{"id":415,"date":"2019-01-17T07:54:58","date_gmt":"2019-01-17T07:54:58","guid":{"rendered":"https:\/\/mrjsec.co.uk\/blog\/?p=415"},"modified":"2019-01-18T00:16:22","modified_gmt":"2019-01-18T00:16:22","slug":"objective-9-4-recover-alabasters-password","status":"publish","type":"post","link":"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/","title":{"rendered":"<center>Objective 9.4: Recover Alabaster&#8217;s Password<\/center>"},"content":{"rendered":"\n<p style=\"text-align:center\">Objective 9.4, the last one, it won&#8217;t be the easy one. Well, let&#8217;s get on! We need to Recover Alabaster&#8217;s password as found in the encrypted password vault (https:\/\/www.holidayhackchallenge.com\/2018\/challenges\/forensic_artifacts.zip)<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"514\" height=\"171\" data-attachment-id=\"416\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture1-14\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-13.png?fit=514%2C171&amp;ssl=1\" data-orig-size=\"514,171\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-13.png?fit=514%2C171&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-13.png?resize=514%2C171&#038;ssl=1\" alt=\"\" class=\"wp-image-416\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-13.png?w=514&amp;ssl=1 514w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-13.png?resize=300%2C100&amp;ssl=1 300w\" sizes=\"auto, (max-width: 514px) 100vw, 514px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">If we speak to Alabaster Snowball, they tell us the following.<br>\n&#8220;Yippee-Ki-Yay! Now, I have a ma\u2026 kill-switch!<br>\nNow that we don&#8217;t have to worry about new infections, I could sure use your L337 security skills for one last thing.<br>\nAs I mentioned, I made the mistake of analysing the malware on my host computer and the ransomware encrypted my password database.<br>\nTake this zip with a memory dump and my encrypted password database, and see if you can recover my passwords.<br>\nOne of the passwords unlocks our access to the vault so we can get in before the hackers.&#8221;<\/p>\n\n\n\n<p style=\"text-align:center\">Again Shinny Upatree gives us the same hint.<br>\n&#8220;Have you heard that new ransomware called Wannacookie hit Kringle Castle? Several elves reported receiving a cookie recipe Word doc. When opened, a PowerShell screen flashed by, and their files were encrypted. Many elves were affected, so Alabaster went to see if he could help out. I hope Alabaster watched the PowerShell Malware talk at KringleCon before he tried analysing Wannacookie on his computer. An elf I follow online said he analysed Wannacookie and that it communicates over DNS. He also said that Wannacookie transfers files over DNS and that it looks like it grabs a public key this way. Another recent ransomware made it possible to retrieve crypto keys from memory. Hopefully the same is true for Wannacookie! Of course, this all depends on how the key was encrypted and managed in memory. Proper public key encryption requires a private key to decrypt. Perhaps there is a flaw in the wannacookie author&#8217;s DNS server that we can manipulate to retrieve what we need. If so, we can retrieve our keys from memory, decrypt the key, and then decrypt our ransomed files.&#8221;<\/p>\n\n\n\n<p style=\"text-align:center\">Alabaster Snowball does give us a new hint &#8220;wannacookie.min.ps1? I wonder if there is a non-minified version? If so, it may be easier to read and give us more information and maybe source comments?&#8221;<br> Also, a hint: &#8220;Pulling strings from a memory dump using the Linux strings command requires you specify the -e option with the specific format required by the OS and processor. Of course, you could also use <a href=\"https:\/\/github.com\/chrisjd20\/power_dump\">powerdump<\/a>.&#8221;<\/p>\n\n\n\n<p style=\"text-align:center\">Well, I guess it&#8217;s back to PowerShell scripts.<br>\nDo you remember this?<br>\n&#8220;6B6579666F72626F746964&#8221; = Keyforbotid.<br>\n&#8220;6B696C6C737769746368&#8221; = Killswitch.<br>\n&#8220;7365727665722E637274&#8221; = Server.crt.<br>\n&#8220;72616e736f6d697370616964&#8221; = Ransomispaid<\/p>\n\n\n\n<p style=\"text-align:center\">Do you remember how we were able to download a full version of the wannacookie PowerShell script just by changing the HEX code? Yep, that&#8217;s what we&#8217;re going to do here! Download the other files as we need them to decrypt the vault.<\/p>\n\n\n\n<p style=\"text-align:center\">Using the old wannacookie script, we can rebuild it and use it to download the files we need, if you look at the script here and here.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"122\" data-attachment-id=\"417\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture2-14\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-12.png?fit=811%2C122&amp;ssl=1\" data-orig-size=\"811,122\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture2\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-12.png?fit=700%2C105&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-12.png?fit=700%2C105&amp;ssl=1\" alt=\"\" class=\"wp-image-417\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-12.png?w=811&amp;ssl=1 811w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-12.png?resize=300%2C45&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-12.png?resize=768%2C116&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-12.png?resize=700%2C105&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"91\" data-attachment-id=\"418\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture3-14\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-13.png?fit=776%2C91&amp;ssl=1\" data-orig-size=\"776,91\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture3\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-13.png?fit=700%2C82&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-13.png?fit=700%2C82&amp;ssl=1\" alt=\"\" class=\"wp-image-418\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-13.png?w=776&amp;ssl=1 776w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-13.png?resize=300%2C35&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-13.png?resize=768%2C90&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-13.png?resize=700%2C82&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">&#8220;function get_over_dns($f)&#8221; is pretty much self-said, it gets over the DNS, and we can use this to get the files we need over DNS. And not forgetting &#8220;function H2A()&#8221; as &#8220;get_over_dns&#8221; calls from it. Once we have that, we have our script ready!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1059\" height=\"206\" data-attachment-id=\"419\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture4-14\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-13.png?fit=1059%2C206&amp;ssl=1\" data-orig-size=\"1059,206\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture4\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-13.png?fit=700%2C136&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-13.png?fit=700%2C136&amp;ssl=1\" alt=\"\" class=\"wp-image-419\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-13.png?w=1059&amp;ssl=1 1059w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-13.png?resize=300%2C58&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-13.png?resize=768%2C149&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-13.png?resize=700%2C136&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">So that&#8217;s working a charm! We only need the server.crt (&#8220;7365727665722E637274&#8221; = Server.crt.) from <a href=\"https:\/\/pastebin.com\/raw\/aSTuCCmt\">here<\/a>. Nothing else for now. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1055\" height=\"463\" data-attachment-id=\"420\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture5-13\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-12.png?fit=1055%2C463&amp;ssl=1\" data-orig-size=\"1055,463\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture5\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-12.png?fit=700%2C307&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-12.png?fit=700%2C307&amp;ssl=1\" alt=\"\" class=\"wp-image-420\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-12.png?w=1055&amp;ssl=1 1055w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-12.png?resize=300%2C132&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-12.png?resize=768%2C337&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-12.png?resize=700%2C307&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">\n(Remember to change the HEX code and file name to what you need!)\n<\/p>\n\n\n\n<p style=\"text-align:center\">We have the server.crt file, but we don&#8217;t have the server.key file! <br>&#8220;crt and key files represent both parts of a certificate, the key being the private key to the certificate and crt being the signed certificate.&#8221;<br> https:\/\/www.akadia.com\/services\/ssh_test_certificate.html<\/p>\n\n\n\n<p style=\"text-align:center\">We need this key, or else we&#8217;re not going to get far. However, we don&#8217;t know where it is, well we do! Do you remember the website we used before? <br>(http:\/\/www.unit-conversion.info\/texttools\/hexadecimal\/) Yep, all we need to do is get the HEX for server.key!<br> &#8220;7365727665722e6b6579&#8221; = server.key<\/p>\n\n\n\n<p style=\"text-align:center\">Now we need to download the file, using the same PowerShell script as before. Also, we have our file! Now we have both server.crt and server.key!<br>\n<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"823\" height=\"501\" data-attachment-id=\"421\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture7-10\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7-9.png?fit=823%2C501&amp;ssl=1\" data-orig-size=\"823,501\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture7\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7-9.png?fit=700%2C426&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7-9.png?fit=700%2C426&amp;ssl=1\" alt=\"\" class=\"wp-image-421\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7-9.png?w=823&amp;ssl=1 823w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7-9.png?resize=300%2C183&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7-9.png?resize=768%2C468&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture7-9.png?resize=700%2C426&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">(Note: The keys may not work, this comes down to Windows formatting of text, if you&#8217;re having issues you can find the keys <a href=\"https:\/\/mega.nz\/#!dVxWnCSa!qar3aGdocDee6lM17AhM3-cfw0xcYC997R9GMQKG_gY\">here<\/a>).<\/p>\n\n\n\n<p style=\"text-align:center\">Now it&#8217;s time for the next hint to play this part, and that is to <a href=\"https:\/\/github.com\/chrisjd20\/power_dump \">download<\/a> Power Dump.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"762\" height=\"454\" data-attachment-id=\"422\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture8-10\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8-9.png?fit=762%2C454&amp;ssl=1\" data-orig-size=\"762,454\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture8\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8-9.png?fit=700%2C417&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8-9.png?fit=700%2C417&amp;ssl=1\" alt=\"\" class=\"wp-image-422\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8-9.png?w=762&amp;ssl=1 762w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8-9.png?resize=300%2C179&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture8-9.png?resize=700%2C417&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\"> Also, don&#8217;t forget we need &#8220;Powershell.exe_181109_104716.dmp&#8221;, which we can get from the first <a href=\"https:\/\/www.holidayhackchallenge.com\/2018\/challenges\/forensic_artifacts.zip\">URL.<\/a><\/p>\n\n\n\n<p style=\"text-align:center\">Even if we try to open &#8220;Powershell.exe_181109_104716.dmp&#8221; were meet with lot&#8217;s of Garbish, so we need to decrypt it! <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"762\" height=\"484\" data-attachment-id=\"423\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture9-7\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture9-6.png?fit=762%2C484&amp;ssl=1\" data-orig-size=\"762,484\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture9\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture9-6.png?fit=700%2C445&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture9-6.png?fit=700%2C445&amp;ssl=1\" alt=\"\" class=\"wp-image-423\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture9-6.png?w=762&amp;ssl=1 762w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture9-6.png?resize=300%2C191&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture9-6.png?resize=700%2C445&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Power Dump comes into play, let&#8217;s load it up and get ready to do some Power Dumps.<br> First, let&#8217;s load up the script with this command &#8220;.\/power_dump.py<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"373\" height=\"613\" data-attachment-id=\"424\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture10-7\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture10-6.png?fit=373%2C613&amp;ssl=1\" data-orig-size=\"373,613\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture10\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture10-6.png?fit=373%2C613&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture10-6.png?resize=373%2C613&#038;ssl=1\" alt=\"\" class=\"wp-image-424\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture10-6.png?w=373&amp;ssl=1 373w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture10-6.png?resize=183%2C300&amp;ssl=1 183w\" sizes=\"auto, (max-width: 373px) 100vw, 373px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Next, we want to load the PowerShell Memory Dump File by using &#8220;1&#8221;.<br>\nIt now asks us where the file is if the file is in the same directory as power_dump.py then you can do &#8220;ld Powershell.exe_181109_104716.dmp&#8221; If it&#8217;s in another folder, you need to point it to the full path.<br>\nOnce the file loaded, do &#8220;B&#8221; to go back to the menu.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"433\" height=\"853\" data-attachment-id=\"425\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture11-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture11-4.png?fit=433%2C853&amp;ssl=1\" data-orig-size=\"433,853\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture11\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture11-4.png?fit=433%2C853&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture11-4.png?resize=433%2C853&#038;ssl=1\" alt=\"\" class=\"wp-image-425\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture11-4.png?w=433&amp;ssl=1 433w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture11-4.png?resize=152%2C300&amp;ssl=1 152w\" sizes=\"auto, (max-width: 433px) 100vw, 433px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Great now our file is loaded, but not been processed yet, we want &#8220;2&#8221; Process PowerShell Memory Dump\u2026 So we wait<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"802\" height=\"956\" data-attachment-id=\"426\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture12-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture12-4.png?fit=802%2C956&amp;ssl=1\" data-orig-size=\"802,956\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture12\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture12-4.png?fit=700%2C834&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture12-4.png?fit=700%2C834&amp;ssl=1\" alt=\"\" class=\"wp-image-426\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture12-4.png?w=802&amp;ssl=1 802w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture12-4.png?resize=252%2C300&amp;ssl=1 252w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture12-4.png?resize=768%2C915&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture12-4.png?resize=700%2C834&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Now that&#8217;s done, let&#8217;s dump the stored PS Variables by using &#8220;4&#8221; and using this command &#8220;dump all&#8221;, now we have everything dumped into &#8220;variable_values.txt.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"784\" height=\"804\" data-attachment-id=\"427\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture13-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture13-4.png?fit=784%2C804&amp;ssl=1\" data-orig-size=\"784,804\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture13\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture13-4.png?fit=700%2C718&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture13-4.png?fit=700%2C718&amp;ssl=1\" alt=\"\" class=\"wp-image-427\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture13-4.png?w=784&amp;ssl=1 784w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture13-4.png?resize=293%2C300&amp;ssl=1 293w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture13-4.png?resize=768%2C788&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture13-4.png?resize=700%2C718&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Nothing left to do now, but to look through the text file and find something that we need, and yes there is much text here. Much text! However, we&#8217;re looking for some decrypt key so let&#8217;s look for keywords here &#8220;decrypt&#8221;, &#8220;key&#8221; and so on, and we find this <a href=\"https:\/\/pastebin.com\/raw\/SWZg3jQx\">long string<\/a>! <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1803\" height=\"432\" data-attachment-id=\"428\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture14-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?fit=1803%2C432&amp;ssl=1\" data-orig-size=\"1803,432\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture14\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?fit=700%2C168&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?fit=700%2C168&amp;ssl=1\" alt=\"\" class=\"wp-image-428\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?w=1803&amp;ssl=1 1803w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?resize=300%2C72&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?resize=768%2C184&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?resize=700%2C168&amp;ssl=1 700w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture14-4.png?w=1400&amp;ssl=1 1400w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"951\" height=\"78\" data-attachment-id=\"429\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture15-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture15-4.png?fit=951%2C78&amp;ssl=1\" data-orig-size=\"951,78\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture15\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture15-4.png?fit=700%2C57&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture15-4.png?fit=700%2C57&amp;ssl=1\" alt=\"\" class=\"wp-image-429\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture15-4.png?w=951&amp;ssl=1 951w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture15-4.png?resize=300%2C25&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture15-4.png?resize=768%2C63&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture15-4.png?resize=700%2C57&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">We have what we need here; now we need to decrypt it, and get closer to unlocking the vault!<br>\n\u2026. Now how are we going to decrypt this? Simple! We use the same Wannacookie PowerShell script (the one that encrypted files) to decrypt the files.<\/p>\n\n\n\n<p style=\"text-align:center\">Before we do any decrypting, we first need to create a <a href=\"https:\/\/www.sslmarket.co.uk\/ssl\/help-how-to-create-a-pfx-file\/\">server.pfx<\/a> file we can use OpenSSL for this and this command. <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>openssl pkcs12 -export -in server.crt -inkey server.key -out server.pfx -passout pass:topsecret<\/code><\/pre>\n\n\n\n<p style=\"text-align:center\">(Make sure you have the .key and .crt in the same folder), we should now have a server.pfx file, that&#8217;s all we needed.<\/p>\n\n\n\n<p style=\"text-align:center\">You already know we can take parts from wannacookie PowerShell and re-use them, in this case, I have created a small and simple python 3 <a href=\"https:\/\/github.com\/MrJSec\/Unlocker-for-alabaster_passwords\/tree\/master\">script<\/a> (You don&#8217;t need the server files here, only this script and alabaster_passwords.elfdb.wannacookie. The script handles the rest!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"301\" height=\"907\" data-attachment-id=\"430\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture16-4\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture16-3.png?fit=301%2C907&amp;ssl=1\" data-orig-size=\"301,907\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture16\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture16-3.png?fit=301%2C907&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture16-3.png?resize=301%2C907&#038;ssl=1\" alt=\"\" class=\"wp-image-430\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture16-3.png?w=301&amp;ssl=1 301w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture16-3.png?resize=100%2C300&amp;ssl=1 100w\" sizes=\"auto, (max-width: 301px) 100vw, 301px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Moreover, the python decrypter <a href=\"https:\/\/github.com\/MrJSec\/Unlocker-for-alabaster_passwords\/tree\/master\">script<\/a> works a charm!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"961\" height=\"213\" data-attachment-id=\"432\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture17-4\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture17-3.png?fit=961%2C213&amp;ssl=1\" data-orig-size=\"961,213\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture17\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture17-3.png?fit=700%2C155&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture17-3.png?fit=700%2C155&amp;ssl=1\" alt=\"\" class=\"wp-image-432\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture17-3.png?w=961&amp;ssl=1 961w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture17-3.png?resize=300%2C66&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture17-3.png?resize=768%2C170&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture17-3.png?resize=700%2C155&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Now we have two files; one file is encrypted &#8220;TIM image&#8221; and the other file decrypted which is a &#8220;SQLite.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"238\" data-attachment-id=\"433\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture18-4\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture18-3.png?fit=768%2C238&amp;ssl=1\" data-orig-size=\"768,238\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture18\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture18-3.png?fit=700%2C217&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture18-3.png?fit=700%2C217&amp;ssl=1\" alt=\"\" class=\"wp-image-433\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture18-3.png?w=768&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture18-3.png?resize=300%2C93&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture18-3.png?resize=700%2C217&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">The decrypted file is SQLite, and  you remember from &#8220;<a href=\"https:\/\/mrjsec.co.uk\/blog\/pepper-minstix-yule-log-analysis\/\">Pepper Minstix<\/a> &#8211; Yule Log Analysis&#8221; we could just dump all, but we only need the passwords so that we can shorten the <a href=\"https:\/\/www.youtube.com\/watch?v=NYlCVoj4peg\">command<\/a> needed and doing: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sqlite3 alabaster_passwords.elfdb 'select password,usedfor from passwords'<\/code><\/pre>\n\n\n\n<p style=\"text-align:center\">Moreover, we got the password! &#8220;ED#ED#EED#EF#G#F#G#ABA#BA#B&#8221;\u2026. I wonder if this opens the piano door?<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"783\" height=\"291\" data-attachment-id=\"434\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/capture19-3\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture19-2.png?fit=783%2C291&amp;ssl=1\" data-orig-size=\"783,291\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture19\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture19-2.png?fit=700%2C260&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture19-2.png?fit=700%2C260&amp;ssl=1\" alt=\"\" class=\"wp-image-434\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture19-2.png?w=783&amp;ssl=1 783w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture19-2.png?resize=300%2C111&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture19-2.png?resize=768%2C285&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture19-2.png?resize=700%2C260&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"885\" height=\"123\" data-attachment-id=\"435\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/notepad\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/notepad.png?fit=885%2C123&amp;ssl=1\" data-orig-size=\"885,123\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"notepad++\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/notepad.png?fit=700%2C97&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/notepad.png?fit=700%2C97&amp;ssl=1\" alt=\"\" class=\"wp-image-435\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/notepad.png?w=885&amp;ssl=1 885w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/notepad.png?resize=300%2C42&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/notepad.png?resize=768%2C107&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/notepad.png?resize=700%2C97&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><figcaption>(You can also open the file in Notepad++ if you choose too)<\/figcaption><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"487\" height=\"132\" data-attachment-id=\"437\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-4-recover-alabasters-password\/captureend20\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Captureend20.png?fit=487%2C132&amp;ssl=1\" data-orig-size=\"487,132\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Captureend20\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Captureend20.png?fit=487%2C132&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Captureend20.png?resize=487%2C132&#038;ssl=1\" alt=\"\" class=\"wp-image-437\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Captureend20.png?w=487&amp;ssl=1 487w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Captureend20.png?resize=300%2C81&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Captureend20.png?resize=482%2C132&amp;ssl=1 482w\" sizes=\"auto, (max-width: 487px) 100vw, 487px\" \/><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Objective 9.4, the last one, it won&#8217;t be the easy one. Well, let&#8217;s get on! We need to Recover Alabaster&#8217;s password as found in the encrypted password vault (https:\/\/www.holidayhackchallenge.com\/2018\/challenges\/forensic_artifacts.zip) If we speak to Alabaster Snowball,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[10],"tags":[13,14,12],"class_list":["post-415","post","type-post","status-publish","format-standard","hentry","category-kringlecon-2018","tag-13","tag-ctf","tag-kringlecon"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paD3U6-6H","_links":{"self":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=415"}],"version-history":[{"count":4,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/415\/revisions"}],"predecessor-version":[{"id":472,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/415\/revisions\/472"}],"wp:attachment":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}