MAIN

DAY 01

Which CLI command would you use to list a directory?
mcskidy@tbfc-web01:~$ apropos "list directory"
 dir (1)              - list directory contents
 ls (1)               - list directory contents
 ntfsls (8)           - list directory contents on an NTFS filesystem
 vdir (1)             - list directory contents

What flag did you see inside of the McSkidy's guide?

Which command helped you filter the logs for failed logins?

What flag did you see inside the Eggstrike script?

Which command would you run to switch to the root user?

Finally, what flag did Sir Carrotbane leave in the root bash history?

For those who consider themself intermediate and want another challenge, check McSkidy's hidden note in /home/mcskidy/Documents/ to get access to the key for Side Quest 1! HINT: Once you have the final flag, use it to unlock the hidden png. Where is it? That's a .secret

DAY 02

What is the password used to access the TBFC portal?

Browse to http://10.65.164.171 from within the AttackBox and try to access the mailbox of the factory user to see if the previously harvested admin password has been reused on the email portal. What is the total number of toys expected for delivery?

DAY 03

What is the attacker IP found attacking and compromising the web server?

Which day was the peak traffic in the logs? (Format: YYYY-MM-DD)

What is the count of Havij user_agent events found in the logs?

How many path traversal attempts to access sensitive files on the server were observed?

Examine the firewall logs. How many bytes were transferred to the C2 server IP from the compromised web server?

DAY 04

Complete the AI showcase by progressing through all of the stages. What is the flag presented to you?

Execute the exploit provided by the red team agent against the vulnerable web application hosted at MACHINE_IP:5000. What flag is provided in the script's output after it? Remember, you will need to update the IP address placeholder in the script with the IP of your vulnerable machine (MACHINE_IP:5000)

DAY 05

What does IDOR stand for?

What type of privilege escalation are most IDOR cases?

Exploiting the IDOR found in the view_accounts parameter, what is the user_id of the parent that has 10 children?

Bonus Task: If you want to dive even deeper, use either the base64 or md5 child endpoint and try to find the id_number of the child born on 2019-04-17? To make the iteration faster, consider using something like Burp's Intruder. If you want to check your answer, click the hint on the question.


Bonus Task: Want to go even further? Using the /parents/vouchers/claim endpoint, find the voucher that is valid on 20 November 2025. Insider information tells you that the voucher was generated exactly on the minute somewhere between 20:00 - 24:00 UTC that day. What is the voucher code? If you want to check your answer, click the hint on the question.

DAY 06

Static analysis: What is the SHA256Sum of the HopHelper.exe?

Static analysis: Within the strings of HopHelper.exe, a flag with the format THM{XXXXX} exists. What is that flag value? Note, this can be found towards the bottom of the strings output.

Dynamic analysis: What registry value has the HopHelper.exe modified for persistence?

Dynamic analysis: Filter the output of ProcMon for "TCP" operations. What network protocol is HopHelper.exe using to communicate? Make sure to have executed HopHelper.exe while ProcMon was open and capturing events.

DAY 07

What evil message do you see on top of the website?

What is the first key part found on the FTP server?

What is the second key part found in the TBFC app?

What is the third key part found in the DNS records?

Which port was the MySQL database running on?

Finally, what's the flag you found in the database?

DAY 08

What is the flag provided when SOC-mas is restored in the calendar?

DAY 09

What is the flag inside the encrypted PDF?

What is the flag inside the encrypted zip file?

For those who want another challenge, have a look around the VM to get access to the key for Side Quest 2! Accessible through our Side Quest Hub!

DAY 10

How many entities are affected by the Linux PrivEsc - Polkit Exploit Attempt alert?

What is the severity of the Linux PrivEsc - Sudo Shadow Access alert?

How many accounts were added to the sudoers group in the Linux PrivEsc - User Added to Sudo Group alert?

What is the name of the kernel module installed in websrv-01?

What is the unusual command executed within websrv-01 by the ops user?

What is the source IP address of the first successful SSH login to storage-01?

What is the external source IP that successfully logged in as root to app-01?

Aside from the backup user, what is the name of the user added to the sudoers group inside app-01?

DAY 11

Which type of XSS attack requires payloads to be persisted on the backend?

What's the reflected XSS flag?

What's the stored XSS flag?

DAY 12

Classify the 1st email, what's the flag?

Classify the 2nd email. What's the flag?

Classify the 3rd email. What's the flag?

Classify the 4th email. What's the flag?

Classify the 5th email. What's the flag?

Classify the 6th email. What's the flag?

DAY 13

How many images contain the string TBFC?

What regex would you use to match a string that begins with TBFC: followed by one or more alphanumeric ASCII characters?

What is the message sent by McSkidy?

DAY 14

What exact command lists running Docker containers?

What file is used to define the instructions for building a Docker image?

What's the flag?

Bonus Question: There is a secret code contained within the news site running on port 5002; this code also happens to be the password for the deployer user! They should definitely change their password. Can you find it?

DAY 15

What is the reconnaissance executable file name?

What executable did the attacker attempt to run through the command injection?

DAY 16

What application was installed on the dispatch-srv01 before the abnormal activity started?

What is the full path where the user launched the application (found in question 1) from?

Which value was added by the application to maintain persistence on startup?

DAY 17

What is the password for the first lock?

What is the password for the second lock?

What is the password for the third lock?

What is the password for the fourth lock?

What is the password for the fifth lock?

What is the retrieved flag?

DAY 18

What is the first flag you get after deobfuscating the C2 URL and running the script?

What is the second flag you get after obfuscating the API key and running the script again?

DAY 19

What port is commonly used by Modbus TCP?


Now that you understand how the system works, the mission is yours, hack it back and save Christmas! What's the flag?

DAY 20

What is the flag value once the stocks are negative for SleighToy Limited Edition?

Repeat the same steps as were done for ordering the SleighToy Limited Edition. What is the flag value once the stocks are negative for Bunny Plush (Blue)?

DAY 21

What is the title of the HTA application?

What VBScript function is acting as if it is downloading the survey questions?

What URL domain (including sub-domain) is the "questions" being downloaded from?

Malhare seems to be using typosquatting, domains that look the same as the real one, in an attempt to hide the fact that the domain is not the intended one, what character in the domain gives this away?

Malicious HTAs often include real-looking data, like survey questions, to make the file seem authentic. How many questions does the survey have?

Notice how even in code, social engineering persists, fake incentives like contests or trips hide in plain sight to build trust. The survey entices participation by promising a chance to win a trip to where?

The HTA is enumerating information from the local host executing the application. What two pieces of information about the computer it is running on are being exfiltrated? You should provide the two object names separated by commas.

What endpoint is the enumerated data being exfiltrated to?

What HTTP method is being used to exfiltrate the data?

After reviewing the function intended to get the survey questions, it seems that the data from the download of the questions is actually being executed. What is the line of code that executes the contents of the download?

It seems as if the malware site has been taken down, so we cannot download the contents that the malware was executing. Fortunately, one of the elves created a copy when the site was still active. Download the contents from here. What popular encoding scheme was used in an attempt to obfuscate the download?

Decode the payload. It seems as if additional steps where taken to hide the malware! What common encryption scheme was used in the script?

Either run the script or decrypt the flag value using online tools such as CyberChef. What is the flag value?

For those who want another challenge, download the HTA file from here to get the key for Side Quest 4, accessible through our Side Quest Hub. The password for the file is CanYouREM3?.

DAY 22

How many hosts are communicating with malhare.net?

Which Threat Modifier tells us the number of hosts communicating to a certain destination?

What is the highest number of connections to rabbithole.malhare.net?

Which search filter would you use to search for all entries that communicate to rabbithole.malhare.net with a beacon score greater than 70% and sorted by connection duration (descending)?

Which port did the host 10.0.0.13 use to connect to rabbithole.malhare.net?

DAY 23

Run aws sts get-caller-identity. What is the number shown for the "Account" parameter?

What IAM component is used to describe the permissions to be assigned to a user or a group?

What is the name of the policy assigned to sir.carrotbane?

Apart from GetObject and ListBucket, what other action can be taken by assuming the bucketmaster role?

What are the contents of the cloud_password.txt file?

DAY 24

Make a POST request to the /post.php endpoint with the username admin and the password admin. What is the flag you receive?

Make a request to the /cookie.php endpoint with the username admin and the password admin and save the cookie. Reuse that saved cookie at the same endpoint. What is the flag your receive?

After doing the brute force on the /bruteforce.php endpoint, what is the password of the admin user?

Make a request to the /agent.php endpoint with the user-agent TBFC. What is the flag your receive?

Bonus question: Can you solve the Final Mission and get the flag?

Last updated