Suninatas Game 30

challenges

Game 30

one of the most interesting game, be sure to try it first.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
General Kim's PC was hacked by Hacker
Here is a Memory Dump at that time, You should find what Hacker did

Q1 : IP Address of General Kim's PC
Q2 : Which secret document did Haker read?
Q3 : What is content of secret document? There is a "Key"

Auth Key = lowercase(MD5(Answer of Q1+Answer of Q2+Key of Q3))

金将军的电脑被黑客入侵了。
以下是当时的内存转储文件,你应该能从中找出黑客的操作。
问题1:金将军电脑的IP地址
问题2:黑客读取了哪份秘密文件?
问题3:秘密文件的内容是什么?其中包含一个“密钥”。
认证密钥 = lowercase(MD5(问题1的答案+问题2的答案+问题3的密钥))
1
2
❯ file 'MemoryDump(SuNiNaTaS)'
MemoryDump(SuNiNaTaS): data

use volatility3 btw

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
❯ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.info
Volatility 3 Framework 2.27.0
Progress: 100.00 PDB scanning finished
Variable Value

Kernel Base 0x82e43000
DTB 0x185000
Symbols file:///home/kita/ctf/symbolTables/windows/ntkrpamp.pdb/5D0FE9918B274161A7ECA7C0D056BDF6-2.json.xz
Is64Bit False
IsPAE True
layer_name 0 WindowsIntelPAE
memory_layer 1 FileLayer
KdDebuggerDataBlock 0x82f6cc28
NTBuildLab 7601.18044.x86fre.win7sp1_gdr.13
CSDVersion 1
KdVersionBlock 0x82f6cc00
Major/Minor 15.7601
MachineType 332
KeNumberProcessors 1
SystemTime 2016-05-24 09:47:40+00:00
NtSystemRoot C:\Windows
NtProductType NtProductWinNt
NtMajorVersion 6
NtMinorVersion 1
PE MajorOperatingSystemVersion 6
PE MinorOperatingSystemVersion 1
PE Machine 332
PE TimeDateStamp Sat Jan 5 02:46:00 2013

❯ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.netscan
Volatility 3 Framework 2.27.0
Progress: 100.00 PDB scanning finished
Offset Proto LocalAddr LocalPort ForeignAddr ForeignPort State PID Owner Created

...
0x3f270450 TCPv4 192.168.197.138 139 0.0.0.0 0 LISTENING 4 System N/A
0x3f270768 UDPv4 192.168.197.138 137 * 0 4 System 2016-05-24 09:22:27.000000 UTC
0x3fdd5620 TCPv4 192.168.197.138 49248 113.29.189.142 80 ESTABLISHED - - -

ip seem to be 192.168.197.138

1
2
3
4
5
6
7
8
9
10
❯ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.cmdline
Volatility 3 Framework 2.27.0
Progress: 100.00 PDB scanning finished
PID Process Args

4 System -
...
1640 v1tvr0.exe "C:\v196vv8\v1tvr0.exe"
3728 notepad.exe notepad C:\Users raining\Desktop\SecreetDocumen7.txt
...

file named SecreetDocumen7.txt

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
❯ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.filescan | grep "SecreetDocumen7.txt"
0x3df2ddd8 100.0\Users raining\Desktop\SecreetDocumen7.txt

❯ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.dumpfiles --phy 0x3df2ddd8
Volatility 3 Framework 2.27.0
Progress: 100.00 PDB scanning finished
Cache FileObject FileName Result

DataSectionObject 0x3df2ddd8 SecreetDocumen7.txt file.0x3df2ddd8.0x85d7d150.DataSectionObject.SecreetDocumen7.txt.dat

❯ xxd file.0x3df2ddd8.0x85d7d150.DataSectionObject.SecreetDocumen7.txt.dat
00000000: 4865 6c6c 6f2c 204e 6963 6520 746f 206d Hello, Nice to m
00000010: 6565 7420 796f 752e 0d0a 446f 2079 6f75 eet you...Do you
00000020: 2077 616e 6e61 2067 6574 2061 204b 6579 wanna get a Key
00000030: 3f0d 0a48 6572 6520 6973 2074 6865 204b ?..Here is the K
00000040: 6579 2079 6f75 2077 616e 742e 0d0a 4b65 ey you want...Ke
00000050: 7920 6973 2022 3472 6d79 5f34 6972 666f y is "4rmy_4irfo
00000060: 7263 655f 4e34 7679 2200 0000 0000 0000 rce_N4vy".......
...

content of secret document is 4rmy_4irforce_N4vy

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
金将军的电脑被黑客入侵了。
以下是当时的内存转储文件,你应该能从中找出黑客的操作。
问题1:金将军电脑的IP地址
192.168.197.138

问题2:黑客读取了哪份秘密文件?

SecreetDocumen7.txt


问题3:秘密文件的内容是什么?其中包含一个“密钥”。

4rmy_4irforce_N4vy

认证密钥 = lowercase(MD5(问题1的答案+问题2的答案+问题3的密钥))

192.168.197.138SecreetDocumen7.txt4rmy_4irforce_N4vy

use cyberchef btw md5
c152e3fb5a6882563231b00f21a8ed5f