Houseplant CTF 2020 - Imagery

Houseplant CTF 2020 - Imagery

CTF challenge “Imagery” was a high-value forensics puzzle with the following description:

Photography is good fun. I took a photo of my 10 Windows earlier on but it turned out too big for my photo viewer. Apparently 2GB is too big. :(

https://drive.google.com/file/d/1y4sfIaUrAOK0wXiDZXiOI-q2SYs6M--g/view?usp=sharing Alternate: https://mega.nz/file/R00hgCIa#e0gMZjsGI0cqw88GzbEzKhcijWGTEPQsst4QMfRlNqg

Dev: Tom

Upon downloading the image, I originally ran basic forensic triaging tools on the large blob in an attempt to identify what it was. The file command outputted “data”. After running strings libWTF identified some known Windows file paths.

file

This lead us down a rabbit holeof file carving. After running through the typical triage of file carving tools (foremost/scalpel/radare2) a team member commented that it might be a memory dump. This is where Volatitlity comes in.

Introducing Volatility

Volatility is a memory forensics framework that allows the end-user to quickly triage a memory dump of an operating system. One crucial component of using Volatility is knowing which memory profile to use. Memory profiles result in parsing data at different offsets. Leveraging the wrong memory profile will just result in an error like the one shown below.

file

After looping through all available profiles in a default volatility install, it was clear something was missing.
Upon searching for additional Windows 10 memory profiles, LibWTF identified this FireEye GitHub repo.

After cloning this repo, and running a simple test of pslist to ensure the memory profile was correct, libWTF had success at listing running processes during the time the memory dump occurred. fireeeye_profile

Looking at the list of running processes, notepad.exe makes the most sense at face value to hold a flag for a CTF. Additionally, the organizers stated that the flag was in plain text. Now that a target process has been identified, we can dump the memory.

notepad

Dumping Memory

Volatility can dump the memory (and more) of a specific process for further analysis. By executing the command below, an end-user can begin to look at what was in notepad.exe’s memory during the time of capture.

mkdir notepad_memdump;
vol.py -f imagery.img --profile=Windows10_ memdump -p 6076 -D notepad_memdump/

Note, failing to specify a process with -p will dump all processes within the memory image.

At this point, a raw memory has been placed within the notepad_memdump/ directory. LibWTF then ran a hexdump and redirected the output to a file.

xxd 6076.dmp > notepad.xxd

Finally, a recursive grep to identify the flag format was executed and the flag was revealed grep -rail "r.t.c.p".

flag

Note, the “.” between rtcp is required per the hex-dump output.

Thanks for reading!