forensicsmedium

Koloboki

hackerlab

Task: investigate a Windows memory dump and determine why an image matters in the case. Solution: recover browsing artifacts from memory, pivot from a Pastebin URL to a MEGA-hosted PNG, then rotate and inspect the image edge to read the hidden flag text.

$ ls tags/ techniques/
memory_triagebrowser_artifact_recoveryurl_pivotingremote_artifact_retrievalvisual_hidden_text_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]