Description
Jacky improved the BitLocker password, but you captured RAM while the drive was unlocked. Sift through the memory dump to recover the plaintext flag without brute-forcing the disk.
Setup
Decompress the memory dump and search it for picoCTF strings (or use Volatility/Autopsy to locate flagged artifacts).
gunzip memdump.mem.gz
strings memdump.mem | grep picoCTF
Solution
- Step 1Scan the memory imageBecause the drive was mounted when the RAM dump was captured, plaintext copies of the flag remain in memory. `strings memdump.mem | grep picoCTF` reveals multiple hits.
- Step 2Optional: use VolatilityVolatility 3’s windows.memory.string plugin (or Autopsy’s Volatility integration) can also search the dump for picoCTF, producing the same string.
Flag
picoCTF{B1tl0ck3r_dr1v3_d3crypt3d_902...}
No password cracking is necessary because the RAM capture already contains the decrypted flag.