TryHackMe | Disk Analysis & Autopsy Walkthrough
Ready for a challenge? Use Autopsy to investigate artifacts from a disk image.
Link- https://tryhackme.com/room/autopsy2ze0
Login and load the case in Autopsy as instructed
![](https://cdn-images-1.medium.com/max/1000/1*WQsuHX4vSaPReefC6JgcGA.png)
![](https://cdn-images-1.medium.com/max/1000/1*YK99c027U7uHoIMb-iq8Mg.png)
What is the MD5 hash of the E01 image?
3f08c518adb3b5c1359849657a9b2079
![](https://cdn-images-1.medium.com/max/1000/1*_FSrEAPtHM3GzkZsr_W0Dw.png)
What is the computer account name?
Find this in Extracted Content -->Operating System Information section
![](https://cdn-images-1.medium.com/max/1000/1*-Ll-YS2V7t-jKAfOcRGW6w.png)
DESKTOP-0R59DJ3
List all the user accounts. (alphabetical order)
Check the Operating System User Account section:-
![](https://cdn-images-1.medium.com/max/1000/1*eRAuEq0YVMtvd6R27HQodQ.png)
H4S4N,joshwa,keshav,sandhya,shreya,sivapriya,srini,suba
Who was the last user to log into the computer?
Sort by “Date Accessed”
![](https://cdn-images-1.medium.com/max/1000/1*XzGofertdkhFPT-OWxpmog.png)
sivapriya
What was the IP address of the computer?
Check Look@LAN in Program Files(x86) files . Look@Lan is an advanced network monitor.
![](https://cdn-images-1.medium.com/max/1000/1*T_LpbJ_IU05869F8TMWmFg.png)
192.168.130.216
What was the MAC address of the computer? (XX-XX-XX-XX-XX-XX)
08–00–27–2c-c4-b9
Name the network cards on this computer.
Search for the word Ethernet in Keyword Search:-
![](https://cdn-images-1.medium.com/max/1000/1*cxhuS03fGzJbhngf_-dKUQ.png)
Intel(R) PRO/1000 MT Desktop Adapter
What is the name of the network monitoring tool?
Look@LAN
A user bookmarked a Google Maps location. What are the coordinates of the location?
Go to the web bookmarker section:-
![](https://cdn-images-1.medium.com/max/1000/1*RNetmH_7btLf0JPkK1i-tw.png)
12°52'23.0"N 80°13'25.0"E
A user has his full name printed on his desktop wallpaper. What is the user’s full name?
In the Images/Videos section — Joshwa has an image file with a name. Extract the file and view.
![](https://cdn-images-1.medium.com/max/1000/1*JSOezefVQtcZWMJjvGYLuA.png)
Anto Joshwa
A user had a file on her desktop. It had a flag but she changed the flag using PowerShell. What was the first flag?
Check the powershell history for each user:-
Users -> shreya -> AppData -> Roaming -> Microsoft -> Windows -> PowerShell -> PSReadLine -> ConsoleHost_history.txt
![](https://cdn-images-1.medium.com/max/1000/1*-2ug57d7gkilgli696rioQ.png)
flag{HarleyQuinnForQueen}
The same user found an exploit to escalate privileges on the computer. What was the message to the device owner?
Go to Shreya’s Desktop files:-
![](https://cdn-images-1.medium.com/max/1000/1*M1aYICWbnXaJml6BZYATRQ.png)
flag{I-hacked-you}
2 hack tools focused on passwords were found in the system. What are the names of these tools? (alphabetical order)
These tools are likely to be identified by windows defender
![](https://cdn-images-1.medium.com/max/1000/1*6AQjnbOym71LZ14BMfIzqQ.png)
![](https://cdn-images-1.medium.com/max/1000/1*jnJ9NCTWwctXUtijze4bOQ.png)
Lazagne, Mimikatz
There is a YARA file on the computer. Inspect the file. What is the name of the author?
Search “.yar” extension using Keyword Search
![](https://cdn-images-1.medium.com/max/1000/1*AT289G3rxF-AVzxiLAv7mQ.png)
Benjamin DELPY (gentilkiwi)
One of the users wanted to exploit a domain controller with an MS-NRPC based exploit. What is the filename of the archive that you found? (include the spaces in your answer)
Check the Recent Documents section to find a document about Zerologon.
![](https://cdn-images-1.medium.com/max/1000/1*v4hbgy6ftL121_VaB_kv8g.png)
2.2.0 20200918 Zerologon encrypted.zip
That’s it folks :)
Comments
Post a Comment