Information
Room#
- Name: Advent of Cyber '23 Side Quest
- Profile: tryhackme.com
- Difficulty: Info
- Description: Explore a series of advanced challenges alongside the core Advent of Cyber event!
This is the steps to find the key for entering the Advent of Cyber '23 Side Quests (advanced bonus challenges alongside Advent of Cyber 2023).
Write-up
Introduction#
What Is the Advent of Cyber Side Quest?#
The Advent of Cyber 2023 is an annual event hosted by TryHackMe in December. It's like an advent calendar but with exciting security challenges instead of chocolates! If you are unfamiliar with the event but you want to participate, join this room. While Advent of Cyber is a fully guided event accessible to users of all skill levels in cyber security, we wanted to prepare something extra for more advanced participants. That's how the Side Quest came to be!
The Advent of Cyber 2023 Side Quest is a series of four connected challenges in which you'll play as the Bandit Yeti. Your goal will be to get a foothold into the Best Festival Company. These challenges will have no additional guidance and will range between "Hard" and "Insane" difficulty levels. Please note that completing the Side Quest is entirely optional; you don't need to do it to enjoy the main Advent of Cyber 2023 event.
How To Find Side Quest Challenges#
The challenges are located in secret, unpublished rooms, and to find them, you need to search for keys in the main Advent of Cyber event, the event room, and some of our most recent social media posts. The keys are QR codes, leading you to secret challenge rooms.
Getting the keys will not be easy: you will have to dig around and even solve some puzzles to find them. We will leave some breadcrumbs to get you started, but you're on your own after that!
First Side Quest Challenge Key#
This key is divided into four parts. Three will be posted on our social media channels between Tuesday, 28th November and Thursday, 30th November. The final part of the key will be posted in this room, on December 1st, 4 pm GMT. Find them all, put them together, and uncover the link to the first secret challenge! All the links to our social media channels can be found in Task 3 of the main Advent of Cyber room.
The four pieces of QR code grabbed on the social medias:
- Piece 1 - TryHackMe Advent of Cyber '23 Side Quest room - Task 5 - https://assets.tryhackme.com/additional/aoc2023/6d156/50af2.png
- Piece 2 - Discord - https://discord.com/channels/521382216299839518/1176552309707264041/1179095411420577943 - https://assets.tryhackme.com/additional/aoc2023/b3620/e94fa.png
- Piece 3 - Linkedin - https://www.linkedin.com/posts/tryhackme_can-you-help-elf-mcskidy-and-her-team-tackle-activity-7135598321280188416-5wnQ - https://hubs.la/Q02bklp30 (https://assets.tryhackme.com/additional/aoc2023/5d60a/809cd.png)
- Piece 4 - Twitter - https://twitter.com/RealTryHackMe/status/1730184898365767880 - https://hubs.la/Q02btlld0 (https://assets.tryhackme.com/additional/aoc2023/2f7f8/0f93a.png)
So assembling the pieces we get this message:
Well done! You found all of the clues. The secret code is:
The hardest piece to find was the n°2 because it was not link in an announcement on discord or something but randomly paste in the channel #aoc-2023-side-quest
. It was pinned in the channel, but I didn't think about that, I found it by searching for https://assets.tryhackme.com/additional/aoc2023/
since the other links had all the same base.
Side Quest Challenge 1 - The Return of the Yeti#
The Return of the Yeti - Write-up - TryHackMe
Second Side Quest Challenge Key#
This key will be hidden in one of the challenges of the main Advent of Cyber event between Day 2 and Day 8. Look for clues to find out which challenge to dig into!
On day 6, there is this last "question" giving a hint:
Van Jolly still thinks the Ghost of Christmas Past is in the game. She says she has seen it with her own eyes! She thinks the Ghost is hiding in a glitch, whatever that means. What could she have seen?
If we take a look at the source code view-source:http://10-10-141-183.p.thmlabs.com/
, we can see a JS script is sourced: <script src="index.js"></script>
.
http://10-10-141-183.p.thmlabs.com/index.js (I won't paste it here, it's huge)
The script is minified so let's prettify it with whatever you want (I used VSCode plugin prettier).
We can see the script is loading additional data:
index.data.gz
index.wasm.gz
But we could see that in the network tab of the dev console as well without opening index.js.
We can try to extract the data.
A virtual file system is created from the data file:
Then, there is a function mapping which file is at which index in the blob.
We could have used binwalk index.data
, but that would have been a black box approach. By reading the code we can go straight to the point.
As we are looking for a QR code, so qr.map
looks nice to us.
We can extract the qr.map file with dd:
It's a text file full of -1
, 50
, 30
, 0
.
The image will be 79x144, (number of item per lines and number of lines) or maybe two images of 79x72 (because there is a blank line).
Let's put that back to a PNG with PixelChart.
The idea is that 0 and -1 are garbage, that 50 is a black pixel and 30 a white pixel. I achieve that with a quick Ruby script:
Or for those who prefer CLI-fu one-liners:
Then I used QtQr to read the QR code from the file: https://tryhackme.com/room/armageddon2r
I think there was another way to solve this by doing some reverse engineering on the WASM binary to find a backdoor in the game.
Side Quest Challenge 2 - Snowy ARMageddon#
Snowy ARMageddon - Write-up - TryHackMe
Third Side Quest Challenge Key#
This key will be hidden in one of the challenges of the main Advent of Cyber event between Day 9 and Day 16. Look for clues to find out which challenge to dig into!
On day 11, there is this last "question" giving a hint:
Van Sprinkles left some stuff around the DC. It's like a secret message waiting to be unravelled!
That's not really in the AD, but where the flag is stored, there are extra chat logs.
We can easily download them within our evil-winrm
session.
In the conversation, there was a screenshot leaking a key, but it was deleted, however there was a new cropped screenshot made with Microsoft Windows Snip & Sketch tool.
We can see extra data is appended to the file.
Indeed, Snip & Sketch is vulnerable to acropalypse vulnerability.
See references:
- The Verge - Oops, Windows’ screenshot tool may be saving stuff you cropped out, too
- Tenable - Windows Snip & Sketch/ Snipping Tool CVE-2023-28303 (Acropalypse)
- MSRC - Windows Snipping Tool Information Disclosure Vulnerability CVE-2023-28303
- CVE.org - CVE-2023-28303
- NVD - CVE-2023-28303
- Acropalypse Restoration and Detection Multi-Tool
Let's recover this with the GitHub tool mentioned above.
As we can see on the other full screen screenshot, the original resolution is 2560x1080.
We can then select the Custom RGBA
with the custom dimensions to recover the uncropped image.
There is a QR code on the original image.
Then I used QtQr to read the QR code from the file: https://tryhackme.com/jr/busyvimfrosteau.
Side Quest Challenge 3 - Frosteau Busy with Vim#
Frosteau Busy with Vim - Write-up - TryHackMe
Fourth Side Quest Challenge Key#
This key will be hidden in one of the challenges of the main Advent of Cyber event between Day 17 and Day 24. Look for clues to find out which challenge to dig into!
On day 20, there is this last "question" giving a hint:
Detective Frosteau believes it was an account takeover based on the activity. However, Tracy might have left some crumbs.
Once the original website is restored, the web app is available on port 9080 : http://10.10.235.255:9080/
On the day 20 of the calendar there is a QR code with the following content: https://tryhackme.com/jr/surfingyetiiscomingtotown
That's it.