Autopsy: analysis image ----write up of 'fi03' for in Cyber FastTrack

Problems : we are going to analysis the windows image file.

Tool: kali, autopsy 

Step1 : kali has autopsy,  so I don't need to install it. But I have to run it with root privilege.



Step 2: Open the URL in the browser and created a case to load the image.




Problem 1: find the hostname of the computer

Step 1: Windows event always stores the hostname, so I found the path of the host event and open it as hex, it's not easy to see, then I exported it and open it in the windows virtual machine.



Step 2: In Windows, I added the extension as 'evtx', then I double-clicked it to read the content in it.





We found the host name as 'RESARCH-LAB-42'.


Problem 2: find the customized task scheduler of the user, include all the arguments, path and command.

Step 1: find the task path of windows

We know that the task schedule is stored in 
c :/ windows/system32/Tasks


I found that there is a folder named 'Not a CRON', it is very suspicious. And the other folders are system tasks. I opened 'Not a CRON' as hex, I found the command at the end, I tried it and success!




The command is 'z:\toolsc.exe -l -p 1337 -e c:\windows\system32\cmd.exe'

Popular posts from this blog

Phonebook - Hack the box Write up -- Web LDAP injection

wafwaf -- Hack The Box -- Web SQL injection

Cheat sheet for security+