Writeup Trollctf Forensic V2
Mr_evilpepo_1
points 400 We have caught Mr.EvilPepo and now it is time for you to investigate him we searched his house and we got not much proof we got some report from OSINT department and Our OSINT Investigator told us that he mentioned on his socials "Hack Me if you can, i use same password Everywhere" we have dumped his computer memory and for further investigation we need your help. he typed the flag command somewhere and now he forgot it. can you find it? File: https://mega.nz/file/y90gWRJa#6lJ4qpKw3bfLKvbcTuvcOgGdDpYS9AapC_mwKM-4Zg4 Flag Format: Trolcat{} Author: White_wolf
pertama check isi file tersebut
evilpepo.vmem: data
ini adalah file memory dump disini gunakan volatility untuk menyelesaikan chall tersebut pertama kita akan mengecheck dengan menggunakan imageinfo untuk mendapatkan profile volatility -f evilpepo.vmem imageinfo
kurang lebih berikut profile yang di dapatkan
INFO : volatility.debug : Determining profile based on KDBG search... Suggested Profile(s) : Win7SP1x64, Win7SP0x64, Win2008R2SP0x64, Win2008R2SP1x64_24000, Win2008R2SP1x64_23418, Win2008R2SP1x64, Win7SP1x64_24000, Win7SP1x64_23418 AS Layer1 : WindowsAMD64PagedMemory (Kernel AS) AS Layer2 : FileAddressSpace (/home/dev/ctf/trollcat/evil/evilpepo.vmem)
pilih salah satu suggest profile lalu langsung saja kita menggunakan cmdscan untuk Extract command history by scanning for _COMMAND_HISTORY ||volatility -f evilpepo.vmem –profile=Win7SP0x64 cmdscan
CommandProcess: conhost.exe Pid: 992 CommandHistory: 0x39eb60 Application: cmd.exe Flags: Allocated, Reset CommandCount: 37 LastAdded: 36 LastDisplayed: 36 FirstCommand: 0 CommandCountMax: 50 ProcessHandle: 0x60 Cmd #0 @ 0x37e550: helo Cmd #1 @ 0x37e570: troollll Cmd #2 @ 0x37e590: caaat Cmd #3 @ 0x37e5b0: yooooo Cmd #4 @ 0x39de90: T Cmd #5 @ 0x39dcd0: r Cmd #6 @ 0x3a2f00: o Cmd #7 @ 0x3a2f20: l Cmd #8 @ 0x3a2f40: c Cmd #9 @ 0x3a2f60: a Cmd #10 @ 0x3a2fb0: t Cmd #11 @ 0x3a2fc0: { Cmd #12 @ 0x3a2fd0: c Cmd #13 @ 0x3a2fe0: o Cmd #14 @ 0x3a2ff0: m Cmd #15 @ 0x3a3000: a Cmd #16 @ 0x3a3010: n Cmd #17 @ 0x3a3020: d Cmd #18 @ 0x3a3030: s Cmd #19 @ 0x3a3040: _ Cmd #20 @ 0x3a3050: 4 Cmd #21 @ 0x3a3060: r Cmd #22 @ 0x3a3070: 3 Cmd #23 @ 0x3a3080: _ Cmd #24 @ 0x3a3090: i Cmd #25 @ 0x3a30a0: m Cmd #26 @ 0x3a30b0: p Cmd #27 @ 0x3a30c0: o Cmd #28 @ 0x3a30d0: r Cmd #29 @ 0x3a30e0: t Cmd #30 @ 0x3a30f0: a Cmd #31 @ 0x3a3100: n Cmd #32 @ 0x3a3110: t Cmd #33 @ 0x3a3120: } Cmd #34 @ 0x3a33b0: hope you got it Cmd #35 @ 0x377860: "are you trying to run strings?" Cmd #36 @ 0x3a33e0: lolololololol
Dapat disimpulkan flag yang didapat adalah
Trolcat{commands_4r3_important}
Mr_evilpepo_2
points 496 challenge description Now After some good beating, Mr.EvilPepo saying he hides something on the internet. find it Note: Use the file provided in Mr.EvilPepo Part-1 AUTHOR: WHITE_WOLF
setelah dibayangin habis maen valorant ada sesuatu yang disembunyikan di internet letsss goo kita check aja
pertama tama kita gunain pstree Print process list as a tree || volatility -f evilpepo.vmem –profile=Win7SP0x64 pstree ya kurang lebih tampilan nya begini
0xfffffa8000ca0ae0:System 4 0 78 506 2021-01-12 13:13:38 UTC+0000 . 0xfffffa8001bf6470:smss.exe 256 4 2 29 2021-01-12 13:13:38 UTC+0000 0xfffffa80028a7630:csrss.exe 388 368 11 338 2021-01-12 13:13:53 UTC+0000 . 0xfffffa8000f0d060:conhost.exe 992 388 2 51 2021-01-12 13:20:09 UTC+0000 0xfffffa80028f9480:winlogon.exe 420 368 3 109 2021-01-12 13:13:53 UTC+0000 0xfffffa800344fb30:explorer.exe 1568 1548 32 895 2021-01-12 13:14:47 UTC+0000 . 0xfffffa80020de060:notepad.exe 3120 1568 1 61 2021-01-12 13:22:27 UTC+0000 . 0xfffffa8003428a30:cmd.exe 1492 1568 1 19 2021-01-12 13:20:08 UTC+0000 . 0xfffffa8003673b30:chrome.exe 1932 1568 34 856 2021-01-12 13:15:05 UTC+0000 .. 0xfffffa80036d6b30:chrome.exe 912 1932 8 84 2021-01-12 13:15:12 UTC+0000 .. 0xfffffa8000ee9b30:chrome.exe 1292 1932 13 204 2021-01-12 13:16:11 UTC+0000 .. 0xfffffa8000e9ab30:chrome.exe 2324 1932 13 255 2021-01-12 13:16:05 UTC+0000 .. 0xfffffa8000da1b30:chrome.exe 2352 1932 20 248 2021-01-12 13:15:37 UTC+0000 .. 0xfffffa8000e5cb30:chrome.exe 2896 1932 8 181 2021-01-12 13:15:54 UTC+0000 .. 0xfffffa8000d97b30:chrome.exe 2556 1932 7 131 2021-01-12 13:15:38 UTC+0000 . 0xfffffa8000fc0060:KeePass.exe
bisa disimpulin kalo disini untuk history internet kemungkinan ada dichrome dan di explorer gak mungkin di summertime saga :>
oke letss go kita buka history chrome dan explorer nah buat buka history tersebut kita harus download plugins tambahan disini Download disini || langsung aja kita eksekusii pakai command ini abang abang || volatility –plugins=volatility-plugins-master/ -f evilpepo.vmem –profile=Win7SP1x64 chromehistory
favicon ID ------ -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- ------ ----- -------------------------- ------ ---------- 53 https://www.google.com/search?q=trollca...E&biw=800&bih=489#imgrc=cUivAz6CV5e2XM trollcat memes - Google Search 1 0 2021-01-12 13:17:20.047797 N/A 54 https://www.google.com/search?q=trollca...E&biw=800&bih=489#imgrc=o3Q0xkhbhExapM trollcat memes - Google Search 1 0 2021-01-12 13:17:20.078990 N/A 52 https://www.google.com/search?q=trollca...E&biw=800&bih=489#imgrc=HcXEteeesBeP-M trollcat memes - Google Search 1 0 2021-01-12 13:17:18.603233 N/A 51 https://www.google.com/search?ei=caL9X5...u7m_vpbuAhXK5nMBHYALBfMQ4dUDCA0&uact=5 trollcat memes - Google Search 2 0 2021-01-12 13:17:17.022311 N/A 50 https://www.google.com/search?ei=MKL9X-...kragvpbuAhXI_XMBHbezCxkQ4dUDCA0&uact=5 trollcat memese - Google Search 2 0 2021-01-12 13:17:12.170420 N/A 47 https://www.ghacks.net/2021/01/10/passw...anager-keepass-2-47-has-been-released/ Password Manager KeePass 2.47 has been released - gHacks Tech News 3 0 2021-01-12 13:17:00.320332 N/A 49 https://www.google.com/search?q=veracry...60l4.3887j1j7&sourceid=chrome&ie=UTF-8 veracrypt - Google Search 1 0 2021-01-12 13:16:52.525692 N/A 48 https://keepass.com/ Keepass.com - Download Keepass for PC and Mac 1 0 2021-01-12 13:16:30.228580 N/A 46 https://en.wikipedia.org/wiki/KeePass KeePass - Wikipedia 1 0 2021-01-12 13:16:22.289650 N/A 45 https://www.google.com/search?q=keepass...60l4.2447j1j7&sourceid=chrome&ie=UTF-8 keepass - Google Search 1 0 2021-01-12 13:16:58.918534 N/A 44 https://www.google.com/search?q=trollca...l8.172570j0j7&sourceid=chrome&ie=UTF-8 trollcats ctf - Google Search 1 0 2021-01-12 13:16:06.455385 N/A 43 https://sourceforge.net/projects/keepass/ KeePass download | SourceForge.net 2 0 2021-01-12 11:27:41.219565 N/A 42 https://sourceforge.net/projects/keepass/postdownload Find out more about KeePass | SourceForge.net 1 0 2021-01-12 08:31:52.181148 N/A 1 https://www.google.com/search?q=trollca...95l4.4346j1j7&sourceid=chrome&ie=UTF-8 trollcats - Google Search 1 0 2021-01-12 04:47:44.570774 N/A 23 https://defuse.ca/b/sOOqp4UunTdD0oUjidJFlz Defuse Security's Encrypted Pastebin 2 1 2021-01-12 08:23:00.706346 N/A 30 https://www.google....���� ��������������� -1 0 1601-01-01 00:00:00 N/A 23 https://defuse.ca/b/sOOqp4UunTdD0oUjidJFlz Defuse Security's Encrypted Pastebin 3 2 2021-01-12 13:16:47.523791 N/A
nah dibagian ini nih kunci nya silahkan akses website nya
23 https://defuse.caOOqp4UunTdD0oUjidJFlz Defuse Security's Encrypted Pastebin32 2021-01-12 13:16:47.523791 NA
langsung aja dari sini kita hashdump || volatility -f evilpepo.vmem –profile=Win7SP0x64 hashdump
Volatility Foundation Volatility Framework 2.6.1 Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0::: WhiteWolf:1000:aad3b435b51404eeaad3b435b51404ee:2e6a7cf5aabb33a044684dd9c97e88a7:::
dapat di prediksi user WhiteWOlf adalah author, lalu kita cari passsword dengan menggunakan wordlist rockyou
hashcat "2e6a7cf5aabb33a044684dd9c97e88a7" -m 1000 /usr/bin/rockyou.txt --force --show ========================================== 2e6a7cf5aabb33a044684dd9c97e88a7:abracadabra
abracadabra adalah password atau hascat dari author whitewolf ||decript web tersebut dengan user WhiteWOlf dan password diatas
Trollcat{secret_hidden_0nn_th3_1ntern3t}
Mr_evilpepo_3
challenge description The Top Secret file of Mr.EvilPepo is still not discovered this is your last mission of finding the top secret file related to Mr.EvilPepo Good Luck Note: Use the file provided in Mr.EvilPepo Part-1 AUTHOR: WHITE_WOLF
Disini kita di suruh mencari secret atau rahasia di balik dump || lansung aja kita ketikan command volatility –plugins=volatility-plugins-master/ -f evilpepo.vmem –profile=Win7SP0x64 clipboard -v
bisa dilihat abang abang ini terdapat link mega langsung aja kita buka euy, ternyata terdapat sebuah file secret kita buka file ini dengan tools / app veracrypt
lalu kita mount dengan veracrypt lalu open dengan cara klik kanan file yang di mount ke drive pilihan dan berikut ada file foryou dan yang dibuka dengdenggggg…..
Trollcat{y0u_got_n1ce_Skills!!!}
ihiwww mantap makasih dah baca kalau ada saran dirrect message ya abang abang