BlackHat MEA CTF Qualifications 2024

Forensics writeup

أحمد ناصر
3 min readSep 2, 2024

Hello my friends this is a simple walkthrough about the 2 forensics challenge I solved in this competition

1- Artifact (Easy)

we was provided with single file (registry hive) so i open it using registry explorer :

since he asked about tool execution , there are some usefull registry values like AppCompatCache

HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache\AppCompatCache 

AppCompatCache refers to a Windows feature related to application compatibility. It's a cache used by Windows to store information about recently executed applications. This cache is maintained by the Windows Compatibility Manager and is often referred to as the Shim Cache. It's primarily used by the operating system to ensure compatibility of applications with different versions of Windows.

In forensics, the AppCompatCache is valuable because it can provide a list of executed applications, including information such as file paths and timestamps of when the applications were first or last executed. This can be critical in investigations where you need to establish a timeline of events on a system.

so there are many tools to parse AppCompatCache but i used EricZimmerman/AppCompatCacheParser :

after i opened the csv file, i found the malicious tool

DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. 

the flag

BHFlagY{DeadPotato-NET4.exe_09/08/2024_22:42:13}

2-NotFS (Medium)

we was provided whis “.img” file named (chall.img) , so i tried to mount it but it was corrupted :

First i used Autopsy — Digital Forensics and FTK Imager to extract any data from this img file but they only 6 WEBP images ,which contained no useful information.

so i used RStudio Desktop to recover any data from this img file :

  • the tool was able to recover the 6 WEBP images and another corrupted file.
  • so i open the corrupted file in HxD editor :
  • so the corrupted file is really a PNG image , so i fixed the corrupted header :

and finally i get the flag :

the flag

BHFlagY{8bd8dc3ea7636c5fb8aeb}

The end

--

--

أحمد ناصر
أحمد ناصر

Written by أحمد ناصر

CyberSecurity Analyst || DFIR || CTF player

No responses yet