KnightCTF 2024 mem challenges

mem dump Download Link : https://drive.google.com/file/d/1-NCGNf8dBIu2LuA3Rl6BWlx2QBp0hmdW/view

Challenge 1 OS :

to view OS related informations we are going to open the memory dmp file in windbg and execute the command !analyze -s

scrolling down the results we will find the OS version

Flag :

Challenge 2 Password :

First i tried the lsadump plugin to dump plain text passowrds from the memoty but it didn't contain any passwords

then i used the plugin hashdump to extract users hashes from the SAM database

and then took the NTLMv2 hashes and crack them at crackstation website, 3 passwords were successfully cracked but one that contains text password which is the siam user password

Flag :

Challenge 3 IP Addr :

we will use the plugin netscan to view all the connections related information and in the local address we can find the system address

Flag :

Challenge 4 Note :

we will use the plugin filescan to enumerate all the system files

and we get a huge list of files

we know that the boss have left a text file so we will use grep to search for files with .txt extension

and we have 2 text files, to read their contents we will use the plugin dumpfiles

using cat command let's read its contents

and we can see a base64 encoded string let's decode it

Flag :

Challenge 5 Execution :

to see what the attacker has done on the infected machine which we have its memory dump we will dump the cmd history. we will use the plugin consoles

so the program executed is windows.bat and the flag is the output of the program executed

Flag :

Challenge 6 Path of the Executable :

the program that outputed the prevoius flag is windows.bat

Flag :

Challenge 7 Malicious :

using the filescan output generated previously we can grep for all exe files

reading through the executables we can find an executable called MadMan.exe

i searched in google for this executable and i found that its a virus

there is another method by using the autoruns plugin from this repository

which enumerates all the registry keys where a malicious program would hide itself to persist

first we have to clone the repository

and then run it with volatility

and we can see Dangerous autorun C:\Users\ezyzip\MadMan.exe by the word Danger in front of it

Flag :

Last updated

Was this helpful?