# Secret 2
### Challenge Author
[v1Ru5](https://twitter.com/SrideviKrishn16)
**Challenge points (Nationals)**: 469
**No. of solves**: 28
**Challenge points (Professionals)**: 484
**No. of solves**: 5
## Challenge Description

You can download the challenge from [**Mega**](https://mega.nz/file/gjIlQAzQ#Od9vio3ZZbbLNpYneW0tGvXaPmjtVYt48n93s0FB9QA)
## Writeup
We already know that **Win7SP1x64** is the profile. Now, let's start step-by-step.
```
$ volatility -f memory.raw --profile=Win7SP1x64 pslist
```

After using **pslist** plugin we find that there is nothing suspicious other than cmd.exe. So, let's see the command history using the **cmdscan** plugin.
```
$ volatility -f memory.raw --profile=Win7SP1x64 cmdscan
```

Maybe **j4cK4NdJ1Ll** can be useful somewhere?
Now, let's have a look at the files present in Documents. We have the **filescan** plugin to help us.
```
$ volatility -f memory.raw --profile=Win7SP1x64 filescan |grep "Documents"
```

Okay, so we have **information.txt** here, which on extraction gives us a mega link.
```
$ volatility -f memory.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000011fa43c10 -D .
```

The link leads us to **secret.zip** where the bytes are reversed. Write a script to reverse the bytes and use **j4cK4NdJ1Ll** (which we got earlier) as the password of the zip file to get the flag.
```
f1 = open("new.zip", "w")
with open("secret.zip", "r") as myfile:
data = myfile.read()
data_1 = data[::-1]
f1.write(data_1)
f1.close()
```
## Flag
**inctf{W3Ll_y0U_g0T_wH4T_yOu_N33d3D}**