Memoires du matelot 1
For this challenge, we have a big
memdump.mem file, of almost 5 Go. We know someone was connected to it with a VPN when the dump was made, and we now have to retrieve the IP and port of this connection.
To analyse this memory dump, we will use the Volatility framework. Please note that there are a lot of differences between the version 2.6 and the version 3, which is still in development. We will use the version 3.
We can get some informations about this image with the command
vol.py -f memdump.mem windows.info
This is a dump of a machine running Windows 10.
Now, let’s analyze the current connections with
vol.py -f memdump.mem windows.netscan.NetScan:
That’s quite a lot. Now we just have to test the few possibilities where the state column is
After some tests, we successfully validate the flag with the following couple IP / port :