forensicsmedium

Mem

spbctf

Linux memory dump forensics. Attacker obfuscated THEFLAG.txt through 5-step encoding chain (od -t x4, base64, xxd -E -b, tr, GPG), then shredded originals. Solution: extract bash history from RAM to reveal commands and GPG passphrase, reverse each transformation step, handle little-endian byte order from od -t x4.

$ ls tags/ techniques/
string_extractionmemory_dump_analysisbash_history_recoverygpg_symmetric_decryptionmulti_step_encoding_reversallittle_endian_byte_reversalcommand_line_forensics

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]