Writeup by totoiste for Layer Cake 2/3

intro forensics docker

June 30, 2024

To solve this one, you need to install docker on your side.

Then, to inspect files in image (linux commands):

$ docker save anssi/fcsc2024-forensics-layer-cake-2 > layercake2.tar
$ mkdir layercake2
$ tar xvf layercake2.tar -C layercake2

You should have these:

$ ls -la layercake2
drwxr-xr-x  5 totoiste totoiste 4096 Jun 30 19:39 .
drwx------ 10 totoiste totoiste 4096 Jun 30 19:40 ..
-rw-r--r--  1 totoiste totoiste 1471 Mar 25 10:05 03014d9fc4801b1810b112fd53e05e35ea127e55c82d1304b5622cfe257c0ad8.json
drwxr-xr-x  2 totoiste totoiste 4096 Mar 25 10:05 84735535b8f006a23870482d13039fa74fc009506abd064f7d3e207b334265ad
drwxr-xr-x  2 totoiste totoiste 4096 Mar 25 10:05 ab84cac537173dda17abe9ec841571b290e31f60b81f5622558b9dc85f9a1ae9
drwxr-xr-x  2 totoiste totoiste 4096 Mar 25 10:05 e6d55b6d9408ba898bc99e370536259f5baa6cfbc0963313689eca342c17ed31
-rw-r--r--  1 totoiste totoiste  387 Jan  1  1970 manifest.json
-rw-r--r--  1 totoiste totoiste  120 Jan  1  1970 repositories

In image layers details we can see that there is a file named secret.

In each directory, there is a tar file named layer.tar, so before to search secret file, we have to untar these.

$ find layercake2 -name "*.tar" -exec tar -xvf {} \;
$ find layercake2 -name "secret" -ls
  4602582      4 -r--------   1 totoiste totoiste       71 Mar 25 10:05 ./tmp/secret
$ cat layercake2/tmp/secret
[REDACTED]