This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## **Etape 1 : Se documenter** | |
En cherchant sur le net on trouve “**chiffre pigpen” a**ussi appelé **“**Le **chiffre des francs-maçons”.** | |
**Source:** wikipedia [https://fr.wikipedia.org/wiki/Chiffre_des_francs-maçons](https://fr.wikipedia.org/wiki/Chiffre_des_francs-ma%C3%A7ons) | |
On trouve sur Wikipedia les différents caractères | |
 | |
Vous pouvez également facilement retrouver la font (police d’écriture) permettant de réécrire le texte dans un éditeur : |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## En construisant un script en python pour récupérer le flag | |
```py | |
from Crypto.Cipher import AES | |
from Crypto.Util.Padding import unpad | |
from sympy.ntheory.modular import crt | |
from Crypto.Util.number import long_to_bytes | |
n = [17488856370348678479,16548497022403653709,17646308379662286151,14933475126425703583,17256641469715966189] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# En utilisant Volatility 3 | |
### **Obtenir le nom de l'application et le nom du fichier** | |
`vol -f /mnt/c/Users/cyrha/Desktop/demo/file.dmp windows.cmdline` | |
Il suffit de les retrouver dans le résultat |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# En utilisant Volatility 3 | |
### **Obtenir le nom d’utilisateur et machine** | |
`vol -f /mnt/c/Users/cyrha/Desktop/demo/file.dmp windows.envars | grep -Ei '(USERNAME|COMPUTERNAME)'` | |
### **Obtenir l'adresse IP** | |
`vol -f /mnt/c/Users/cyrha/Desktop/demo/file.dmp windows.netscan` |