forensicseasy
Oleg's Secrets
hackerlab
Task: a ZIP archive contained VMware memory artifacts and a nested Windows user profile with a KeePass database. Solution: inspect the profile, recover a password hint from an image with OCR, correct the OCR mistakes, then open the KDBX and read the stored flag entry.
$ ls tags/ techniques/
artifact_triagenested_archive_analysisclue_extraction_from_imageocr_assisted_password_recoverykeepass_database_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]