forensicseasy

Oleg's Secrets

hackerlab

Task: a ZIP archive contained VMware memory artifacts and a nested Windows user profile with a KeePass database. Solution: inspect the profile, recover a password hint from an image with OCR, correct the OCR mistakes, then open the KDBX and read the stored flag entry.

$ ls tags/ techniques/
artifact_triagenested_archive_analysisclue_extraction_from_imageocr_assisted_password_recoverykeepass_database_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]