lesion.io Blog
  • Roadmap
  • Docs
    • Templates
      • Data Inventory
      • Access Control
      • Cybersecurity Roles & Responsibilities
      • Asset Inventory
      • Acceptable Use Policy
      • Change Management
      • Vendor Risk Assessment Form
      • Password Protection Policy
  • About Us
    • Manifesto
    • Metrics
  • CTF Team
    • CISA ICS CTF 2024
      • Virbank
        • Mission: Inconceivable - 1
        • Mission: Inconceivable - 2
        • Extend Your Stay - 1
        • Extend Your Stay - 2
        • Extend Your Stay - 3
        • Extend Your Stay - 4
        • Follow The Charts - 1
        • Follow The Charts - 2
        • Read Askew Manuscripts - 1
        • Read Askew Manuscripts - 2
        • Read Askew Manuscripts - 3
        • Read Askew Manuscripts - 4
        • Read Askew Manuscripts - 5
      • Anville
        • Genisys of the Problems - 1
        • Genisys of the Problems - 2
        • Genisys of the Problems - 3
        • Modeling Trains - 1
        • Modeling Trains - 2
        • Modeling Trains - 3
      • Castelia
        • Page
      • Driftviel
        • Page 1
Powered by GitBook
On this page

Was this helpful?

  1. CTF Team
  2. CISA ICS CTF 2024
  3. Virbank

Read Askew Manuscripts - 4

PreviousRead Askew Manuscripts - 3NextRead Askew Manuscripts - 5

Last updated 9 months ago

Was this helpful?

  1. We are now tasked with downloading that image that was taken and viewing the flag on the image.

  2. Using grep we search for only files that contain the targeted user.

  1. Using this command we can dump the file using its address. We are dumping it into our /tmp directory.

python2 vol.py -f /home/.../.../ICS_CISA_24/virbank/read_askew_manuscripts/memdump.raw --profile=WinXPSP3x86 dumpfiles -n --dump-dir=/tmp -Q 0x0000000009769228
  1. Looking at the image we get our flag.