Forensics Category
3 min read
<aside>
đź“– Challenge content : Forensics.img , memory.raw
</aside>
┌──(rudrakshacker㉿kali)-[~/Downloads/CSAW]
└─$ file forensic.img
forensic.img: LUKS encrypted file, ver 1 [aes, ecb, sha1] UUID: 61478c6d-b04e-4f1a-aff6-b4bb3a29cfbe
┌──(rudrakshacker㉿kali)-[~/Downloads/CSAW]
└─$ mv forensic.img forensic.luks
┌──(rudrakshacker㉿kali)-[~/Downloads/CSAW]
└─$ file memory.raw
memory.raw: data
┌──(rudrakshacker㉿kali)-[~/Downloads/CSAW]
└─$ hexdump -C forensic.img| head
00000000 4c 55 4b 53 ba be 00 01 61 65 73 00 00 00 00 00 |LUKS....aes.....|
00000010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000020 00 00 00 00 00 00 00 00 65 63 62 00 00 00 00 00 |........ecb.....|
00000030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000040 00 00 00 00 00 00 00 00 73 68 61 31 00 00 00 00 |........sha1....|
00000050 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000060 00 00 00 00 00 00 00 00 00 00 08 00 00 00 00 10 |................|
00000070 a0 0c 4d c4 4a 53 5c 00 0c c3 33 63 13 5b 2c 41 |..M.JS\\...3c.[,A|
00000080 8e a3 3f a9 5e 84 10 01 a8 19 06 22 6a 7b 1b df |..?.^......"j{..|
00000090 35 73 46 8e 0e 7e f4 68 b0 97 38 81 cf 6d 99 7c |5sF..~.h..8..m.||
According to Wikipedia, the Linux Unified Key Setup (LUKS) is **a disk encryption specification created by Clemens Fruhwirth in 2004 and was originally intended for Linux** . LUKS uses a device-mapper crypt ( dm-crypt ) as a kernel module to handle encryption on the block device level.
Now, the encryption key's location We need the key now that we have the encrypted file container. Lucky for us, there is a memory dump. The raw encryption key will be present when memory is dumped and an encrypted file container is mounted at the same time.
**I'll be honest: I have no idea where the memory's encryption keys are stored. I could try to investigate this image using volatility or another memory analysis program, but I lack the expertise to accomplish that quickly.
I decided to employ a programme named bulk extractor**(http://digitalcorpora.org/downloads/bulk_extractor/). This is because AES keys from a file are one of the artefacts that bulk extractor may extract.