MAIN

DAY 01

Looks like the song.mp3 file is not what we expected! Run "exiftool song.mp3" in your terminal to find out the author of the song. Who is the author?
root@thm:~$ exiftool song.mp3
 * Artist: Tyler Ramsbey
The malicious PowerShell script sends stolen info to a C2 server. What is the URL of this C2 server?
Who is M.M? Maybe his Github profile page would provide clues?
What is the number of commits on the GitHub repo where the issue was raised?

DAY 02

What is the name of the account causing all the failed login attempts?
How many failed logon attempts were observed?
What is the IP address of Glitch?
When did Glitch successfully logon to ADM-01? Format: MMM D, YYYY HH:MM:SS.SSS
What is the decoded command executed by Glitch to fix the systems of Wareville?

DAY 03

Where was the web shell uploaded to?
What IP address accessed the web shell?
What is the contents of the flag.txt?

DAY 04

What was the flag found in the .txt file that is found in the same directory as the PhishingAttachment.xslm artefact?
What ATT&CK technique ID would be our point of interest?
What ATT&CK subtechnique ID focuses on the Windows Command Shell?
What is the name of the Atomic Test to be simulated?
What is the name of the file used in the test?
What is the flag found from this Atomic Test?

DAY 05

What is the flag discovered after navigating through the wishes?
What is the flag seen on the possible proof of sabotage?

DAY 06

What is the flag displayed in the popup window after the EDR detects the malware?
What is the flag found in the malstrings.txt document after running floss.exe, and opening the file in a text editor?

DAY 07

What is the other activity made by the user glitch aside from the ListObject action?
Based on the eventSource field, what AWS service generates the ConsoleLogin event?
When did the anomalous user trigger the ConsoleLogin event?
What was the name of the user that was created by the mcskidy user?
What type of access was assigned to the anomalous user?
Which IP does Mayor Malware typically use to log into AWS?
What is McSkidy's actual IP address?
What is the bank account number owned by Mayor Malware?

DAY 08

What is the flag value once Glitch gets reverse shell on the digital vault using port 4444? Note: The flag may take around a minute to appear in the C:\Users\glitch\Desktop directory. You can view the content of the flag by using the command type C:\Users\glitch\Desktop\flag.txt.

DAY 09

What does GRC stand for?
What is the flag you receive after performing the risk assessment?

DAY 10

What is the flag value inside the flag.txt file that’s located on the Administrator’s desktop?

DAY 11

What is the BSSID of our wireless interface?
What is the SSID and BSSID of the access point? Format: SSID, BSSID
What is the BSSID of the wireless interface that is already connected to the access point?
What is the PSK after performing the WPA cracking attack?

DAY 12

What is the flag value after transferring over $2000 from Glitch's account?

DAY 13

What is the value of Flag1?
What is the value of Flag2?

DAY 14

What is the name of the CA that has signed the Gift Scheduler certificate?
Look inside the POST requests in the HTTP history. What is the password for the snowballelf account?
Use the credentials for any of the elves to authenticate to the Gift Scheduler website. What is the flag shown on the elves’ scheduling page?
What is the password for Marta May Ware’s account?
Mayor Malware finally succeeded in his evil intent: with Marta May Ware’s username and password, he can finally access the administrative console for the Gift Scheduler. G-Day is cancelled! What is the flag shown on the admin page?

DAY 15

Use the "Security" tab within Event Viewer to answer questions 1 and 2. On what day was Glitch_Malware last logged in? Answer format: DD/MM/YYYY
Use the "Security" tab within Event Viewer to answer questions 1 and 2. What event ID shows the login of the Glitch_Malware user?
Read the PowerShell history of the Administrator account. What was the command that was used to enumerate Active Directory users?
Look in the PowerShell log file located in Application and Services Logs -> Windows PowerShell. What was Glitch_Malware's set password?
Review the Group Policy Objects present on the machine. What is the name of the installed GPO?

DAY 16

What is the password for backupware that was leaked?
What is the group ID of the Secret Recovery Group?
What is the name of the vault secret?
What are the contents of the secret stored in the vault?

DAY 17

Extract all the events from the cctv_feed logs. How many logs were captured associated with the successful login?
What is the Session_id associated with the attacker who deleted the recording?
What is the name of the attacker found in the logs, who deleted the CCTV footage?

DAY 18

What is the technical term for a set of rules and instructions given to a chatbot?
What query should we use if we wanted to get the "status" of the health service from the in-house API?
Perform a prompt injection attack that leads to a reverse shell on the target machine.
After achieving a reverse shell, look around for a flag.txt. What is the value?

DAY 19

What is the OTP flag?
What is the billionaire item flag?
What is the biometric flag?

DAY 20

What was the first message the payload sent to Mayor Malware’s C2?
What was the IP address of the C2 server?
What was the command sent by the C2 server to the target machine?
What was the filename of the critical file exfiltrated by the C2 server?
What secret message was sent back to the C2 in an encrypted format through beacons?

DAY 21

What is the function name that downloads and executes files in the WarevilleApp.exe?
Once you execute the WarevilleApp.exe, it downloads another binary to the Downloads folder. What is the name of the binary?
What domain name is the one from where the file is downloaded after running WarevilleApp.exe?
The stage 2 binary is executed automatically and creates a zip file comprising the victim's computer data; what is the name of the zip file?
What is the name of the C2 server where the stage 2 binary tries to upload files?

DAY 22

What is the name of the webshell that was used by Mayor Malware?
What file did Mayor Malware read from the pod?
What tool did Mayor Malware search for that could be used to create a remote connection from the pod?
What IP connected to the docker registry that was unexpected?
At what time is the first connection made from this IP to the docker registry?
At what time is the updated malicious image pushed to the registry?
What is the value stored in the "pull-creds" secret?

DAY 23

Crack the hash value stored in hash1.txt. What was the password?
What is the flag at the top of the private.pdf file?

DAY 24

What is the flag?

DAY 25

What is the flag you get at the end of the survey?

Last updated