to view OS related informations we are going to open the memory dmp file in windbg and execute the command !analyze -s
scrolling down the results we will find the OS version
Flag :
Challenge 2 Password :
First i tried the lsadump plugin to dump plain text passowrds from the memoty but it didn't contain any passwords
then i used the plugin hashdump to extract users hashes from the SAM database
and then took the NTLMv2 hashes and crack them at crackstation website, 3 passwords were successfully cracked but one that contains text password which is the siam user password
Flag :
Challenge 3 IP Addr :
we will use the plugin netscan to view all the connections related information and in the local address we can find the system address
Flag :
Challenge 4 Note :
we will use the plugin filescan to enumerate all the system files
and we get a huge list of files
we know that the boss have left a text file so we will use grep to search for files with .txt extension
and we have 2 text files, to read their contents we will use the plugin dumpfiles
using cat command let's read its contents
and we can see a base64 encoded string let's decode it
Flag :
Challenge 5 Execution :
to see what the attacker has done on the infected machine which we have its memory dump we will dump the cmd history. we will use the plugin consoles
so the program executed is windows.bat and the flag is the output of the program executed
Flag :
Challenge 6 Path of the Executable:
the program that outputed the prevoius flag is windows.bat
Flag :
Challenge 7 Malicious:
using the filescan output generated previously we can grep for all exe files
reading through the executables we can find an executable called MadMan.exe
i searched in google for this executable and i found that its a virus
there is another method by using the autoruns plugin from this repository
azer@DESKTOP-OQ42TBR MINGW64 /e/Sherloks HTB/dumpedText
$ cat file.None.0xfffffa8004edf270.dat
S0NURntSZXNwZWN0X1kwdXJfSGVyNG5raX0= RISC OS
RISCOS
Fire OS
FireOS
macOS
mac OS
Mac OS X
OS X
macOS Server
macOSServer
Mac OS X Server
MacOSXServer
...