user@TUSKEDEV ~/p/v/来一把紧张刺激的CS> ./volatility -f memory.raw imageinfo
Volatility Foundation Volatility Framework 2.6
INFO : volatility.debug : Determining profile based on KDBG search…
Suggested Profile(s) : No suggestion (Instantiated with Win2008SP1x86)
AS Layer1 : IA32PagedMemoryPae (Kernel AS)
AS Layer2 : FileAddressSpace (/home/user/projects/vnctf/来一把紧张刺激的CS/memory.raw)
PAE type : PAE
DTB : 0x3L
KUSER_SHARED_DATA : 0xffdf0000L
?????????????
提示:Volatility 3+找到的人名
我tm……
user@TUSKEDEV ~/p/v/来一把紧张刺激的CS> sudo vol -f memory.raw windows.info.Info
Volatility 3 Framework 2.0.1
Progress: 100.00 PDB scanning finished
Variable Value
Kernel Base 0xf8042fc00000
DTB 0x1ad000
Symbols file:///usr/lib/python3.10/site-packages/volatility3/symbols/windows/ntkrnlmp.pdb/CA8E2F01B822EDE6357898BFBF862997-1.json.xz
Is64Bit True
IsPAE False
layer_name 0 WindowsIntel32e
memory_layer 1 FileLayer
KdVersionBlock 0xf8043080f368
Major/Minor 15.19041
MachineType 34404
KeNumberProcessors 2
SystemTime 2023-01-27 09:10:20
NtSystemRoot C:\Windows
NtProductType NtProductWinNt
NtMajorVersion 10
NtMinorVersion 0
PE MajorOperatingSystemVersion 10
PE MinorOperatingSystemVersion 0
PE Machine 34404
PE TimeDateStamp Wed Jan 4 04:27:11 1995
以下图片取自BetaWorld Wiki。
提示:战术目镜,黄色头发,他相信自己的操作天衣无缝,但内存中总会留下脚印
验证码
一堆png文件搅在一起
我最开始是直接GHex一股脑输入的,然而……
啊这……
提示:tupper
可能指向Tupper自指公式,其中那几位数字可能是k值。
然而……
user@TUSKEDEV ~/p/v/验证码 [2]> python -m tupper Traceback (most recent call last): File "/usr/lib/python3.10/runpy.py", line 187, in _run_module_as_main mod_name, mod_spec, code = _get_module_details(mod_name, _Error) File "/usr/lib/python3.10/runpy.py", line 157, in _get_module_details code = loader.get_code(mod_name) File "", line 1017, in get_code File "", line 947, in source_to_code File "", line 241, in _call_with_frames_removed File "/home/user/projects/vnctf/验证码/tupper.py", line 6 def f(x,y): ^ IndentationError: unindent does not match any outer indentation level