2020 EUROPEAN CYBER SECURITY CHALLENGE

3-7 November 2020

Vienna, Austria

OSINT

How difficult did you find this challenge?

1 2 3 4 5
Easy Hard
Event ECSC2019
Tags OSINT
Difficulty
Medium
Additional Info
Description

As a security researcher, you received a hint that sensitive data, like administrator pass, is being exposed over the internet from a restaurant’s website. Sadly, the message has been damaged, only a picture could be recovered(Map.gif). Use OSINT tools and tactics to find which website it was and see if you can truly find the possible administrator password and notify the owner of the website. Warning! This is a drill with live, operational environment. Only passive reconnaissance is allowed, no active scanning or brute forcing shall be applied. All legal consequences of breaking this rule is the responsibility of those conducting it

Write-ups
Other artefacts
Tasks

Task 1: What is the originating website?
Task 2: What is the possible administrator password?
Task 3: How is it possible to obtain information from OSINT methods?
Task 4: What are the google dorks to be used to uncover relevant information?
Task 5: Can you use the obtained password to further investigate the problem?
Task 6: Where is the administrator password located? (In the _vti_private folder, service.pwd file)
Task 7: What functionality allows the attacker to simply uncover the administrator password?
Task 8: How could you possibly remediate this issue?