Tags: memory_dump forensics volatility
## Houseplant CTF 2020 - Imagery
CTF challenge "Imagery" was a high-value forensics puzzle with the following description:
Photography is good fun. I took a photo of my 10 Windows earlier on but it turned out too big for my photo viewer. Apparently 2GB is too big. :(
Upon downloading the image, I originally ran basic forensic triaging tools on the large blob in an attempt to identify what it was.
The ```file``` command outputted "data". After running ```strings``` , LibWTF identified some known Windows file paths.
This lead us down a rabbit holeof file carving. After running through the typical triage of file carving tools (foremost/scalpel/radare2) a team member commented that it might be a memory dump. This is where [Volatitlity](https://github.com/volatilityfoundation/volatility) comes in.
## Introducing Volatility
Volatility is a memory forensics framework that allows the end-user to quickly triage a memory dump of an operating system.
One crucial component of using Volatility is knowing which memory profile to use. Memory profiles result in parsing data at different offsets. Leveraging the wrong memory profile will just result in an error like the one shown below.
After looping through **all** available profiles in a default volatility install, it was clear something was missing. Upon searching for additional Windows 10 memory profiles, LibWTF identified this [FireEye](https://github.com/fireeye/win10_volatility) GitHub repo.
After cloning this repo, and running a simple test of ```pslist``` to ensure the memory profile was correct, LibWTF had success at listing running processes during the time the memory dump occurred.
Looking at the list of running processes, notepad.exe makes the most sense at face value to hold a flag for a CTF. Additionally, the organizers stated that the flag was in plain text.
Now that a target process has been identified, we can dump the memory.
## Dumping Memory
Volatility can dump the memory (and [more]()) of a specific process for further analysis. By executing the command below, an end-user can begin to look at
what was in notepad.exe's memory during the time of memory capture.
vol.py -f imagery.img --profile=Windows10_ memdump -p 6076 -D notepad_memdump/
*Note, failing to specify a process with ```-p``` will dump all processes within the memory image.*
At this point, a raw memory has been placed within the ```notepad_memdump/``` directory.
LibWTF then ran a hexdump and redirected the output to a file.
xxd 6076.dmp > notepad.xxd
Finally, a recursive grep to identify the flag format was executed and the flag was revealed ```grep -rail "r.t.c.p"```.
*Note, the "." between rtcp is required per the hex-dump output.*