holmesctf
This is the first time I participate in a all blue CTF, I am here to write some simple writeups so that I don’t forget what I learned.
The Enduring Echo
For browsing evtx files, I found that many people were using the setup EvtxeCmd and TimelineExplorer. Which can be found here.
By executing the following command, convert the evtx file under the logs folder to a csv file:
.\EvtxECmd.exe -d "D:\ctf\holmes-2025-9-22\The_Enduring_Echo\The_Enduring_Echo\C\Windows\System32\winevt\logs" --csv . --csvf evtx.csv
and then use TimelineExplorer to open the csv file.
Chainsaw might also be a good tool to use. It can be found here.
To further analyse the events, find the likely event ID. This can be found here.
Creating a task under C:/Windows/System32/Tasks
is a common way for persistence.
The registry file is under C:/Windows/System32/config
and is useful for forensics.
The tool impacket might be very useful for various tasks. It can be found here.