MAIN
DAY 01
Looks like the song.mp3 file is not what we expected! Run "exiftool song.mp3" in your terminal to find out the author of the song. Who is the author?
root@thm:~$ exiftool song.mp3
* Artist: Tyler RamsbeyThe malicious PowerShell script sends stolen info to a C2 server. What is the URL of this C2 server?
DAY 02
DAY 03
DAY 04
What was the flag found in the .txt file that is found in the same directory as the PhishingAttachment.xslm artefact?
DAY 05
DAY 06
What is the flag found in the malstrings.txt document after running floss.exe, and opening the file in a text editor?
DAY 07
DAY 08
What is the flag value once Glitch gets reverse shell on the digital vault using port 4444? Note: The flag may take around a minute to appear in the C:\Users\glitch\Desktop directory. You can view the content of the flag by using the command type C:\Users\glitch\Desktop\flag.txt.
DAY 09
DAY 10
DAY 11
DAY 12
DAY 13
DAY 14
Look inside the POST requests in the HTTP history. What is the password for the snowballelf account?
Use the credentials for any of the elves to authenticate to the Gift Scheduler website. What is the flag shown on the elves’ scheduling page?
Mayor Malware finally succeeded in his evil intent: with Marta May Ware’s username and password, he can finally access the administrative console for the Gift Scheduler. G-Day is cancelled! What is the flag shown on the admin page?
DAY 15
Use the "Security" tab within Event Viewer to answer questions 1 and 2. On what day was Glitch_Malware last logged in? Answer format: DD/MM/YYYY
Use the "Security" tab within Event Viewer to answer questions 1 and 2. What event ID shows the login of the Glitch_Malware user?
Read the PowerShell history of the Administrator account. What was the command that was used to enumerate Active Directory users?
Look in the PowerShell log file located in Application and Services Logs -> Windows PowerShell. What was Glitch_Malware's set password?
DAY 16
DAY 17
Extract all the events from the cctv_feed logs. How many logs were captured associated with the successful login?
DAY 18
What query should we use if we wanted to get the "status" of the health service from the in-house API?
DAY 19
DAY 20
DAY 21
Once you execute the WarevilleApp.exe, it downloads another binary to the Downloads folder. What is the name of the binary?
The stage 2 binary is executed automatically and creates a zip file comprising the victim's computer data; what is the name of the zip file?
DAY 22
What tool did Mayor Malware search for that could be used to create a remote connection from the pod?
DAY 23
DAY 24
DAY 25
What is the flag you get at the end of the survey?
Last updated