Description

Frank has never been a “tech person”. He reuses passwords, is too lazy to type, the whole nine yards. And it’s just not tech, he’s blind as a bat and about as sharp as a round ball too. I mean, he doesn’t even know about the shortcut to paddys. Help his son Dennis sift through this memory dump and reconstruct the flag Note: Use the Win7SP1x64 profile to analyse the dump. All relevant files for this challenge are only present in the C drive and in no other drive Memory Dump

Writeup

First lets list the process and its tree

Pslist

Pstree

If you observe closely many notepad.exe were being executed. To know what the user was doing with notepad let’s check cmdline

Cmdline

Okay, some files under Minesweeper directory was being edited. Let’s check if the user has something in clipboard.

Clipboard

so we have the following link Now we have the first part of the flag 1/3 p_ctf{v0l4t1l1ty

Revisiting the Cmdline

In the screenshot there was a process which was used to extract file. Let’s get the rar file

File Scan

Dump file and Extract Attempt

It is password protected. 🤔 Hmm, yea description says the user is habitual to password reuse. Let’s dump is login password. NTLM Hashes

Dump NTLM Hashes

Following hashes were dumped. Now let’s crack it using crackstation NTLM hash structure: uid:rid:lmhash:nthash

Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Frank Reynolds:1000:aad3b435b51404eeaad3b435b51404ee:a88d1e18706d3aa676e01e5943d15911:::
HomeGroupUser$:1002:aad3b435b51404eeaad3b435b51404ee:af10ecac6ea817d2bb56e3e5c33ce1cd:::
Dennis:1003:aad3b435b51404eeaad3b435b51404ee:cf96684bbc7877920adaa9663698bf54:::

If you notice properly LMHASH begins with aad3 which means it is empty. So we can use NTHASH to crack the password. and now we found the password to be trolltroll

Extracting RAR file

Let’s extract the RAR compressed file.

We now have part 2/3 of the flag.

Revisiting the description

We are given with the clue paddys. Let’s do a file scan for paddys.

File scan paddys

Dump file and analyze paddys.lnk

If you have noticed it was lnk for sysinfo.txt, which we found earlier in cmdline.

Dump sysinfo.txt

Unfortuantely, memory is volatile. We can’t say for sure which file resides on memory dump. I assume it was deleted or not paged. Let’s try to carve the file data from notepad’s memdump as mentioned by andrea fortuna

Memdump notepad.exe

Let’s dump the process id 3016. Which was working on sysinfo.txt.

Now we have the 3/3 of the flag. Final flag: p_ctf{v0l4t1l1ty_i5_v3ry_h4ndy_at_dump5_iasip}