“Super Secure Startup’s private information is being leaked; can you find out how?”
Zip Password: hackthebox
sha256: 40f3ad64d83c3e18052888a6a64653c947683480d2caf225419d207a050f242f
Begin by downloading the file and using the password provided to extract everything.
Inside, you will find a couple more .zip files nested within each other, eventually hitting a roadblock when “username.zip” needs a password. I organized them all in a row on my desktop because it was easier to work with:
For this I first tried fcrackzip. It should be included with Kali, but if you need it:
apt-get update
apt-get install fcrackzip
I’m also going to use the rockyou.txt word-list, which can be found HERE if you don’t have it (auto-download).
fcrackzip -uDp <path to wordlist> <path to file>
However, it eventually turned up no results, so I am guessing the password was not in that wordlist. I reran the command using the bruteforce option, but did not have hope of that working anytime soon.
While that was running, I was looking up Super Secure Startup online, and found some things on Twitter:
I will check out this one first:
I found this post down at the bottom:
I think I recognize Alia from another challenge I did? Yeah, she is also involved in the “Infiltration” OSINT challenge on HTB (both by greenwolf). So this seems like a good lead.
We have an email with a domain name. However, supersecurestartup.com just pulls up a sketch looking site that I don’t think is part of the challenge.
Looking into Johanna, she does seems to post a lot of info about the company:
I downloaded these and tried stegsolve, which did not bring up much. I also tried strings on them both.
After this, I was thinking that the folder I need to unlock is called “username”. We have Johanna posting her company email name as j.boyce. I tried variations of all the employees I found:
j.boyce
jboyce
a.mccarty
amccarty
bphelps
b.phelps
Did not get anywhere with that, until I saw this tweet:
j.terranwald worked!
Annnnd now we have another .zip file to unlock.
Tried fcrackzip on it JUST to be sure…and it failed again…
So, let’s have a look at Josh Terranwald, “Web Developer, Father, Full of front of stack passion.”
He seems to like Eminem:
Cute dogs:
And the Avengers:
I thought it was interesting he posted an Eminem song named “Venom”, and that there is also a character named Venom in the Marvel Universe:
So I tried quite a few variations of that, but got nowhere.
He also seemed to be following a lot of football teams:
I tried many variations of these, which did not work, and wasted a lot of my time.
I’m moving on from Josh and looking a bit more closely at Bianka:
Eventually I focused on this:
I skipped by this originally because it just looked like a stock photo, but upon closer inspection you will see this:
SSH default password?
SupSecStart#Winter2018!
This did not work. So then I’m thinking, Josh got hired in Spring of 2019, right?
Let’s try:
SupSecStart#Spring2019!
Yep, it’s big brain time.
Your flag will be in the password folder, in a document called flag.txt:
Happy Hacking! ❤