Second job interview
root-me challenge: After passing the first interview with flying colors you are now called in again. You’ve got to analyse a new file.
What?
┌──(kali㉿kali)-[~/Downloads/root-me/forensic/interview2]
└─$ file forensic.E01
forensic.E01: EWF/Expert Witness/EnCase image file format
┌──(kali㉿kali)-[~/Downloads/root-me/forensic/interview2]
└─$ ewfinfo forensic.E01
ewfinfo 20140813
Acquiry information
Case number: 2
Description: Root-me Challenge - Level : Forensic of course !!!
Examiner name: makhno - IT forensic investigator
Evidence number: 1
Notes: A Microsoft encryption ... ;-)
Acquisition date: Sat Jul 2 17:27:33 2016
System date: Sat Jul 2 17:27:33 2016
Operating system used: Linux
Software version used: 20140608
Password: N/A
EWF information
File format: EnCase 6
Sectors per chunk: 64
Error granularity: 64
Compression method: deflate
Compression level: best compression
Set identifier: 2c3d379a-f2df-8b49-b866-6ff5817fe4a2
Media information
Media type: fixed disk
Is physical: yes
Bytes per sector: 512
Number of sectors: 1202180
Media size: 587 MiB (615516160 bytes)
Digest hash information
MD5: 9f6a0da4d8658c0980d97627be8f6eb9
Extract the FVEK from the memory dump using the bitlocker plugin for volatility (or another tool).
Cipher : AES-128
FVEK : e7e576581fe26aa7c71a7e711c778da2
TWEAK : b72f4e075edb7e734dfb08638cf29652
And mount with bdemount
.