Just Do It - InCTF/bi0s Internationals 2019

Abhiram Kumar


Categories: CTF-Writeups Tags: Windows Memory Analysis Volatility bi0sCTF

Full solution of Just Do It challenge from InCTF Internationals 2019.


Challenge points: 271

No. of solves: 28

Challenge Author: stuxn3t

Challenge Description


You can download the challenge from Mega or G-Drive.

Initial analysis

This is a fairly simple challenge.

We are provided with a Windows 7 memory dump. Let us begin our initial level of analysis.

$ volatility -f Mem_Evidence.raw --profile=Win7SP1x64 pslist


There is nothing quite interesting in the pslist output except for the Sticky Note process. Hmm, perhaps there is something written in it.

Just to keep it short, there was nothing important written in the clipboard. It was a small rabbit hole.

Enumertaing open files

Now let us proceed to the files present in the system.

$ volatility -f Mem_Evidence.raw --profile=Win7SP1x64 filescan


There are interesting files present on the desktop. The files Important.txt & galf.jpeg are of special interest. Let us try to dump them :)

$ volatility -f Mem_Evidence.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000003e8ad250 -D .

Now we have dumped the file galf.jpeg. However, doing basic steg techniques on the file yield nothing. So it is useless.

Extracting MFT

One important thing in the challenge and also the main exploit is to get the data present in the file Important.txt. However, dumpfiles will not be able to dump the required file as it has been deleted. However, its contents are still present in memory. If you fundamentally understand the Master File Table(MFT), you would know that we can access the data as long as the data blocks are overwritten.

For this, we take the help of the mftparser plugin.

$ volatility -f Mem_Evidence.raw --profile=Win7SP1x64 mftparser > mft_output.txt

So let us search for the data blocks of the file Important.txt



Aha! Now we see the characters of the flag separated by irregular number of spaces(Done intentionally).

Flag: inctf{1_is_n0t_EQu4l_7o_2_bUt_th1s_d0s3nt_m4ke_s3ns3} {:.success}