2023 HuntressCTF - Wimble
2023-11-01

Summary
Author: @JohnHammond
"Gretchen, stop trying to make fetch happen! It's not going to happen!" - Regina George, Mean Girls
Steps
I downloaded wimble.7z to my Kali VM and executed 7za e wimble.7z
. I was presented with a file called fetch. I executed file fetch
and was given this result: fetch: Windows imaging (WIM) image v1.13, XPRESS compressed, reparse point fixup
. I researched mounting .wim files on Linux and found wimmount
from wimtools
will mount the fetch file. I created a new folder called ./mount
and ran this command the mount the file: wimmount fetch ./mount
. Next, I looked in the ./mount/ directory and discovered 276 .pf files.
At this point, I decoded to move to Windows and see if I can use Eric Zimmerman’s PECmd Tool. Since I already mounted the files on Linux, I decided to copy and paste the .pf files over to Windows.
I used PECmd.exe to scan the direcotry where I put the prefetch files.
.\PECmd.exe -d "C:\Users\User\Downloads\wimble\mount" > results.txt
Instead of manually looking through the files, I wanted to see if the flag was in plaintext.
$flag = Get-Content .\results.txt
$flag | Select-String "flag"
Running this command, I discovered the Flag: FLAG{97F33C9783C21DF85D79D613B0B258BD}