Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

README.md

Forensics

Disk, memory, network, and artifact triage tips for CTFs.

Quick wins

  • Run strings/xxd early; many flags hide in plain sight.
  • For images, try steghide/stegseek, metadata checks, and pixel diffs before heavier analysis.
  • On memory dumps, identify the profile first (imageinfo/linux_banner), then dump interesting processes/files.
  • Convert PCAPs to focused outputs (DNS queries, HTTP files, USB keystrokes) instead of manual clicking.

Disk images

  • EnCase/EWF: inspect with Autopsy (GUI).
  • Raw .img:
    • List: fls file.img
    • File by inode: icat file.img <inode>
  • DOS/MBR offset example:
    mmls dds2-alpine.flag.img
    fls -o 0000002048 dds2-alpine.flag.img
    icat -o 0000002048 dds2-alpine.flag.img 18291
    
  • Boot/run: qemu-system-x86_64 image.img
  • ISO (LUKS): sudo cryptsetup open --type luks glaf.iso out_iso && sudo mount /dev/mapper/out_iso /mnt
  • Quick scan: xxd image | grep "F.L.A" -B 10 -A 10

Memory analysis (Volatility 2)

  • Find profile: volatility -f file.mem imageinfo
  • Windows highlights:
    • pslist, pstree, netscan, hashdump, lsadump, cmdscan, envars
    • Dump process: volatility -f file.mem --profile=PROFILE procdump -p PID -D dump/
    • File recovery: filescan -> dumpfiles -Q OFFSET -D .
    • Cached credentials: hivelist -> hashdump -y <system> -s <sam>
  • Interesting artifacts: \Google\Chrome\User Data\Default\History
  • Linux highlights:
    • Version peek: strings file.mem | grep "Linux version"
    • Build custom profile if missing (module.dwarf + System.map -> zip profile.zip)
    • Commands: linux_bash, linux_pstree, linux_psaux, linux_malfind, linux_enumerate_files, linux_volshell
    • Recover file:
      volatility -f file.mem --profile=PROFILE linux_find_file -F /home/ctf/flag.txt
      volatility -f file.mem --profile=PROFILE linux_find_file -i <inode> -O out
      

Memory analysis (Volatility 3)

  • Dump file: volatility3 -f file.mem -o out/ windows.dumpfiles
  • With address: volatility3 -f file.mem -o out/ windows.dumpfiles --virtaddr OFFSET

PCAPs and traffic

Windows artifacts

Images

Browsers

Audio / WAV