- Name: Nyong Coin
- Author: extr
- Category: Forensics
- Point: 140
- Download: https://1drv.ms/u/s!At0nZXK3fObIgoQAMtilBAZd017Klg?e=7VKBqz
- Scenario
import json | |
import twitter | |
api = twitter.Api(consumer_key='', | |
consumer_secret='', | |
access_token_key='', | |
access_token_secret='') | |
with open("tweet.js", encoding="utf8") as f: | |
tweets = json.loads(f.read()) | |
for tweet in tweets: | |
api.DestroyStatus(tweet['tweet']['id']) |
- Challenge Author: extr(@bemusicscript)
- Download Link: https://drive.google.com/file/d/10XZD5S2FCdPyugSvoIkWD8s3pH20hQS2/view
- Solver: 2
An employee's PC at a COVID-19 vaccine manufacturer was infected with a malware.
To solve the problem, focus on what malware did to the registry after 2020 November 7 14:00 (UTC+9) .Therefore, it is intended to be found using the 'last modification time' of the subkey.
๋ฌธ์ ๋ฅผ ํด๊ฒฐํ๊ธฐ ์ํด์ , 2020๋ 11์ 7์ผ 14์(UTC+9) ์๊ฐ ์ดํ์ ์คํ๋ ์ ์ฑ์ฝ๋๊ฐ ๋ ์ง์คํธ๋ฆฌ์ ์ด๋ค ํ์๋ฅผ ์ํํ์๋๊ฐ์ ์ด์ ์ ๋ง์ถ๋ฉด ๋ฉ๋๋ค. ๋ฐ๋ผ์, ๋ ์ง์คํธ๋ฆฌ์ ๋ง์ง๋ง ํค ์์ ์๊ฐ์ ์ด์ฉํด ์ฐพ์ ์ ์๋๋ก ์๋ํ์์ต๋๋ค.
The registry hive file in problem is not analyzed by normal registry analysis tools. the analysis tool should be able to load the registry transaction log file with the hive.
ํด๋น ๋ฌธ์ ์ ๋ ์ง์คํธ๋ฆฌ ํ์ด๋ธ ํ์ผ์ ์ผ๋ฐ์ ์ธ ๋ ์ง์คํธ๋ฆฌ ๋ถ์ ๋๊ตฌ๋ก ๋ถ์๋์ง ์์ต๋๋ค. ๋ถ์ ๋๊ตฌ๊ฐ ๋ ์ง์คํธ๋ฆฌ ํธ๋์ ์ ๋ก๊ทธ ํ์ผ์ ํ์ด๋ธ์ ํจ๊ป ๋ก๋ฉํ ์ ์์ด์ผํฉ๋๋ค.
Registry transaction log files serve as a journal to temporarily store data before it is written to the registry hive. If the registry hive is locked, it cannot be written directly, so use that method. You can check the transaction log format from the following link.
๋ ์ง์คํธ๋ฆฌ ํธ๋์ญ์ ๋ก๊ทธ ํ์ผ์ ๋ฐ์ดํฐ๊ฐ ๋ ์ง์คํธ๋ฆฌ ํ์ด๋ธ์ ๊ธฐ๋ก๋๊ธฐ ์ ์ ์์์ ์ผ๋ก ๋ฐ์ดํฐ๋ฅผ ์ ์ฅํ๋ ์ ๋ ์ญํ ์ ํฉ๋๋ค. ๋ ์ง์คํธ๋ฆฌ ํ์ด๋ธ๊ฐ ์ ๊น ์ํ์ผ ๊ฒฝ์ฐ ์ง์ ์ธ ์ ์๊ธฐ ๋๋ฌธ์ ํด๋น ๋ฐฉ์์ ์ฌ์ฉํฉ๋๋ค. ํธ๋์ ์ ๋ก๊ทธ ํ์์ ๋ค์ ๋งํฌ์์ ํ์ธํ์ค ์ ์์ต๋๋ค
@import "https://fonts.googleapis.com/css?family=Poppins:300,400,500,600,700"; | |
@font-face { | |
font-family: 'neon_tubes_2regular'; | |
src: url('/static/font/neontubes2-webfont.woff2') format('woff2'), | |
url('/static/font/neontubes2-webfont.woff') format('woff'); | |
font-weight: normal; | |
font-style: normal; | |
} |
I hereby claim:
- I am iidx on github.
- I am extr (https://keybase.io/extr) on keybase.
- I have a public key whose fingerprint is 375E 3646 C3B3 66B6 D354 AB3A 06AA D146 AB5D 8B26
To claim this, I am signing this object:
{ | |
"AFSEnvironment" : 0, | |
"AFSUrl" : "https://activity.windows.com", | |
"ActivityStoreInfo" : [ | |
{ | |
"active" : true, | |
"activityStoreId" : "D2A9DE73-67FE-B86E-A51D-C069D0A2EF6A", | |
"stableUserId" : "98b5534bd174e8e1" | |
}, | |
{ |
Time, Total BMS, Total Player, Now Playing, Total Score | |
2016-03-21 22:47:23.627927,225408,78743,175,13876362 | |
2016-03-21 22:48:27.966975,225408,78743,170,13876372 | |
2016-03-21 22:49:31.414692,225408,78743,166,13876380 | |
2016-03-21 22:50:35.234392,225408,78743,161,13876393 | |
2016-03-21 22:51:40.339887,225408,78743,164,13876403 | |
2016-03-21 22:52:45.966743,225408,78743,162,13876409 | |
2016-03-21 22:53:50.267170,225408,78743,157,13876417 | |
2016-03-21 22:54:55.721988,225408,78743,165,13876426 | |
2016-03-21 22:55:59.270184,225408,78743,160,13876437 |
# -*- coding: utf-8 -*- | |
import re, json | |
import urllib2 as u | |
bmsurl = "http://www.dream-pro.info/~lavalse/LR2IR/search.cgi?mode=ranking&bmsid=" | |
def urlreq(url): | |
try: | |
return u.urlopen(u.Request(url)).read() | |
except Exception as e: |
eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\\w+'};c=1};while(c--){if(k[c]){p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c])}}return p}('b(f("%h%g%2%4%e%5%2%d%1%6%c%0%8%3%1%6%q%0%3%1%7%7%a%o%5%p%i%2%m%4%9%j%0%8%k%0%9%l%1%a%3%n"));',27,27,'30|69|72|3B|28|61|3D|2D|31|22|29|eval|34|20|76|unescape|6F|66|65|32|36|2B|74|7D|7B|6C|3E'.split('|'),0,{})) |