WinjaCTF at c0c0n : I developed an easy challenge - called “Anonymous” - the challenge was based upon browser forensics.
Intended Way - Download the zip > Extract it > Navigate the Linux directory structure > To find a directory called
.config > google-chrome > Default > Open the History File in SQL Browser > Search for URLs and upon up the URL to get a file with the name - formatted like flag.
Un-Intended Ways - Too Many 😂
Download the ZIP and from the description it is obvious that it’s a forensics challenge.
/home/crazy_crocodile/.config/google-chrome/Default/ and Open the “History” file in SQLite Browser.
.config/google-chrome/Default/contains all the chrome relatead artifacts
Click on the Browse Data Tab > Change the Table Dropdown to urls
Get the Drive URL or See the
Filter tab to get the file name.
Thanks for playing Winja CTF 2020!