Hackvent 2024: Hidden Medium

Hackvent 202460

[HV24.HM] Mrs. Claus's Secret

This hidden was discovered while solving the day 5 challenge: [HV24.05] Last Password

Solution

While analysing the memory dump, we noted that the notepad.exe process might hold interesting data. Specifically, we wanted to see the unsaved text present in the open Notepad binary in memory at the time of the dump. Using Volatility 3, we couldn't find an easy way to extract this data. However, we came across a blog post titled Volatility 3 Plugin — kusertime, notepad, sticky, evtxlog by Rifqi Ardia Ramadhan. In this post, Rifqi outlines their experience creating plugins for Volatility 3, including a Notepad plugin available at: https://github.com/spitfirerxf/vol3-plugins.

We installed the plugin and ran the following command:

$ py -3 vol.py -f ./dump.raw notepad

This successfully outputted the in-memory Notepad text:

never gonna give you my last password: t1s1s4t0t4llys3cur3p4ssw0rdn0rocky0utxt

Next, we use steghide with the extracted password on the Bernie image to check for any hidden data:

$ steghide extract -sf image.jpg -p t1s1s4t0t4llys3cur3p4ssw0rdn0rocky0utxt

This spits out a secret-flag.png image which is a QR code that provides our hidden flag:

Hackvent 2024 - Hidden Medium - Secret Flag

Flag:

HV24{p4ssw0rd_h1dd3n_1n_z3_n0tep4d.exe}

Leave a comment

(required)(will not be published)(required)

Comments

There are no comments yet. Be the first to add one!