# Load system registry in registry explorerWIN-L0ZZQ76PMUF
What is the Timezone of the compromised machine? Format: UTC+0 (no-space)
# Load system registry in registry explorerUTC-8
What was the first vulnerability the attacker was able to exploit?
# /xampp/logs/access.logxss
What is the OS build number?
# analyze software registry in registry explorer1616
How many users are on the compromised machine?
4
What is the webserver package installed on the machine?
xampp
What is the name of the vulnerable web app installed on the webserver?
dvwa
What is the user agent used in the HTTP requests sent by the SQL injection attack tool?
The attacker read multiple files through LFI vulnerability. One of them is related to network configuration. What is the filename?
The attacker tried to update some firewall rules using netsh command. Provide the value of the type parameter in the executed command?
How many users were added by the attacker?
When did the attacker create the first user?
What is the NThash of the user's password set by the attacker?
What is The MITRE ID corresponding to the technique used to keep persistence?
The attacker uploaded a simple command shell through file upload vulnerability. Provide the name of the URL parameter used to execute commands?
One of the uploaded files by the attacker has an md5 that starts with "559411". Provide the full hash.
The attacker used Command Injection to add user "hacker" to the "Remote Desktop Users" Group. Provide the IP address that was part of the executed command?
The attacker dropped a shellcode through SQLi vulnerability. The shellcode was checking for a specific version of PHP. Provide the PHP version number?
$ volatility -f Breach/memdump.mem imageinfo
Volatility Foundation Volatility Framework 2.6
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : VistaSP1x86, Win2008SP1x86, Win2008SP2x86, VistaSP2x86
AS Layer1 : IA32PagedMemoryPae (Kernel AS)
AS Layer2 : FileAddressSpace (/home/hnl/Desktop/ctf/cyberdefenders/injector/Breach/memdump.mem)
PAE type : PAE
DTB : 0x122000L
KDBG : 0x81716c90L
Number of Processors : 1
Image Type (Service Pack) : 1
KPCR for CPU 0 : 0x81717800L
KUSER_SHARED_DATA : 0xffdf0000L
Image date and time : 2015-09-03 10:04:05 UTC+0000
Image local date and time : 2015-09-03 03:04:05 -0700
$ volatility -f Breach/memdump.mem --profile VistaSP1x86 consoles
# Microsoft Windows [Version 6.0.6001]
# Copyright (c) 2006 Microsoft Corporation. All rights reserved.
# C:\Users\Administrator>netsh fireall set service type=remotedesktop mode=enable
# scope=subnet
# The following command was not found: fireall set service type=remotedesktop mode
# =enable scope=subnet.
# C:\Users\Administrator>netsh firewall set service type=remotedesktop mode=enable
# scope=subnet
# Ok.
remotedesktop
2
> rip.exe -r <path-SAM-registry> -a
# Username : user1 [1005]
# Full Name :
# User Comment :
# Account Type : Custom Limited Acct
# Account Created : 2015-09-02 09:05:06Z
# Name :
# Last Login Date : Never
# Pwd Reset Date : 2015-09-02 09:05:06Z
# Pwd Fail Date : Never
# Login Count : 0
# Embedded RID : 1005
# --> Normal user account
# Username : hacker [1006]
# Full Name :
# User Comment :
# Account Type : Custom Limited Acct
# Account Created : 2015-09-02 09:05:25Z
# Name :
# Last Login Date : Never
# Pwd Reset Date : 2015-09-02 09:05:25Z
# Pwd Fail Date : Never
# Login Count : 0
# Embedded RID : 1006
# --> Normal user account
2015-09-02 09:05:06