Post

Sending Mixed Signals

Sending Mixed Signals

Description

Author: @Jstith

Turns out the Houthi PC Small Group was only the tip of the iceberg…

REMINDER: Brute force guessing is NOT permitted.

Press the Start button begin this challenge.

OSINT Time

Here is what we got after strating and accessing the webpage: home-mixed-signals

Part 1

Find the hard-coded credential in the application used to encrypt log files. (format jUStHEdATA, no quotes)

So we did some research online looking for Find the hard-coded credential in the application used to encrypt log files signal app scandal We found this link1 for the first answer which was the following key as shown in the picture, we found the repository and went there for more enumeration2 log-file Here is the hard-coded credential in the application used to encrypt log files:

1
enRR8UVVywXYbFkqU#QDPRkO

Part 2

Find the email address of the developer who added the hard-coded credential from question one to the code base (format name@email.site)

Now we can go further and look for the email account of the developer wjp added the hard-coded credentials from question one to the code base. For that we kept reading the article and found the following line: disclosure-emails.png Then we had to clone the repo in order to see who did what:

1
git clone https://github.com/micahflee/TM-SGNL-Android

So we needed the commit hash in order to disclose that info, we got it the website here3 as shown below: commit-hash.png Then we can run the following command, since we have a huge repository we need to specify the string in which we want to search for:

1
git log -S "enRR8UVVywXYbFkqU#QDPRkO"

Here is what we got: commit-hash

We found the correct email:

1
moti@telemessage.com

Part 3

Find the first published version of the application that contained the hard-coded credential from question one (case sensitive, format Word_#.#.#……).

We ran:

1
git log -S "enRR8UVVywXYbFkqU#QDPRkO" --oneline

And got: release Adding this we got the last answer correct: flag Got the flag and solved the challenge.

Flag

flag{96143e18131e48f4c937719992b742d7}

References

  1. https://micahflee.com/heres-the-source-code-for-the-unofficial-signal-app-used-by-trump-officials/ 

  2. https://github.com/micahflee/TM-SGNL-Android/commit/05665a465a21c61529b76868edb7032c3ed81374 

  3. https://github.com/micahflee/TM-SGNL-Android/commit/05665a465a21c61529b76868edb7032c3ed81374 

This post is licensed under CC BY 4.0 by the author.