HackTheBox Pursue the Tracks Writeup
Explore the basics of cybersecurity in the Pursue the Tracks Challenge on Hack The Box. This easy-level Challenge introduces encryption reversal and file handling concepts in a clear and accessible way, perfect for beginners.
https://app.hackthebox.com/challenges/676
Description
Luxx, leader of The Phreaks, immerses himself in the depths of his computer, tirelessly pursuing the secrets of a file he obtained accessing an opposing faction member’s workstation. With unwavering determination, he scours through data, putting together fragments of information trying to take some advantage on other factions. To get the flag, you need to answer the questions from the docker instance.
Solutions
1
mft2csv z.mft
Set the output path and analyze the resulting CSV file.
Files are related to two years, which are those? (for example: 1993,1995)
2023,2024
There are some documents, which is the name of the first file written? (for example: randomname.pdf)
Final_Annual_Report.xlsx
Which file was deleted? (for example: randomname.pdf)
Marketing_Plan.xlsx
How many of them have been set in Hidden mode? (for example: 43)
1
Which is the filename of the important TXT file that was created? (for example: randomname.txt)
credentials.txt
A file was also copied, which is the new filename? (for example: randomname.pdf)
Financial_Statement_draft.xlsx
Which file was modified after creation? (for example: randomname.pdf)
Project_Proposal.pdf
What is the name of the file located at record number 45? (for example: randomname.pdf)
Annual_Report.xlsx
What is the size of the file located at record number 40? (for example: 1337)
57344
Summary
The Pursue the Tracks Challenge on Hack The Box is an introductory-level forensic challenge where participants analyze a CSV file from an MFT dump to trace file activities and uncover secrets. Key tasks include identifying document-related years (2023, 2024), determining file actions such as the first file written (Final_Annual_Report.xlsx), deletions (Marketing_Plan.xlsx), and modifications (Project_Proposal.pdf). This challenge provides a practical experience in digital forensics, emphasizing file system analysis and the investigative processes essential in cybersecurity.