前言
火眼到货了,等新电脑到了配完环境应该就会开始整整手机了。
DumpMe(Windows内存取证)
question1
1 | What is the SHA1 hash of Triage-Memory.mem (memory dump)? |
直接certutil -hashfile C:\Users\lym\Desktop\Triage-Memory.mem SHA1
看sha1的值。
answer:C95E8CC8C946F95A109EA8E47A6800DE10A27ABD
question2
1 | What volatility profile is the most appropriate for this machine? (ex: Win10x86_14393) |
imageinfo即可。
answer:Win7SP1x64
question3
1 | What was the process ID of notepad.exe? |
pslist即可。
answer:3032
question4
1 | Name the child process of wscript.exe. |
pstree即可。
answer:UWkpjFjDzM.exe
question5
1 | What was the IP address of the machine at the time the RAM dump was created? |
netscan即可,onwer为system
answer:10.0.0.101
question6
1 | Based on the answer regarding the infected PID, can you determine the IP of the attacker? |
netscan看进程,发现一个onwer是UWkpjFjDzM.exe,那么对应ip就是答案了。
answer:10.0.0.106
question7
1 | How many processes are associated with VCRUNTIME140.dll? |
dlllist看看有几个VCRUNTIME140.dll即可,管道符过滤下看得更清楚。
answer:5
question8
1 | After dumping the infected process, what is its md5 hash? |
用procdump把exe给dump下来,然后用md5sum命令检验md5即可。
answer:690ea20bc3bdfb328e23005d9a80c290
question9
1 | What is the LM hash of Bob's account? |
hashdump即可。
answer:aad3b435b51404eeaad3b435b51404ee
question10
1 | What memory protection constants does the VAD node at 0xfffffa800577ba10 have? |
vadinfo即可,gerp -A 10多看点。
answer:PAGE_READONLY
question11
1 | What memory protection did the VAD starting at 0x00000000033c0000 and ending at 0x00000000033dffff have? |
和上一题一样的解法。
answer:PAGE_NOACCESS
question12
1 | There was a VBS script that ran on the machine. What is the name of the script? (submit without file extension) |
因为是在运行的进程,就先pslist看了下,然后发现个wscript.exe的,看了下cmdline发现确实就是这个,答案就在对应的cmdline中
answer:vhjReUDEuumrX
question13
1 | An application was run at 2019-03-07 23:06:58 UTC. What is the name of the program? (Include extension) |
timeliner命令vol.py -f Triage-Memory.mem --profile=Win7SP1x64 timeliner | grep "2019-03-07 23:06:58" -B 5 -A 5
进行恢复查找即可。
answer:Skype.exe
question14
1 | What was written in notepad.exe at the time when the memory dump was captured? |
将notepad的vad给dump下来,用vaddump命令,然后strings命令strings -e l vads/* > str.txt
,直接找flag即可。
answer:flag
question15
1 | What is the short name of the file at file record 59045? |
这个要通过mftparser来找:python2 vol.py -f ../Triage-Memory.mem --profile=Win7SP1x64 mftparser | grep 59045 -A 10
answer:EMPLOY~1.XLS
question16
1 | This box was exploited and is running meterpreter. What was the infected PID? |
就是那个恶意进程的PID。
answer:3496
Insider
question1
1 | What distribution of Linux is being used on this machine? |
送分题就没啥好写的。
answer:kali
question2
1 | What is the MD5 hash of the apache access.log? |
access.log是空的,那就没啥好说的了。
answer:d41d8cd98f00b204e9800998ecf8427e
question3
1 | It is believed that a credential dumping tool was downloaded? What is the file name of the download? |
定位/root/Downloads
即可。
answer:mimikatz_trunk.zip
question4
1 | There was a super-secret file created. What is the absolute path? |
直接翻阅/root/.bash_history
就可以找到了。
answer:/root/Desktop/SuperSecretFile.txt
question5
1 | What program used didyouthinkwedmakeiteasy.jpg during execution? |
同样是看bash的历史记录即可。
answer:binwalk
question6
1 | What is the third goal from the checklist Karen created? |
文件就在桌面上,直接看就行了。
answer:profit
question7
1 | How many times was apache run? |
access.log都是空的,你说能有运行吗。
answer:0
question8
1 | It is believed this machine was used to attack another. What file proves this? |
irZLAohL.jpeg这张图直接石锤好吧。
answer:irZLAohL.jpeg
question9
1 | Within the Documents file path, it is believed that Karen was taunting a fellow computer expert through a bash script. Who was Karen taunting? |
看/root/Documents/firstscript_fixed
,真有点脑洞这里,文件中最后一行是echo "Heck yeah! I can write bash too Young"
,所以答案就是Young。
answer:Young
question10
1 | A user su'd to root at 11:26 multiple times. Who was it? |
定位/var/log/auth.log
中,按时间去找就可以找到了。
answer:postgres
question11
1 | Based on the bash history, what is the current working directory? |
看bash历史即可。
answer:/root/Documents/myfirsthack/