Command & Control – level 2 – Root ME

Congratulations Berthier, thanks to your help the computer has been identified. You have requested a memory dump but before starting your analysis you wanted to take a look at the antivirus’ logs. Unfortunately, you forgot to write down the workstation’s hostname. But since you have its memory dump you should be able to get it back!

The validation flag is the workstation’s hostname.

The uncompressed memory dump md5 hash is e3a902d4d44e0f7bd9cb29865e0a15de

So, we need to Find workstations hostname from memory dump

git clone https://github.com/volatilityfoundation/volatility3.git
cd volatility3/
python3 vol.py -h

After installing this requirement, you need to extract your evidence file and run this command.

python3 vol.py -f ch2.dmp windows.info.Info

The Windows Registry is a database where Windows stores important settings for both the system and applications.

A “registry hive” is a group of keys, subkeys, and values organized in this database.

When we need to find the name of the workstation, we can look in these registry keys to find the information.

python3 vol.py -f ch2.dmp windows.registry.hivelist.HiveList

So, we can see /Registry/Machine/System so for this to work we need to print specific key, which is a path inside of this folder, so we are gonna use the plugin windows.registry.printkey.PrintKey, so we need to search for the key path that contain the computer name in google, so i found that its ‘ControlSet001\Control\ComputerName\ComputerName’
so, as we have the offset and the key path, we can use the plugin to get the computer name!

python3 vol.py -f ch2.dmp windows.registry.printkey.PrintKey –offset 0x8b21c008 –key ‘ControlSet001\Control\ComputerName\ComputerName’

Flag – WIN-ETSA91RKCFP

Want to become a cybersecurity expert? Join A7 Security Hunters and start your journey to mastering cybersecurity!

Leave a Reply

Your email address will not be published. Required fields are marked *

About Us

A7 Security Hunters is a leading provider of cybersecurity certifications and training, offering both online and offline courses tailored to professionals at all levels. Our comprehensive programs cover key areas like ethical hacking, network security, and threat management, designed to equip individuals with the skills to succeed in the fast-paced world of cybersecurity. With expert instructors and hands-on learning, A7 Security Hunters ensures you gain practical knowledge and industry-recognized certifications to advance your career in cybersecurity.

Cybersecurity Training & Certifications

Most Recent Posts

  • All Post
  • Black Hat Hacking
  • CTF Challenges
  • Cybersecurity
  • Ethical Hacking
  • Forensic
  • Google Trends
  • Penetration Testing
  • Red Teaming
  • Uncategorized
  • Web Penetration Testing

A7 Security Hunters

Enroll in A7 Security Hunters' Certifications and Transform into a Cybersecurity Expert

© 2025 A7 Security Hunters All Rights Reserved. | Designed by A7 Security Hunters