Tags: volatility forensic 

Rating: 4.0

For this challenge, you need to find the flag that corresponds to the password hash of a user.

Based on the name of the challenge, you can guess that you need to use Volatility.

1. You can identify a Windows OS memory dump with the following command:

`$ vol.py -f ~/Downloads/insomni/image.mem windows.info`

2. Finally, use this command to retrieve the flag:

`$ vol.py-f ~/Downloads/insomni/image.mem windows.hashdump`

Original writeup (https://twditm.sirnef.com/writeups/insomnihack2025-v0l4til3.htm).
dominik335d600107d1af94f66March 18, 2025, 4:08 p.m.

You also have to patch the volatility to handle the new memory layout, no?