Project Cyan
05 April, 2018
On April 2nd 2018, Reddit launched its April Fools social experiment for the year: Circle of Trust. The game allows each account to create their own circle with a password. On gaining the password to another user’s circle, you can choose to join or betray. Betraying a circle destroys it, disabling any new members from joining. A score is kept and displayed for each user with the size of their circle and the number of unbetrayed circles they are in. If the user has ever betrayed a circle, their score is displayed in red.
Inevitably some users were going to place their password behind a CTF-style game, and this happened in the form of Project Cyan by user /u/CrypticBurrito. The website declares itself as a member of the “Zaffe Research Consortium”, a group of friends also responsible for a circle that involved calling a freephone ‘helpline’ number, which was very fun.
The frontpage of the website has a suspiciously hidden link which requires an HTTP basic auth username and password, as well as two items that look suspiciously like hashes. Inspecting the source reveals a third, longer one. Using CyberChef and the ‘Analyse Hash’ function, we can see that the smaller hashes are likely MD5, and longer seems to be SHA256. Using a hash cracking website, we get the following:
21232f297a57a5a743894a0e4a801fc3
MD5 : admin52532fca717f146b16e91fc3a96f843f
MD5 : projcya8271bb66dfb7999c3b533c5cdef9f4a477876dccd0fdd27b9f762f7951ac595
SHA256 : tetrahedral
The first two look like the username and password, and sure enough they are.
This brings us to a simple text page with a few links. To begin with, we have
two more hashes, each containing a sly link to a seperate login page. The first
goes to north/north.html
, and the second goes to windle/windle.html
. Next we
have a list of emails, and another password-protected link named
‘Office Directory’ to the page direc/list.html
.
Let’s begin to unpack this. The hashes crack to:
e0aed486f3d9a7bc0eb725a98532180c
MD5 : automatone29e13ac702a77bcd28a4463a211eba4
MD5 : helicopter
The emails are as follows:
- Email to Dr North
- Email to Dr North
- Email to IT Admin
- Email to IT Admin
- Email to Prof Windle
- Email to Prof Windle
- Email to Prof Windle
That last email gives us a lot to go off. If we go to the image from the first and look at it in hex editor, we indeed see at that the very bottom contains a password:
The username of office
seems to hint that these are the credentials for the
‘Office Directory’ at the bottom, and sure enough they are. Access to this page
gives us the following:
This is a British Columbia (Canada) phone number. This appears to be a dead end for now, since I can’t call this number as I am not in Canada. Continuing, we see that the main page as well as multiple emails mention the DNS records, specifically the TXT records., and how they could potentially be leaking sensitive information.
This gives us some useful information. The first login page is to
North’s page. We try the username north
, and the password
v07ri6572nnu
, and sure enough we get in. This gives another hash.
bd7fbdd6d4b03e6bce080d78fc575a22
MD5 : antibody
The second goes to Windle’s. The last email describes how he used a Caeser
shift on his verification code, which appears to be what we have from the DNS
record. Playing around with it in CyberChef, we see a shift of 25 (or -1) turns
usbjotubujpo
to trainstation
. This is not his password, however, and goes
not grant entry. Another email mentions that his password was sent to his phone.
We have a phone number, and what seems to be a code that could grant access.
Faced with having to call the number, I privately messaged the creator of the
circle, and he generously gave me the response.
The second login was thus username windle
, password 11218664344903273
. It
looks like we didn’t need the verification code after all. The page leads to a
link called ‘Your favourite song’, and links to xc_alpha.flac
. Looking at the
metadata we get the following:
- TITLE=unaudited
- ARTIST=nonimaginarily
Looking at the spectrogram of this file reveals the word sarmentum
. At this
point, we have exhausted all login forms and links, so it makes sense to test
the collection of words to see if one is the key. As a reminder, the remaining
words are:
- tetrahedral
- automaton
- helicopter
- antibody
- trainstation
- unaudited
- nonimaginarily
- sarmentum
The most obvious answer is that it is the one that took the most effort to get, and sure enough the key is ‘sarmentum’.