Command & Control level 5
root-me challenge: Berthier, the malware seems to be manually maintened on the workstations. Therefore, it’s likely that the hackers have found all the computers’ passwords. Since ACME’s computer fleet seems to be up-to-date, it’s probably only due to password weakness. John, the system administrator doesn’t believe you. Prove him wrong!
Find john’s password. The uncompressed memory dump md5 hash is e3a902d4d44e0f7bd9cb29865e0a15de
Get file:
┌──(kali㉿kali)-[~/Downloads/root-me]
└─$ wget http://challenge01.root-me.org/forensic/ch2/ch2.tbz2
Unpack:
┌──(kali㉿kali)-[~/Downloads/root-me/forensic]
└─$ tar -jxvf ch2.tbz2
ch2.dmp
Using volatility3, dump the Windows user password hashes:
┌──(kali㉿kali)-[~/Downloads/volatility3]
└─$ ./vol.py -f ../root-me/forensic/ch2.dmp windows.hashdump.Hashdump
Volatility 3 Framework 2.4.2
Progress: 100.00 PDB scanning finished
User rid lmhash nthash
Administrator 500 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0
Guest 501 aad3b435b51404eeaad3b435b51404ee 31d6cfe0d16ae931b73c59d7e0c089c0
John Doe 1000 aad3b435b51404eeaad3b435b51404ee b9f917853e3dbf6e6831ecce60725930