Category: Misc
Difficulty: Easy
Author: TheVamp
R3m3mb3r th3 g00d 0ld 1337 d4y5, wh3r3 3ncrypt10n t00l5 4r3 u53d, wh1ch 4r3 d34d t0d4y 4nd r3c0mm3nd b1tl0ck3r. H4v3 fun t0 f1nd th15 5m4ll g3m 1n th3 m3m0ry dump.
The author provided a memory dump of a Windows XP machine.
We have to analyze it to get the flag.
We can extract a zip
archive from the memory dump, containing a file called flag.txt
, using foremost
. But the archive is encrypted.
We need to get the password. I created a dictionary from the memorydump using strings and grep strings memory.dmp > dict
. After that the archive can be cracked using john the ripper
.
$zip2john flag.zip > crackme && john crackme --wordlist=dict` Using default input encoding: UTF-8 Loaded 1 password hash (ZIP, WinZip [PBKDF2-SHA1 256/256 AVX2 8x]) Will run 8 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status BorlandDelphiIsReallyCool (00225083.zip/flag.txt) 1g 0:00:00:00 DONE (2020-05-25 23:19) 1.204g/s 78959p/s 78959c/s 78959C/s ...OOOOOOOqqqqqq..X_^] Use the "--show" option to display all of the cracked passwords reliably Session completed
After extracting the file using the password BorlandDelphiIsReallyCool
, we get the flag.
CSCG{c4ch3d_p455w0rd_fr0m_0p3n_tru3_cryp1_c0nt41n3r5}