MISC刷题7

starme / 2024-10-20 / 原文

[OtterCTF 2018]

What the password?

问题描述:

you got a sample of rick’s PC’s memory. can you get his user password?

先使用imageinfo查看系统版本:

python2 vol.py -f OtterCTF.vmem imageinfo

image-20240616161857418

hashdump获取密码的LM和NTLM:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 hashdump

image-20240616163949074

mimikatz获取明文密码:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 mimikatz

image-20240616163550395

CTF{MortyIsReallyAnOtter}

General Info

描述:

Let’s start easy - whats the PC’s name and IP address?(让我们从简单的开始–电脑的名称和IP地址是什么?)

查看IP地址:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 netscan

image-20240616164229853

即IP为192.168.202.131

查看注册表:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 hivelist

image-20240616164853106

发现有SYSTEM

进行查看:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 -o 0xfffff8a000024010 printkey

image-20240616165152727

跟着一直解析,知道最后看到主机名

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 -o 0xfffff8a000024010 printkey -K "ControlSet001"

image-20240616165317415

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 -o 0xfffff8a000024010 printkey -K "ControlSet001\Control\ComputerName\ComputerName"

image-20240616165508403

即主机名为WIN-LO6FAF3DTFE

  • WIN-LO6FAF3DTFE-192.168.202.131

Play Time

Rick just loves to play some good old videogames. can you tell which game is he playing? whats the IP address of the server?(瑞克只是喜欢玩一些好的老式电子游戏,你能告诉他在玩哪个游戏吗? 服务器的IP地址是什么?)
vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 netscan

image-20240616165910008

  • LunarMS-77.102.199.102

Name Game

描述

We know that the account was logged in to a channel called Lunar-3. what is the account name?(我们知道该账户登录了一个名为Lunar-3的频道。什么是账户名称?)

image-20240616170327208

0tt3r8r33z3

Name Game 2

From a little research we found that the username of the logged on character is always after this signature: 0x64 0x??{6-8} 0x40 0x06 0x??{18} 0x5a 0x0c 0x00{2} What’s rick’s character’s name?(通过一点研究,我们发现,登录的字符的用户名总是在这个签名之后。0x64 0x??{6-8} 0x40 0x06 0x??{18} 0x5a 0x0c 0x00{2} 瑞克的角色叫什么名字?)

先获得LunarMS.exe的pid:

image-20240616170813939

然后将LunarMS.exe转储出来:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 memdump -p 708 -D ./

使用Hexdump搜索:

hexdump -C 708.dmp | grep "5a 0c 00" -A 3 -B 3

image-20240616171514998

M0rtyL0L

Silly Rick

题目描述:

Silly rick always forgets his email’s password, so he uses a Stored Password Services online to store his password. He always copy and paste the password so he will not get it wrong. whats rick’s email password?(愚蠢的瑞克总是忘记他的电子邮件的密码,所以他使用在线存储密码服务来存储他的密码。他总是复制和粘贴密码,这样他就不会弄错。里克的电子邮件密码是什么?)

提到了粘贴,联想到粘贴板:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 clipboard

image-20240616171915566

M@il_Pr0vid0rs

Hide And Seek

The reason that we took rick’s PC memory dump is because there was a malware infection. Please find the malware process name (including the extension)(我们提取瑞克的电脑内存转储的原因是有一个恶意软件感染。请找到恶意软件的进程名称(包括扩展名))

进程:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 pstree

image-20240616172122367

发现有个程序的ppid比pid还大,说明可能是异常进程

查看这个进程的DLL:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 dlllist -p 3720

image-20240616172325284

发现是在Temp目录下运行的,说明是异常程序

vmware-tray.exe

Path To Glory

How did the malware got to rick’s PC? It must be one of rick old illigal habits…(恶意软件是如何进入里克的电脑的?这一定是瑞克的一个老习惯…)

查看与Rick相关联的文件

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 filescan|grep Rick

image-20240616172812997

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 dumpfiles -Q 0x000000007dae9350  -D ./

image-20240616173113985

M3an_T0rren7_4_R!cke

需要将e去掉,即M3an_T0rren7_4_R!ck

strings的效果比cat好

Path To Glory 2

Continue the search after the the way that malware got in.(在恶意软件进入后继续搜索。)

把所有的chrome进程转储下来:

vol.py --plugin=/root/misc_tools/volatility/volatility/plugins -f OtterCTF.vmem --profile Win7SP1x64 memdump -n chrome -D ./chromeps

image-20240616180040006

搜索download.exe.torren:

strings ./chromeps/* |grep "download.exe.torren" -A 10 -B 10

image-20240616180247273

Hum@n_I5_Th3_Weak3s7_Link_In_Th3_Ch@inYear