MemLabs-logo

LabChallenge linkdifficultyWriteup link
Lab 1Beginner’s LuckEasyLab 1
Lab 2A New WorldEasyLab 2
Lab 3The Evil’s DenEasy - MediumLab 3
Lab 4ObsessionMediumLab 4
Lab 5Black TuesdayMedium - HardLab 5
Lab 6The ReckoningHardLab 6

Challenge description

We received this memory dump from the Intelligence Bureau Department. They say this evidence
might hold some secrets of the underworld gangster David Benjamin. This memory dump was taken 
from one of his workers whom the FBI busted earlier this week. Your job is to go through the memory 
dump and see if you can figure something out.FBI also says that David communicated with his
workers via the internet so that might be a good place to start.
  • Note: This challenge is composed of 1 flag split into 2 parts.
  • The flag format for this lab is: inctf{s0me_l33t_Str1ng}

Writeup

Part 1

it was Win7SP1x64 so i did pslist

./volatility.exe -f MemoryDump_Lab6.raw --profile=Win7SP1x64 pslist

Lab6-1

from the process list chrome.exe, firefox.exe and WinRAR.exe as active running processes.

so i used Volatilty plugins you can git it from github

volatility --plugins=/home/mmox/vplug -f MemoryDump_Lab6.raw --profile Win7SP1x64 chromehistory

Lab6-2

https://pastebin.com/RSGSi1hk

when i opend the link there was a google doc link

Lab6-3

https://www.google.com/url?q=https://docs.google.com/document/d/1lptcksPt1l_w7Y29V4o6vkEnHToAPqiCkgNNZfS9rCk/edit?usp%3Dsharing&sa=D&source=hangouts&ust=1566208765722000&usg=AFQjCNHXd6Ck6F22MNQEsxdZo21JayPKug

while going throw the doc i found a mega link

Lab6-4

 https://mega.nz/#!SrxQxYTQ

it was missing the decryption key in the pastebin link there was this text so But David sent the key in mail.

The key is... :(  

so i will try something stupid

strings MemoryDump_Lab6.raw |grep -i "The key is"

Lab6-5

I was not expected that actually but work smarter not harder by using the key

zyWxCjCYYSEMA-hZe552qWVXiPwa5TecODbjnsscMIU

i was able to download the flag_.png file but it wasn’t working so i checked the hex header

Lab6-6

really simple by replacing the “i” of “iHDR” with a captal “I” it worked

flag

and that was the first part :

infctf{thi5_cH4LL3Ng3_!s_g0nn4_b3_?_

Part 2

it was a really long way to get the first half now let’s get the second one

there was a winrar process running so we will check the files and grep RARs

./volatility.exe -f MemoryDump_Lab6.raw --profile Win7SP1x64 filescan |grep ".rar"

Lab6-7

there was a rar calld flag.rar so let’s dump it

./volatility.exe -f MemoryDump_Lab6.raw --profile Win7SP1x64 dumpfiles -Q 0x000000005fcfc4b0 -D .

Lab6-8

ops it’s password protected so i tried a lot to get the password using “cmdline”,“cmdscan”,“greping text files”, “greping images”,“consoles "

but finally i found it in envars

./volatility.exe -f MemoryDump_Lab6.raw --profile Win7SP1x64 envars

Lab6-9

easypeasyvirus

by using it i extracted flag2.png from the rar file

flag2

and that’s it the second half

aN_Am4zINg_!_i_gU3Ss???_} 

it was the hardest one but i got the flag :

infctf{thi5_cH4LL3Ng3_!s_g0nn4_b3_?_aN_Am4zINg_!_i_gU3Ss???_}