We found evidence of a password spray attack against the Domain Controller, and identified a suspicious RDP session. We'll provide you with our RDP logs and other files. Can you see what they were up to?

Information
Challenge: No Place To Hide
Category: Forensics
Difficulty: Easy
Files : ‘No Place To Hide.zip’
2.7 MB
– Cache0000.bin 18 MB
– bcache24.bmc 0
Environment: Remnux VM
My Recommendations
Download it from hackthebox and verify it with:
sha256sum /path/to/'No Place To Hide.zip'SHA256SUM: db0866a21a3135e977d466163505667e57dd01fd1a1ffd281aba59a4abf16332
Walkthrough
1. File Analysis
The file is a BMC cache file. Luckily,a tool exists to parse it.
curl -O https://raw.githubusercontent.com/ANSSI-FR/bmc-tools/master/bmc-tools.py
mkdir output
python3 bmc-tools.py -s Cache0000.bin -d output -b
Then, we just need to find and open the biggest .bmp file in the output directory, which is Cache0000.bin_collage.bmp.
and here, we can see a portion of the flag!