Skip to content

Files

Latest commit

f9d23e6 · Apr 13, 2021

History

History
This branch is up to date with njitacm/jerseyctf-2021-challenges:main.

volatile-memory-1

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
Apr 13, 2021

volatile-memory-1

Using the RAM image found here https://drive.google.com/drive/folders/1a7NZ5g3TR1Pn6hxsf68AsSwP-ItqaHl_, what is the PID (process ID) of notepad.exe?

Solution

Volatility 3

/opt/volatility3/vol.py -f memdump.mem windows.pslist.PsList

Volatility 2

volatility -f memdump.mem imageinfo

/opt/volatility/vol.py --profile=Win2012R2x64_18340 psscan -f memdump.mem

Flag: jctf{1808}


Challenge Message

Oh no, we need to find out the PID (process ID) of notepad.exe in order to save the city for some unknown reason! No questions asked, just do it!

Use the RAM image found at: https://drive.google.com/drive/folders/1a7NZ5g3TR1Pn6hxsf68AsSwP-ItqaHl_?usp=sharing

Challenge Hints

  • Submit the flag in the following format: jctf{flag}.