Name a more iconic band
by AnandSaminathan
I’ll wait.
The flag for this challenge is all the passwords in alphabetical order, each separated by a single white-space as an MD5 hash in lower case
md5(passwordA passwordB passwordC …)
Example: if the passwords were “dog” and “cat”, the flag would be rgbCTF{md5(“cat dog”)} rgbCTF{b89526a82f7ec08c202c2345fbd6aef3}
Files
Solution
On decompressing the given .7z file, we get a 1GB sized file called data
. On running file
command - I got to know that it’s some ELF core file (no clue), then I ran binwalk
- one of the descriptions was “Microsoft executable, portable (PE)”. With this I started searching and found out that it’s a windows memory dump and ended up using volatility
for memory forensics. With imageinfo plugin, I found that the memory dump was most likely of a Windows 7 system.
On searching for windows 7 memory vulnerabilites, I found out that it loads the SAM file that stores users passwords into the memory and the passwords are stored here in a hashed format. To get those password hashes the hashdump
plugin of volatility can be used with the profile we found using imageinfo:
The hash in the final column is the password hash and can be cracked using crackstation:
supercollider
anyone can play guitar
my iron lung
karma police
idioteque
pyramid song
there, there
weird fishes/arpeggi
lotus flower
burn the witch
On sorting and hashing the passwords (according to the question) - cf271c074989f6073af976de00098fc4
Flag
rgbCTF{cf271c074989f6073af976de00098fc4}