Post

Memlabs Lab 2 Writeup

Memlabs Lab 2 Writeup

Solution lab 2

challenge description -

1
One of the clients of our company, lost the access to his system due to an unknown error. He is supposedly a very popular "environmental" activist. As a part of the investigation, he told us that his go to applications are browsers, his password managers etc. We hope that you can dig into this memory dump and find his important stuff and give it back to us.
  • we can infer about enviroment variables and some password manager and browser
  • first getting some basic idea about the memory dump
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    
     stapat@stapat:~/ehax/dfir/memlabs/lab3$ volatility -f chall.raw imageinfo
    Volatility Foundation Volatility Framework 2.6.1
    INFO    : volatility.debug    : Determining profile based on KDBG search...
            Suggested Profile(s) : Win7SP1x86_23418, Win7SP0x86, Win7SP1x86_24000, Win7SP1x86
                       AS Layer1 : IA32PagedMemoryPae (Kernel AS)
                       AS Layer2 : FileAddressSpace (/mnt/data/symlinks/ehax/dfir/memlabs/lab3/chall.raw)
                        PAE type : PAE
                             DTB : 0x185000L
                            KDBG : 0x82742c68L
            Number of Processors : 1
       Image Type (Service Pack) : 1
                  KPCR for CPU 0 : 0x82743d00L
               KUSER_SHARED_DATA : 0xffdf0000L
             Image date and time : 2018-09-30 09:47:54 UTC+0000
       Image local date and time : 2018-09-30 15:17:54 +0530
    

flag 1

  • checking the enviroment variables

flag{w3lc0m3T0$T4g3!_Of_L4B_2} flag{w0w_th1s_1s_Th3_SeC0nD_ST4g3!!} flag{oK_So_Now_St4g3_3_is_DoNE}

This post is licensed under CC BY 4.0 by the author.

Trending Tags