CTF : Memory Forensics
Informations
- IP: N/A
- MYIP: 10.9.85.5
Use volatility to find John password
console$ ~/bin/volatility/vol.py -f Snapshot6.vmem windows.hashdump.Hashdump 2 Volatility 3 Framework 2.3.0 Progress: 100.00 PDB scanning finished User rid lmhash nthash Administrator 500 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0 Guest 501 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0 John 1001 aad3b435b51404eeaad3b435b51404ee 47fbd6536d7868c873d5ea455f2fc0c9 HomeGroupUser$ 1002 aad3b435b51404eeaad3b435b51404ee 91c34c06b7988e216c3bfeb9530cabfb
I use crackstation to perform crack.
Use volatility to find some informations
Last system shutdown
shell~/bin/volatility/vol.py -f Snapshot19.vmem windows.registry.printkey.PrintKey --offset 0xf8a000024010 --recurse > tmp/registry.txt
Then:
shellgrep WindowsShutdownTime tmp/registry
What did john write ?
I needed to switch to volatility 2.6 because I didn't find any thing...
shellvol.py consoles -f Snapshot19.vmem --profile Win7SP1x64
TrueCrypt Passphrase
shellvol.py truecryptpassphrase -f Snapshot14.vmem --profile Win7SP1x64