forensicsPromedium
Mem
spbctf
Linux memory dump forensics. Attacker obfuscated THEFLAG.txt through 5-step encoding chain (od -t x4, base64, xxd -E -b, tr, GPG), then shredded originals. Solution: extract bash history from RAM to reveal commands and GPG passphrase, reverse each transformation step, handle little-endian byte order from od -t x4.
$ ls tags/ techniques/
string_extractionmemory_dump_analysisbash_history_recoverygpg_symmetric_decryptionmulti_step_encoding_reversallittle_endian_byte_reversalcommand_line_forensics
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [stego][Pro]Just a Text— spbctf
- [forensics][Pro]Чувак, где мой флаг? (Dude, Where's My Flag?)— hackerlab
- [forensics][Pro]Reincarnation— duckerz
- [forensics][Pro]Какой-то DMP...— hackerlab
- [reverse][Pro]Зиг-заг (Zig-zag)— duckerz