• chrome history analysis
  • File recovery from memory dump
  • Simple stego



Initial Analysis

We are given with a Windows 7 memory dump. Let’s see what all processes are running in the macine.

$ volatility -f for1.raw --profile=Win7SP1x86_23418 pslist


We can see Explorer and chrome are in open, lets check what’s there in Chrome’s history. We know that for their is a plugin chromehistory, we will use that.

volatility --plugins=/home/g4rud4/Downloads/Tools/volatility-plugins -f for1.raw --profile=Win7SP1x86_23418 chromehistory

chrome history

We didn’t find any suspicious links in chrome’s history.

Further Analysis

So let’s check what all files are there in the system.

volatility --plugins=/home/g4rud4/Downloads/Tools/volatility-plugins -f for1.raw --profile=Win7SP1x86_23418 filescan | grep Desktop

Filescan Desktop

We can steghide and a jpg image on the desktop, So let’s dumpfile the jpg file and use steghide on it.


When I used steghide for extaction, it asked for the password, I followed the same way as everyone does, just leaving it blink and clicking Enter. But no use.

Steghide Without PSSWD

So I thought to use the users password and got the NTLM hash using hashdump, but when cracked hash didn’t gave the result.

hashdump crackstation


So after opening the image, it’s Messi’s image which was took on 2019. So the on looking at the challenge titile and relating that to the password of steghide, we can use Messi2019 as password and try what we can get.

Messi Image
Using Messi2019 as Password

Hoorah!! We got the output. One opening the resulted image, we got the flag.


There is an other way also, by using mimikatz for getting the user password. But when I used the password that we got in mimikatz, I didn’t got anything, so after modifing the password by relating to the challenge title and modifying it to Messi2020, we can get the flag.

using Messi2020 as password

If you liked my solution, please do share it. I’m available on Twitter: @NihithNihi