Wargame/CTF

FwordCTF 2020 - Memory 2 (Forensics)

마띠(쥔장) 2020. 8. 31. 13:19

The analysis will be conducted on the given 'foren.raw' file in the previous step.

We already know OS information (imageinfo), so let's check the list of processes through 'pslist'.

.\volatility_2.6_win64_standalone.exe -f foren.raw --profile=Win7SP1x64 pslist

The problem texts "had a secret association" and "on Internet" give us a hint to analyze "chrome."

We will run 'yarascan' through the PID of the 'chrome.exe' in 'pslist', also we will search for strings that contain flag format together.

-Y option: string "FwordCTF{"

-p option: PID of 'chrom.exe'

.\volatility_2.6_win64_standalone.exe -f foren.raw --profile=Win7SP1x64 yarascan -Y "FwordCTF{" -p 3700,3752,2560,3304,3304,3528,616,540,3816,2516,3992

Then you can see the flag.

flag: FwordCTF{top_secret_channel}

728x90

'Wargame > CTF' 카테고리의 다른 글

Affinity CTF Lite 2020_Forensics  (0) 2020.11.18
DUCTF 2020 Forensics (3)  (0) 2020.09.30
FwordCTF 2020 - Memory (Forensics)  (0) 2020.08.30
InCTF 2020 Forensics_Investigation Continues  (0) 2020.08.10
InCTF 2020 Forensics_LOGarithm  (0) 2020.08.09