0 Day
Question 1:
What is the Volatility profile for this image?
vol.py -f 0day.bin kdbgscan or imageinfo

Question 2:
What was the startup time for this system?
vol.py -f 0day.bin --profile=Win2012R2x64 pslist

Question 3:
What is the System's Hostname?
vol.py -f 0day.bin --profile=Win2012R2x64_18340 hivelist

vol.py -f 0day.bin --profile=Win2012R2x64_18340 printkey -o 0xffffc001cb428000

vol.py -f 0day.bin --profile=Win2012R2x64_18340 printkey -o 0xffffc001cb428000 -K CurrentControlset

vol.py -f 0day.bin --profile=Win2012R2x64_18340 printkey -o 0xffffc001cb428000 -K “ControlSet001\Control\ComputerName\ActiveComputerName"

Question 4:
What is the name of the Active Directory Domain?
vol.py -f 0day.bin --profile=Win2012R2x64_18340 printkey -o 0xffffc001cb428000 -K "ControlSet001\Services\Tcpip\Parameters"

Question 5:
What is the system IP address?
vol.py -f 0day.bin --profile=Win2012R2x64_18340 netscan | grep -v :::0 | grep -v 0.0.0.0

Question 6:
What SID proves session 4 is granted Domain Admin rights?
vol.py -f 0day.bin --profile=Win2012R2x64_18340 getsids | grep -i domain

Question 7:
This system has been exploited. Wat is the PID of the exploited process?


Question 8:
What PID proves the attacker has the ability to remotely copy files to/from this system?
vol.py -f 0day.bin --profile=Win2012R2x64_18340 pstree

Last updated