Category: Forensics
Okay. I have both good news, and bad news. The bad news is that APOCALYPSE has deployed a mole to infiltrate our investigation team and he managed to send over one of our precious flags to them. However, the good news is that we've identified the mole, apprended him, and also obtained his browser history. Can you do some forensics and figure out what flag he leaked?
Upon unzipping the file, I started looking through the folder's contents, landing in the profile folder.
I was on the lookout for something along the lines of 'history', but since there was nothing named such, the browser history was stored somewhere else. places.sqlite
caught my eye - after all, browser history is a record of the places he'd visited.
Using DB browser for sqlite, I opened the file.
Aha! There's a table called moz_historyvisits
! But alas, this table only contained place IDs.
The next most logical place to look would be moz_places
.
Jackpot. All we need to do now is find the flag. After scrolling past comedy gold such as
is teamviewer a virus - Google Search
Amazon.com : hello kitty luggage (x2!)
what do I do if my life is a meme - Google Search
we finally land on
I hope no one sees this - Pastebin.com
Well, that's not suspicious at all. Nope. Not one bit. Totally innocent.
Opening the link takes us to the pastebin with the flag.
Cyberthon{why_4r3_y0u_5py1ng_0n_m3_y1k35}