Read Askew Manuscripts - 1
Last updated
Was this helpful?
Last updated
Was this helpful?
We are tasked with finding the XRAY Key that is in registry in this memory dump. One of the best tools for doing memory forensics is a tool called . There are 2 different versions, I used the earlier version, 2.*.* as its the one Ive used the most in the past.
Using this command we dump the "imageinfo" of the memory dump. This information can help us build a profile of the machine and help with further analysis.
With the imageinfo we add the --profile to our command. Then we run the command "hivelist", Because we are tasked with finding something in the registry hivelist dumps all the registry types that we can dig through. (The hex address are what we use "exa. 0xe1035b60"
Now that we have a list of different registries we can look through we begin digging to find one that contains the "SOFTWARE\ACME_Xray" in it.
Using grep we find it in the registry location "0xe1035b60". Now that we know the offset address of where the key is located we simply dump the key.
The base64 encoded string is our flag.