Suninatas Game 32
challenges
Game 32
Challenge summary:
- A USB image is malformed and not recognized by normal tools.
Q1: modified timestamp of the file containing the next terror plan (UTC+9)Q2: next target place- Final:
lowercase(md5(YYYY-MM-DD_HH:MM:SS_place))
Given artifact:
1 | $ file 'USB_Image(SuNiNaTaS)' |
1) Why the image fails
Sleuth Kit initially fails:
1 | $ fsstat -f fat32 USB_Image\(SuNiNaTaS\) |
Hex inspection shows FAT32 signatures (RRaA) shifted
because bytes were inserted before the boot-sector end marker
(0x55aa).
2) Repair the FAT32 boot area
I fixed the image in a hex editor (imhex) by aligning
the boot sector so 0x55aa is at offset
0x1fe-0x1ff.
After repair:
1 | $ fsstat -f fat32 USB_Image\(SuNiNaTaS\) |
3) Enumerate files and find the plan document
1 | $ fls -r -p USB_Image\(SuNiNaTaS\) | grep -v Orphan |
The DOS short name 2^^^^~1.HWP corresponds to
2차 테러 계획.hwp (“2nd terror plan”).
Extract and inspect metadata:
1 | $ icat USB_Image\(SuNiNaTaS\) 11 > tero.hwp |
Challenge asks for UTC+9 formatted as
YYYY-MM-DD_HH:MM:SS, and the solved value used is:
1 | 2016-05-30_11:44:02 |
4) Read document content for location
Open tero.hwp with an HWP-compatible viewer (e.g.,
Hancom/ONLYOFFICE).
Recovered content:
1 | 2차 테러 계획 |
Q2 answer:
1 | Rose Park |
Final Auth Key
Input string:
1 | 2016-05-30_11:44:02_Rose Park |
Result:
8ce84f2f0568e3c70665167d44e53c2a