rgbCTF-2020

CTF Writeup - https://ctf.rgbsec.xyz/

Home Other writeups of rgbCTF-2020
15 July 2020

Name a more iconic band

by AnandSaminathan

I’ll wait.

The flag for this challenge is all the passwords in alphabetical order, each separated by a single white-space as an MD5 hash in lower case

md5(passwordA passwordB passwordC …)

Example: if the passwords were “dog” and “cat”, the flag would be rgbCTF{md5(“cat dog”)} rgbCTF{b89526a82f7ec08c202c2345fbd6aef3}

Files

Solution

On decompressing the given .7z file, we get a 1GB sized file called data. On running file command - I got to know that it’s some ELF core file (no clue), then I ran binwalk - one of the descriptions was “Microsoft executable, portable (PE)”. With this I started searching and found out that it’s a windows memory dump and ended up using volatility for memory forensics. With imageinfo plugin, I found that the memory dump was most likely of a Windows 7 system. alt text On searching for windows 7 memory vulnerabilites, I found out that it loads the SAM file that stores users passwords into the memory and the passwords are stored here in a hashed format. To get those password hashes the hashdump plugin of volatility can be used with the profile we found using imageinfo: alt text

The hash in the final column is the password hash and can be cracked using crackstation:

supercollider
anyone can play guitar
my iron lung
karma police
idioteque
pyramid song
there, there
weird fishes/arpeggi
lotus flower
burn the witch

On sorting and hashing the passwords (according to the question) - cf271c074989f6073af976de00098fc4

Flag

rgbCTF{cf271c074989f6073af976de00098fc4}
tags: