Magnet Weekly CTF Challenge Week 12 Writeup - Last But Not Least

Time flies and finally we have made it into the last week of Magnet Weekly CTF. This week was still a two-parter. The 1st part of the challenge asked of a PID:
Using HxD to search the key phrase "how hackers hack, and how to stop them" inside the memory dump, a hit could be found quickly: 


After that, the Volatility
yarascan plugin was used to find the PID that related to "how hackers hack, and how to stop them". 
The Hex value corresponding to the "How Hackers Hack, and How To Stop Them" string value discovered from HxD could be reused as the search criterion for yarascan, the  "python vol.py -f ../memdump.mem --profile=Win7SP0x64 yarascan -Y "{48 6F 77 20 48 61 63 6B 65 72 73 20 48 61 63 6B 2C 20 61 6E 64 20 48 6F 77 20 54 6F 20 53 74 6F 70 20 54 68 65 6D}" command was issued in terminal:

From the yarascan output, all hits came from the "iexplore.exe" process with PID 4480.
Therefore, the answer for the part 1 challenge should be 4480.

Following completion of the part 1 challenge, part 2 challenge was revealed:

Since the application was identified as "iexplore.exe" with PID 4480, the Volatility procdump plugin was used to dump the process executable, in order to determine the product version of the application. The "python vol.py -f ../memdump.mem --profile=Win7SP0x64 procdump -D . -p 4480" command was issued in terminal:

Upon the successful process executable dump, Properties from Microsoft Windows could quickly tell the product version of the "iexplore.exe":

The answer for the part 2 challenge was "11.00.9600.18858".

Conclusion

I had a great time participating in the Magnet Weekly CTF. Apart from solving the challenges on my own, I also learnt a lot from reading other participants' write-ups. 





Comments

Popular posts from this blog

Dumpster Diving in Google Photos Android App: "local_trash.db"

An Android Casting (Device) Story: "cast.db"