Hello guys, today i wanted to share with you some little beginner friend memory forensic challenge from tryhackme, before we get started here is a link for the room ![](https://hackmd.io/_uploads/rJLtwITla.png) link:https://tryhackme.com/room/memoryforensics lets get started without westing time with this Before you start playing around with memory forensic its gud thing if you make some simple installation with volatility since because it can help you gather a lot of information about in memory forensic. I will assume that you have already installed volatility and from there you gud to go. ![](https://hackmd.io/_uploads/HkYFFwaga.gif) **Task 1** ![](https://hackmd.io/_uploads/SJQL_L6lp.png) i have already download the image for task one and is ready , so fire up you terminal. From the challenge discription above it , we have been given a memory dump and being asked to find all information in the memory dump as a forensic in investigator. For us to retrive john password from that disk dump we need first imageinfo of the memory dump we can do this **imageinfo** plugin ![](https://hackmd.io/_uploads/H1XXq8pga.png) now we know that the profile of the memory dump from the suggestion can be **Win7SP1x64** we can try to dump the hash with the plugin (hashdump), so we can use the following command to get the hashes from the memory volatility -f Snapshot6.vmem --profile=Win7SP1x64 hashdump ![](https://hackmd.io/_uploads/H1XEiU6lp.png) Then since they need john password just copy the john hash and save it into a file and crack it, in cracking you can use different methods john,hashcat, and online (am going to use hashcat because is simple for me and easy) ![](https://hackmd.io/_uploads/S1IXnUpea.png) as you can see over there i have copy the hash and input it into the hash.txt file and ready to being cracked , and my hashcat have just run without crack it , it because i have already cracked it so i justed used hashcat hash.txt /usr/share/wordlists/rockyou.txt --show **Method 2:** of cracking the hash it to copy the last hash part and crack it online with crackstation(47fbd6536d7868c873d5ea455f2fc0c9) **TASK 2**(make sure u download the second image) ![](https://hackmd.io/_uploads/HyzP68pg6.png) task 2 is analysis part so we need we as forensic inverstigators to analyse the situation here , lets begin ![](https://hackmd.io/_uploads/Hy4A6L6xp.png) **question 1:** last time the machine was shutdown we can use the following command to get the time, what is so important here is a **shutdowntime** plugin and a profile=Win7SP1x64 command: volatility -f Snapshot19.vmem --profile=Win7SP1x64 shutdowntime ![](https://hackmd.io/_uploads/HJWfJwTla.png) and there finally we get the time **qustion 2:** under this question what we need is the cmdscan plugin to scan for what command john was typing in the terminal or cmd and normally this is being checked into command_history in windows ![](https://hackmd.io/_uploads/S1a-xvTx6.png) command: volatility -f Snapshot19.vmem --profile=Win7SP1x64 cmdscan ![](https://hackmd.io/_uploads/ryWPeDTga.png) **TASK 3:** (last but not least) this question needs us to find the TrueCrypt passphase and we can only retrive this passphase with the following plugin ![](https://hackmd.io/_uploads/SyCIZDaxa.png) command: volatility -f Snapshot14.vmem --profile=Win7SP1x64 truecryptpassphrase ![](https://hackmd.io/_uploads/SyqRWDTl6.png) And there we can see we get the passphase and the memory location where is being located. ![](https://hackmd.io/_uploads/ryr7FD6xp.gif)