SMU Whitehacks 2021 Writeup

Since I had any prior experience or knowledge regarding CTFs or cybersecurity in general, going into the competition, I thought that I would not be able to solve anything. At first every single task seemed daunting. Though with some patience (alot of patience), luck and Googling (the most important skill), I managed to finish a few challenges. My team ranked 35th out of around 130 teams.

This was my first CTF (March 7, 2021 : 8:00 am SGT - 5:00 pm SGT) and I thoroughly enjoyed it - the gamified style of competition makes capturing a flag so, so, so extremely satisfying! I learnt a plethora of new things from the workshop, pre training materials and the event itself - how to use Kali, compile C source code, SQL injections and so much, much more.

In fact I liked the event so much that the following weekend I participated in another CTF and am looking forward to playing in many more. Thanks Whitehacks for exposing me to a whole new world!

This writeup doesn’t have my solutions to the other challenges that I solved because I only actively started writing writeups after the UMASS 2021 CTF hence the writeup below is what I managed to salvage for Whitehacks.

This is my writeup for the memory forensics challenge :


SMU Whitehacks 2021 Writeup

After some Googling, I found out that I should use the memory forensics framework ‘Volatility’ in order to capture the flag. After installing Volatility, I extracted some basic information about the image using the imageinfo command.

SMU Whitehacks 2021 Writeup

Then I supplied a profile (Win7SP1x64) to Volatility and using pstree, I listed the processes that were running on the machine when the RAM image was made.

SMU Whitehacks 2021 Writeup

Since this is a Windows machine, the attacker probably left a link in a notepad so I used the grep command to list out all the notepad.exe processes.

SMU Whitehacks 2021 Writeup

There were four notepad.exe processes so proceeded to dump the data from each notepad.exe process into a directory using memdump.

SMU Whitehacks 2021 Writeup SMU Whitehacks 2021 Writeup

Then I used strings and grep to search for URLs. The first dump yielded no obvious or interesting URLs. However, the second dump looked promising.

SMU Whitehacks 2021 Writeup

There was an Imgur link, surely the image of the flag must be there?

SMU Whitehacks 2021 Writeup

Sure enough after going to the Imgur Link, the image of the flag was there.

SMU Whitehacks 2021 Writeup

Flag : WH2021{iSEEuHANDLEDthisWELL}