ICTF - Forensics writeups

Two forensics CTF challenges I’ve done

10/31/2024: the-registrar#

by lolmenow Description: Just carved this memory dump from the scarecrow’s PC! Apparently he told me that his programs on startup was acting weird while trying to register his new software.

Following the clue, I try to find the hive file storing registry: image Then dump this file at offset 0xb183c10b83e0: image Open this .dat file using Registry Explorer, startup programs is registered at [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run], go there and get the base32 string: image Decode this base32 string and reverse to get the flag: image Flag: ictf{tH3_rEg1STry_i5_T0O_c0OL_foR_YOu!}

10/31/2024: the-partraditionalist#

by lolmenow Description: The Forensics department over at ictf needs help recovering the flag from this image disk file!

The challenge give me a file, lets check it: image Check some first line, I notice this image disk file has been corrupted: image So I use testdisk tool to explore it (I run under sudo mode). Select partition table type = None Result should be like this when use select [ Analyse ]: image After exploring for a time, I found there are 3 files in Software partition: image Select all files and copy it to another location. Check these files, I know it use GPG to encrypt message: image Importing this private key to decrypt message and get the flag: image Flag: ictf{SH0Uld_i_aDd_my_L1NkeDiN_t0_tHE_6pg_Em4!L??}