Event-Viewing
Event-Viewing
CHALLENGE DESCRIPTION
SOLUTION
First, we need to convert evtx
to xml
to analyze
1
2
3
pip install python-evtx
source myenv/bin/activate
python3 evtx_dump.py some.evtx > some.xml
We read the hint and do research about EventID
Now we know some ID number of events, so filter it with grep
. A25
flag can list 25 lines after each match.
1
cat some.xml | grep -A25 "1033</EventID>"
We get the first part of the flag, and the malicious software’s name.
1
2
cat some.xml | grep -A25 "Totally_Legit_Software"
We got the second part of the flag, now filter the shut down eventid.
1
2
cat some.xml | grep -A25 "1074</EventID>"