital cheer,  
The festive season brings a challenge near.  
Santa's code has twists that may enthrall,  
It's up to you to decode them all.

Hidden deep in the snow is a kerberos token,  
Its type and form, in whispers, spoken.  
From reindeers' leaps to the elfish toast,  
Might the secret be in an ASREP roast?

`hashcat`, your reindeer, so spry and true,  
Will leap through hashes, bringing answers to you.  
But heed this advice to temper your pace,  
`-w 1 -u 1 --kernel-accel 1 --kernel-loops 1`, just in case.

For within this quest, speed isn't the key,  
Patience and thought will set the answers free.  
So include these flags, let your command be slow,  
And watch as the right solutions begin to show.

For hints on the hash, when you feel quite adrift,  
This festive link, your spirits, will lift:  
https://hashcat.net/wiki/doku.php?id=example_hashes

And when in doubt of `hashcat`'s might,  
The CLI docs will guide you right:  
https://hashcat.net/wiki/doku.php?id=hashcat

Once you've cracked it, with joy and glee so raw,  
Run /bin/runtoanswer, without a flaw.  
Submit the password for Alabaster Snowball,  
Only then can you claim the prize, the best of all.

So light up your terminal, with commands so grand,  
Crack the code, with `hashcat` in hand!  
Merry Cracking to each, by the pixelated moon's light,  
May your hashes be merry, and your codes so right!

* Determine the hash type in hash.txt and perform a wordlist cracking attempt to find which password is correct and submit it to /bin/runtoanswer .*

Solution

We are given the hash and a wordlist in our directory on the machine. To solve this challenge, I copied both over locally.

First, read the hash file and note the format and characters that start the hash.

Now we pass the mode, hash file, and password list to hashcat.

hashcat -m 18200 hashobjective.txt passwordlist.txt

Then run the command specified to complete the objective:

PreviousPhish Detection AgencyNextElf Hunt

Last updated 1 year ago

Hashcat provides examples of different hash types in their . We can find the correct hashcat mode to run by referencing this (18200), and the type of hash (Kerberos 5, etype 23, AS-REP).

documentation
😼
Page cover image
Directory Contents
hash.txt contents
cracked password
All Done