Tags: pdf forensic 

Rating: 0

I've made a temporary directory `mkdir /tmp/image` as mount point to image. To work with .EWF files we need a ewf-tools package on system. After mounting image with `ewfmount Image.E01 /tmp/image/` I've discovered single file `ewf1` inside it. I get that it a NTFS file system running `xxd ewf1 | head` and copied it from read-only partition to the home directory. Next I've mounted it with `ntfs-3g ewf1 /tmp/image2` command.

I did a `file *` in single directory inside $RECYCLE.BIN and noticed that there are single valid PDF-file inside.

![](https://github.com/kperevoznikova/writeups/raw/main/CrewCTF%202022/pics/policy1.png)

I copied it to Windows machine with [PDF Stream Dumper](http://sandsprite.com/blogs/index.php?pid=57&uid=7) installed and hit the "Exploits_Scan" button.

![](https://github.com/kperevoznikova/writeups/raw/main/CrewCTF%202022/pics/policy2.jpg)

Original writeup (https://github.com/kperevoznikova/writeups/blob/main/CrewCTF%202022/Policy%20Violation.md#pt-1).