forensicsmedium
Koloboki
hackerlab
Task: investigate a Windows memory dump and determine why an image matters in the case. Solution: recover browsing artifacts from memory, pivot from a Pastebin URL to a MEGA-hosted PNG, then rotate and inspect the image edge to read the hidden flag text.
$ ls tags/ techniques/
image_analysismemory_dumppastebinvolatility3browser_historywindows7internet_explorertemporary_internet_filesmegavisual_stego
memory_triagebrowser_artifact_recoveryurl_pivotingremote_artifact_retrievalvisual_hidden_text_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]