OtterCTF 2018 Memory Forensics Write-up (Part II)

Soumyadeep Basu
2 min readJun 15, 2019

--

I suppose you have already taken a look at my Memory Forensics Write-up (Part 1) if not, you can check it out here. Having said that let’s get hunting flags.

So Rick loves playing online games :) If we take a close look at the netscan results we see a particular process stands out:

Yup “LUNARMS.exe”. It had established a TCPv4 connection b/w the localhost and a remote server(77.102.199.102).

Flag 1: CTF{LunarMS}

Flag 2: CTF{77.102.199.102}

So the account was logged into a channel called Lunar-3. Let us try and grep regions near “Lunar-3” from the memory image.

$ strings OtterCTF.vmem | grep "Lunar-3" -A 5-B 5
disabled
mouseOver
keyFocused
Lunar-3
0tt3r8r33z3
Sound/UI.img/
BtMouseClick
Lunar-4
Lunar-1
--

0tt3r8r33z3”is the required account name.

Flag: CTF{0tt3r8r33z3}

‣‣‣You just read Frost Bite. Hope you enjoyed it…

--

--

Soumyadeep Basu
Soumyadeep Basu

Written by Soumyadeep Basu

CTF 🚩 ● Hack the Box ● CyberSec Enthusiast ● Snooker Addict

No responses yet