Volatility is one of the most popular memory analyzer. This tools can help every digital forensic investigators to inspect a volatile memory dump from an infected computer. During this exercise, we will use this tool to find several flags.
Flag 1 : Find the running rogue (malicious) process. The flag is the MD5 hash of its PID.
Flag 2 : Find the running rogue (malicious) process and dump its memory to disk. You'll find the 32-character flag within that process's memory.
Flag 3 : What is the MAC address of this machine's default gateway? The flag is the MD5 hash of that MAC address in uppercase with dashes (-) as delimiters. Example: 01-00-A4-FB-AF-C2.
Flag 4 : Find the full path of the browser cache created when an analyst visited "www.13cubed.com." The path will begin with "Users\." Convert the path to uppercase. The flag is the MD5 hash of that string.
Memory file can be found in https://drive.google.com/drive/folders/1E-i2RTUBXBGUd_Xz0k67kFOpHcr6WX8J?usp=sharing
Using Volatility v2.6.1, the first thing to check is the system profil. We want to know to have more information regarding the memory dump.
To dump the memory of a process, use the command memdump in Volatility.
To find the MAC address of a system, we can dump the registry of the system from volatility.
Most of the supporting files for the hives are in the %SystemRoot%\System32\Config directory.
Let's use the command hivelist to print the registry hives of the system.
On this one, we will see how to scan for internet cache and history using volatility. Let us first check the process list again of the memory file, to see if there are any browser instances.
Browser that we know: Internet Explorer, Google Chrome, Mozilla Firefox, Microsoft Edge, Opera, Safari