Post

Stephanie Wehner

This is a writeup of the forensics challenge Stephanie Wehner from the CyberHeroines(https://cyberheroines.ctfd.io/) CTF

Level: Medium, Score: 300

Stephanie Dorothea Christine Wehner (born 8 May 1977 in Würzburg) is a German physicist and computer scientist. She is the Roadmap Leader of the Quantum Internet and Networked Computing initiative at QuTech, Delft University of Technology.She is also known for introducing the noisy-storage model in quantum cryptography. Wehner’s research focuses mainly on quantum cryptography and quantum communications. - Wikipedia Entry

Chal: We had the flag in notepad but it crashed. Please return the flag to this Quantum Cryptographer

Memory Dump

Author: Rusheel

Challenge files:

564d38b5-422f-6f97-6068-7ea242ed6857.vmem

Observations

We’re greeted by a .vmem file, which is a file that, as can be seen here, is a file that contains the memory of a virtual machine, and exists while the machine is running or has crashed, and as mentioned in the challenge description, we have a scenario where a crash has occurred.

We also get the information that the process we want to know the contents of was the notepad process.

To analyze this file, we’ll have to use a tool like Volatility 2.6.

Solution

To find the contents of the notepad process, we have to walk through a few steps.

First, we want to get some information about the image, which we do with the following command: volatility_2.6_win64_standalone.exe -f 564d38b5-422f-6f97-6068-7ea242ed6857.vmem imageinfo (when running volatility 2.6 on Windows 10), which gives us the following output:

imageinfo

The most noteworthy line is the Suggested Profile line which ends in (Instantiated with Win8SP1x64), which will become relevant shortly.

That is because its used in the next command, which we use to get the processes that were running at the point of the snapshot with the command: volatility_2.6_win64_standalone.exe -f 564d38b5-422f-6f97-6068-7ea242ed6857.vmem --profile=Win8SP1x64 pslist, which gives us the following output:

process list

So, now we know the Process ID (PID) of notepad.exe (2452), this enables us to dump specifically that process. We do this with the command: volatility_2.6_win64_standalone.exe -f 564d38b5-422f-6f97-6068-7ea242ed6857.vmem --profile=Win8SP1x64 memdump --dump-dir=./ -p 2452

This saves the contents of the process to a file named 2452.dmp.

If we look at the strings of this file, with a tool like Detect it easy (abbreviated as DIE), we can filter strings to show any string containing chctf which gives us the following

fake flag

So probably not the flag we’re looking for. (Trust me, I wasted an attempt submitting it).

We can however take note of the line with the most comprehensive string, 1159. Finding this line in DIE, we also see the following lines in close proximity:

github link

Which looks interesting, so we can see what we can find if we go to that page.

Navigating to the github page, we see the following:

github page

So of course we navigate into the Secret repository. Inside the repository, we find the following:

github repo files

So, a lone text file named A_Cyber_Heroine.txt. Looking at the contents of the file, we find the following:

github textfile content

So, no flag there. We do have 1 additional option here though, and that’s checking the commit history. Doing this shows us the following: github history

Great, there is another commit, navigating to this older commit gives us the following result: github flag

Giving us our flag

chctf{2023!@mu5f@!5y_1009}

Tools used:

This post is licensed under CC BY 4.0 by the author.