Suninatas Game 30
challenges
Game 30
Challenge summary:
Q1: IP address of General Kim’s PCQ2: Secret document read by hackerQ3: Content of that document (contains a key)- Final:
lowercase(md5(Q1 + Q2 + Q3))
Given artifact:
1 | $ file 'MemoryDump(SuNiNaTaS)' |
I used Volatility 3 throughout.
Initial triage
Identify OS profile and basic context:
1 | $ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.info |
Q1: IP address of General Kim’s PC
Check active/known network artifacts:
1 | $ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.netscan |
Q1 answer:
1 | 192.168.197.138 |
Q2: Which secret document was read?
Find interesting user actions from process arguments:
1 | $ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.cmdline |
Q2 answer:
1 | SecreetDocumen7.txt |
Q3: Content/key inside the secret document
Locate and dump the file from memory:
1 | $ vol -f 'MemoryDump(SuNiNaTaS)' -s ~/ctf/symbolTables windows.filescan | grep 'SecreetDocumen7.txt' |
Q3 key:
1 | 4rmy_4irforce_N4vy |
Final Auth Key
Concatenate in order:
1 | 192.168.197.138SecreetDocumen7.txt4rmy_4irforce_N4vy |
Compute lowercase MD5:
c152e3fb5a6882563231b00f21a8ed5f