BYUCTF 2024 | Did Nobody See?-writeup

Forensics/Did Nobody See? Writeup –>

Challenge Description

We recently obtained a triage image from a Windows laptop belonging to a suspected ransomware operator. The suspect used several anti-forensic techniques and managed to erase any form of web history. We suspect that we may be able to use data from DNS servers as evidence to tie the suspect to the operation. Unfortunately, the suspect was using a VPN. Can you find any DNS servers used during the VPN connection?

Solution

Here we need to find the ip address used to make connection with Windows laptop and as we are given the triage image we have the access to all the registry hives stored under

did-nobody-see\Windows\System32\config and the fact we would use is that all the IP addresses of the various network interfaces are stored under:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces

so we extract the Sytem regitsry from the folder and use a famous tool known as Registry Explorer tool by Eric Zimmerman to parse the registry and go to the desired location and we find

alt text

We can find 2 ip associated with the connected name server and anyone of them is the correct flag so the flag for the challenge was

byuctf{162.252.172.57} or byuctf{149.154.159.92}