Sysinternals

Task 1  Introduction


When did Microsoft acquire the Sysinternals tools?

The reading says 2006 is when sysinternals were acquired.

I deployed the attached virtual machine and I’m ready to move on…

Task 2  Install the Sysinternals Suite

What is the last tool listed within the Sysinternals Suite?

If we scroll to the boot of our uncompressed zip we see zoomit is the last tool.

Task 3  Using Sysinternals Live


What service needs to be enabled on the local host to interact with live.sysinternals.com?

From going through the instructions we know that webclient needs to be enabled.

Task 4  File and Disk Utilities


There is a txt file on the desktop named file.txt. Using one of the three discussed tools in this task, what is the text within the ADS?

The first thing we must do is find the hidden file name, we can do this by opening powershell and running “streams :\Users\Administrator\Desktop\file.txt” This returned a ADS with the name ads.txt. Next we can open this using notepad on the PS by running “notepad c:\Users\Administrator\Desktop\file.txt:ads.txt” This will open notepad with our flag in it.

Task 5  Networking Utilities


Using WHOIS tools, what is the ISP/Organization for the remote address in the screenshots above?

If we go to the whois lookup online and type in the ip 52.154.170.173 we can see that this IP belongs to the Microsoft Corporation

Task 6  Process Utilities


Run Autoruns and inspect what are the new entries in the Image Hijacks tab compared to the screenshots above.

 What entry was updated?

If we use our Autoruns hijacked images we can compare it to the above screenshot and we can see we have more files and the taskmgr.exe was updated

What is the updated value?

If we look over to the right we can see the image path that was updated.

Task 7  Security Utilities

Task 8  System Information

Task 9  Miscellaneous


Run the Strings tool on ZoomIt.exe. What is the full path to the .pdb file?

First we need to make sure were in the tools\systemint directory. Next we just need to run our strings command using “strings .\ZoomIt.exe  | findstr /i .pdb” This is going to find the 2 files with the .pdb in the string and we get the full directory for our flag.

Task 10  Conclusion