2020JTWLB-个人CTF-MISC-memory

2020JTWLB-个人CTF-MISC-memory

  • memory
    • 题目分析
    • 开始
      • 1.题目
      • 2.分析内存
        • (1)查看镜像信息
        • (2)查看进程
        • (3)查找文件
        • (4)把可疑文件dump出来
        • (5)整理下文件
        • (6)分析文件
        • (7)查看剪贴板
      • 3.base64替换表解密
      • 4.解压zip,get flag
    • 结论

每天一题,只能多不能少

memory

题目分析

1.volatility取证
2.base64换表解密

开始

1.题目

下载下来是一个vmem内存文件。
题目
链接:百度网盘分享地址
提取码:rsmz

2.分析内存

(1)查看镜像信息
root@kali2019:~/CTF/JTWLB# volatility -f base9.vmem imageinfo
Volatility Foundation Volatility Framework 2.6
INFO    : volatility.debug    : Determining profile based on KDBG search...Suggested Profile(s) : Win7SP1x64, Win7SP0x64, Win2008R2SP0x64, Win2008R2SP1x64_24000, Win2008R2SP1x64_23418, Win2008R2SP1x64, Win7SP1x64_24000, Win7SP1x64_23418AS Layer1 : WindowsAMD64PagedMemory (Kernel AS)AS Layer2 : FileAddressSpace (/root/CTF/JTWLB/base9.vmem)PAE type : No PAEDTB : 0x187000LKDBG : 0xf8000403d0a0LNumber of Processors : 1Image Type (Service Pack) : 1KPCR for CPU 0 : 0xfffff8000403ed00LKUSER_SHARED_DATA : 0xfffff78000000000LImage date and time : 2020-10-13 08:46:11 UTC+0000Image local date and time : 2020-10-13 16:46:11 +0800
(2)查看进程
oot@kali2019:~/CTF/JTWLB# volatility -f base9.vmem --profile=Win7SP1x64 psscan
Volatility Foundation Volatility Framework 2.6
Offset(P)          Name                PID   PPID PDB                Time created                   Time exited                   
------------------ ---------------- ------ ------ ------------------ ------------------------------ ------------------------------
0x0000000002151b30 SearchProtocol     2084    940 0x000000002612e000 2020-10-13 08:25:04 UTC+0000                                 
0x000000000237ab30 SearchFilterHo     2152    940 0x000000002d165000 2020-10-13 08:25:05 UTC+0000                                 
0x00000000027739e0 dllhost.exe        1420    508 0x0000000019539000 2020-10-13 08:25:02 UTC+0000                                 
0x0000000002ae24f0 mspaint.exe        2968   1184 0x000000001cbe0000 2020-10-13 08:45:57 UTC+0000                                 
0x0000000002b62060 WmiPrvSE.exe       2488    628 0x0000000008165000 2020-10-13 08:25:20 UTC+0000                                 
0x0000000005451b30 msdtc.exe          2064    508 0x0000000017144000 2020-10-13 08:25:04 UTC+0000                                 
0x000000000be39850 mscorsvw.exe        884    508 0x000000002cb22000 2020-10-13 08:45:45 UTC+0000                                 
0x000000000efe6b30 notepad.exe        2436   1184 0x00000000205ad000 2020-10-13 08:45:53 UTC+0000                                 
0x00000000108e6920 cmd.exe            2760   1604 0x000000000380c000 2020-10-13 08:46:11 UTC+0000   2020-10-13 08:46:11 UTC+0000  
0x0000000024e33b30 dllhost.exe        1468    508 0x00000000248a5000 2020-10-13 08:25:00 UTC+0000                                 
0x0000000024eff480 WmiApSrv.exe       2600    508 0x0000000003c7f000 2020-10-13 08:25:21 UTC+0000                                 
0x00000000282b5920 VSSVC.exe          2248    508 0x00000000177ca000 2020-10-13 08:25:06 UTC+0000                                 
0x000000002d6aab30 VGAuthService.     1528    508 0x000000000a0e2000 2020-10-13 08:24:52 UTC+0000                                 
0x000000002d73c6b0 vmtoolsd.exe       1604    508 0x0000000009a69000 2020-10-13 08:24:53 UTC+0000                                 
0x000000002d793890 vmtoolsd.exe       1636   1184 0x0000000008e6a000 2020-10-13 08:24:54 UTC+0000                                 
0x000000002d7a5650 ManagementAgen     1732    508 0x000000002b8f0000 2020-10-13 08:24:54 UTC+0000                                 
0x000000002d825920 audiodg.exe         976    772 0x000000000848f000 2020-10-13 08:24:48 UTC+0000                                 
0x000000002d8c4600 svchost.exe         752    508 0x000000000b7aa000 2020-10-13 08:24:49 UTC+0000                                 
0x000000002d947700 dwm.exe            1172    864 0x000000000ab37000 2020-10-13 08:24:50 UTC+0000                                 
0x000000002d94bb30 explorer.exe       1184   1164 0x0000000009428000 2020-10-13 08:24:50 UTC+0000                                 
0x000000002d981b30 spoolsv.exe        1244    508 0x000000000c7f0000 2020-10-13 08:24:50 UTC+0000                                 
0x000000002d9b1060 taskhost.exe       1236    508 0x000000000b042000 2020-10-13 08:24:50 UTC+0000                                 
0x000000002d9bc380 svchost.exe        1308    508 0x0000000024886000 2020-10-13 08:24:50 UTC+0000                                 
0x000000002db21330 svchost.exe         628    508 0x00000000131a7000 2020-10-13 08:24:47 UTC+0000                                 
0x000000002db51b30 vmacthlp.exe        692    508 0x0000000015667000 2020-10-13 08:24:47 UTC+0000                                 
0x000000002db5cb30 svchost.exe         724    508 0x000000001546e000 2020-10-13 08:24:48 UTC+0000                                 
0x000000002db91740 svchost.exe         772    508 0x0000000015679000 2020-10-13 08:24:48 UTC+0000                                 
0x000000002dbd5b30 svchost.exe         372    508 0x000000002b496000 2020-10-13 08:24:49 UTC+0000                                 
0x000000002dbdab30 svchost.exe         908    508 0x0000000009c0b000 2020-10-13 08:24:48 UTC+0000                                 
0x000000002dbee570 svchost.exe         864    508 0x0000000009b85000 2020-10-13 08:24:48 UTC+0000                                 
0x000000002df1eb30 winlogon.exe        448    396 0x00000000164a7000 2020-10-13 08:24:29 UTC+0000                                 
0x000000002df66b30 services.exe        508    412 0x0000000016ef9000 2020-10-13 08:24:32 UTC+0000                                 
0x000000002df6db30 lsm.exe             528    412 0x00000000148a4000 2020-10-13 08:24:33 UTC+0000                                 
0x000000002df77910 lsass.exe           516    412 0x000000001081c000 2020-10-13 08:24:33 UTC+0000                                 
0x000000002e003810 csrss.exe           352    344 0x0000000018cc9000 2020-10-13 08:24:25 UTC+0000                                 
0x000000002e0aa610 WmiPrvSE.exe       1520    628 0x000000001df53000 2020-10-13 08:25:00 UTC+0000                                 
0x000000002e0db060 SearchIndexer.      940    508 0x00000000034aa000 2020-10-13 08:25:01 UTC+0000                                 
0x000000002e84d670 smss.exe            268      4 0x000000001ff53000 2020-10-13 08:24:06 UTC+0000                                 
0x000000002eaa2330 svchost.exe        2656    508 0x0000000028c15000 2020-10-13 08:45:45 UTC+0000                                 
0x000000002ec6b9e0 wininit.exe         412    344 0x0000000017fcf000 2020-10-13 08:24:28 UTC+0000                                 
0x000000002f388060 csrss.exe           404    396 0x0000000017ca1000 2020-10-13 08:24:28 UTC+0000                                 
0x000000002f890630 svchost.exe        2940    508 0x000000001264f000 2020-10-13 08:45:57 UTC+0000                                 
0x000000002f893060 mscorsvw.exe       1964   2292 0x000000001d7a1000 2020-10-13 08:46:11 UTC+0000   2020-10-13 08:46:11 UTC+0000  
0x000000002f89d060 svchost.exe        2544    508 0x000000002f747000 2020-10-13 08:45:49 UTC+0000                                 
0x000000002f8a7b30 mscorsvw.exe       2704   2292 0x0000000007aa9000 2020-10-13 08:46:11 UTC+0000                                 
0x000000002f8f9630 7zFM.exe           1048   1184 0x000000002c465000 2020-10-13 08:46:06 UTC+0000                                 
0x000000002f98d900 ipconfig.exe       1028   2760 0x0000000011ecb000 2020-10-13 08:46:11 UTC+0000   2020-10-13 08:46:11 UTC+0000  
0x000000002fce8b30 mscorsvw.exe       2292    508 0x000000002c24c000 2020-10-13 08:45:46 UTC+0000                                 
0x000000002fd3c750 sppsvc.exe         2508    508 0x00000000049d1000 2020-10-13 08:45:48 UTC+0000                                 
0x000000002fd52060 conhost.exe        2400    352 0x0000000008211000 2020-10-13 08:46:11 UTC+0000   2020-10-13 08:46:11 UTC+0000  
0x000000002ff2a990 System                4      0 0x0000000000187000 2020-10-13 08:24:06 UTC+0000     
(3)查找文件
root@kali2019:~/CTF/JTWLB# volatility -f base9.vmem --profile=Win7SP1x64 filescan | grep -E 'jpg|png|jpeg|bmp|gif|zip|txt'

发现可疑文件
flag.zip
carbon.png
password.txt

(4)把可疑文件dump出来

password.txt

volatility -f base9.vmem --profile=Win7SP1x64 dumpfiles -Q 0x000000002d2d9ea0 --dump-dir=./4

carbon.png

volatility -f base9.vmem --profile=Win7SP1x64 dumpfiles -Q 0x000000002d813d50 --dump-dir=./4

flag.zip

volatility -f base9.vmem --profile=Win7SP1x64 dumpfiles -Q 0x000000002e0b4800--dump-dir=./4
(5)整理下文件

在这里插入图片描述
carbon.png:
carbon.png
password.txt:
password.txt
flag.zip
flag.zip

(6)分析文件

flag.zip里面肯定就是flag了。问题是加密了。
carbon.png肯定是个码表。看起来像是base。(事后诸葛亮。。。。)
pasword.txt却看不出来是什么。。。
根据我的推测,应该是ntfs流隐写,但是恢复不出来。

(7)查看剪贴板

经过大神的指点,原来密文是要通过剪贴板来查看。

root@kali2019:~/CTF/JTWLB# volatility -f base9.vmem --profile=Win7SP1x64 clipboard
Volatility Foundation Volatility Framework 2.6
Session    WindowStation Format                         Handle Object             Data                                              
---------- ------------- ------------------ ------------------ ------------------ --------------------------------------------------1 WinSta0       CF_UNICODETEXT                0x2016d 0xfffff900c06f7e50 1CoiTFbWq0srIFGY                                  1 WinSta0       CF_TEXT                          0x10 ------------------                                                   1 WinSta0       0x3016bL               0x200000000000 ------------------                                                   1 WinSta0       CF_TEXT                           0x1 ------------------                                                   1 ------------- ------------------            0x3016b 0xfffff900c06e8230        

找到可疑密文:

1CoiTFbWq0srIFGY

3.base64替换表解密

文件名就是base。所以考虑是base64替换表解密。
上脚本:

#!python3
# -*- coding: utf-8 -*-
# @Time : 2020/10/23 23:02
# @Author : A.James
# @FileName: tt.pyimport base64str1 = "1CoiTFbWq0srIFGY"string1 = "9ElQCwNF7DYVIa5KATUPzi1WqbtphxLyMRkHsjmZ3GucBXefd4S0J8gn2r6Ovo+/"
string2 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"print (base64.b64decode(str1.translate(str.maketrans(string1,string2))))

得到:

b'XOUDvWc990zJ'

4.解压zip,get flag

flag{8c99bf86-2504-4eed-9df1-c5aa30ce3d51}

结论

巨坑,一直在纠结password.txt。结果密文是在剪贴板。然后就是base64替换表解密。巨坑。


本文来自互联网用户投稿,文章观点仅代表作者本人,不代表本站立场,不承担相关法律责任。如若转载,请注明出处。 如若内容造成侵权/违法违规/事实不符,请点击【内容举报】进行投诉反馈!

相关文章

立即
投稿

微信公众账号

微信扫一扫加关注

返回
顶部