# Shiba Insider

{% hint style="warning" %}
Always open malware in a secure environment like a VM.
{% endhint %}

{% hint style="info" %}
We will be using the [REMnux](https://remnux.org/) distribution which is specifically made for reverse engineering.
{% endhint %}

##

## What is the response message obtained from the PCAP file?

Let's open the `insider.pcap` file using Wireshark.

<figure><img src="https://1586847736-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtSZ40gLWhBDTzPEgHsVB%2Fuploads%2FZ10i5A6NZYPLWfszNcYA%2F1.png?alt=media&#x26;token=a0d78f98-5136-40a9-8e89-6eefd9e97850" alt=""><figcaption></figcaption></figure>

Let's follow the TCP stream via `Follow > TCP Stream`.

<figure><img src="https://1586847736-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtSZ40gLWhBDTzPEgHsVB%2Fuploads%2FG7t5bjIL7NmJ53QIfgip%2F2.png?alt=media&#x26;token=0f405d9f-08cf-41a6-a9cd-f1559838d56e" alt=""><figcaption></figcaption></figure>

### Answer

```
use your own password
```

## What is the password of the ZIP file?

The answer to the previous question told us to use our own password.

If we look at the TCP stream we can see a string sent by us that might be a password.

<figure><img src="https://1586847736-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtSZ40gLWhBDTzPEgHsVB%2Fuploads%2FKdLJ4MhABRIS8XBEpq0J%2F3.png?alt=media&#x26;token=59e195bf-98c2-435f-8c56-8c20fa2b4f7d" alt=""><figcaption></figcaption></figure>

The string has two `==` signs at the end. This is an indication that the string has been encrypted using Base64.

Let's use Cyberchef to decode it.

<figure><img src="https://1586847736-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtSZ40gLWhBDTzPEgHsVB%2Fuploads%2FYVhN6Q2lMTx2g45QIEGR%2F4.png?alt=media&#x26;token=f9409541-6715-483d-b45e-f454d0f05877" alt=""><figcaption></figcaption></figure>

### Answer

```
redforever
```

## Will more passwords be required?

We can now unzip `file.zip` using the `redforever` password.

```
$ unzip file.zip 
Archive:  file.zip
[file.zip] ssdog1.jpeg password: 
  inflating: ssdog1.jpeg             
  inflating: README.txt              
```

As there are no more Zip files, we can safely say that no more password will be required.

### Answer

```
No
```

## What is the name of a widely-used tool that can be used to obtain file information?

The `exiftool` utility can be used to obtain file information such as the metadata.

### Answer

```
Exiftool
```

## What is the name and value of the interesting information obtained from the image file metadata?

Let's look at the file metadata using the `exiftool` utility as mentioned previously.

```
$ exiftool ssdog1.jpeg 
ExifTool Version Number         : 12.42
File Name                       : ssdog1.jpeg
Directory                       : .
File Size                       : 84 kB
File Modification Date/Time     : 2021:09:26 16:07:52-04:00
File Access Date/Time           : 2021:09:26 16:07:57-04:00
File Inode Change Date/Time     : 2023:09:17 11:04:50-04:00
File Permissions                : -rw-rw-r--
File Type                       : JPEG
File Type Extension             : jpg
MIME Type                       : image/jpeg
JFIF Version                    : 1.01
Resolution Unit                 : None
X Resolution                    : 1
Y Resolution                    : 1
XMP Toolkit                     : Image::ExifTool 11.88
Technique                       : Steganography
Technique Command               : steghide
Image Width                     : 1080
Image Height                    : 1018
Encoding Process                : Baseline DCT, Huffman coding
Bits Per Sample                 : 8
Color Components                : 3
Y Cb Cr Sub Sampling            : YCbCr4:4:4 (1 1)
Image Size                      : 1080x1018
Megapixels                      : 1.1
```

All the information is pretty standard for an image except for the `Technique : Steganography` field. Steganography is used to hide information in other information most notably images.

### Answer

```
Technique : Steganography
```

## Based on the answer from the previous question, what tool needs to be used to retrieve the information hidden in the file?

The `steghide` tool needs to be used retrieve the hidden information.

```
Technique                       : Steganography
Technique Command               : steghide
```

### Answer

```
StegHide
```

## Enter the ID retrieved.

Let's use the `steghide` utility to retrieve the ID.

```
$ steghide extract -sf ssdog1.jpeg 
Enter passphrase: 
wrote extracted data to "idInsider.txt".
```

The `sf` flag is used to specify the name of the stego file.

```
$ cat idInsider.txt 
0726ba878ea47de571777a
```

### Answer

```
0726ba878ea47de571777a
```

## What is the profile name of the attacker?

Let's look at our own user profile.

<figure><img src="https://1586847736-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtSZ40gLWhBDTzPEgHsVB%2Fuploads%2Fw5iY6jSbJJb8D2olTMlw%2F5.png?alt=media&#x26;token=1d8dc952-5e47-4cb3-9d6c-058ecbc8e747" alt=""><figcaption></figcaption></figure>

If we look at the user profile, we can see that the user IDs are included in the URI.

```
https://blueteamlabs.online/home/user/26e1135472d925e971ea68
```

What if we replace this ID with the one we retrieved: `0726ba878ea47de571777a`.

<figure><img src="https://1586847736-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FtSZ40gLWhBDTzPEgHsVB%2Fuploads%2Fi8wcFE0g3rISi2WpZ8Vd%2F6.png?alt=media&#x26;token=fcc2806f-a48b-4a82-9240-8d6ea7fe1f5e" alt=""><figcaption></figcaption></figure>

We have our attacker.

### Answer

```
bluetiger
```
