MAIN
DAY 01
Which CLI command would you use to list a directory?
mcskidy@tbfc-web01:~$ apropos "list directory"
dir (1) - list directory contents
ls (1) - list directory contents
ntfsls (8) - list directory contents on an NTFS filesystem
vdir (1) - list directory contents
For those who consider themself intermediate and want another challenge, check McSkidy's hidden note in /home/mcskidy/Documents/ to get access to the key for Side Quest 1! HINT: Once you have the final flag, use it to unlock the hidden png. Where is it? That's a .secret
DAY 02
Browse to http://10.65.164.171 from within the AttackBox and try to access the mailbox of the factory user to see if the previously harvested admin password has been reused on the email portal. What is the total number of toys expected for delivery?
DAY 03
Examine the firewall logs. How many bytes were transferred to the C2 server IP from the compromised web server?
DAY 04
Complete the AI showcase by progressing through all of the stages. What is the flag presented to you?
Execute the exploit provided by the red team agent against the vulnerable web application hosted at MACHINE_IP:5000. What flag is provided in the script's output after it? Remember, you will need to update the IP address placeholder in the script with the IP of your vulnerable machine (MACHINE_IP:5000)
DAY 05
Exploiting the IDOR found in the view_accounts parameter, what is the user_id of the parent that has 10 children?
Bonus Task: If you want to dive even deeper, use either the base64 or md5 child endpoint and try to find the id_number of the child born on 2019-04-17? To make the iteration faster, consider using something like Burp's Intruder. If you want to check your answer, click the hint on the question.
Bonus Task: Want to go even further? Using the /parents/vouchers/claim endpoint, find the voucher that is valid on 20 November 2025. Insider information tells you that the voucher was generated exactly on the minute somewhere between 20:00 - 24:00 UTC that day. What is the voucher code? If you want to check your answer, click the hint on the question.
DAY 06
Static analysis: Within the strings of HopHelper.exe, a flag with the format THM{XXXXX} exists. What is that flag value? Note, this can be found towards the bottom of the strings output.
Dynamic analysis: Filter the output of ProcMon for "TCP" operations. What network protocol is HopHelper.exe using to communicate? Make sure to have executed HopHelper.exe while ProcMon was open and capturing events.
DAY 07
DAY 08
DAY 09
For those who want another challenge, have a look around the VM to get access to the key for Side Quest 2! Accessible through our Side Quest Hub!
DAY 10
How many accounts were added to the sudoers group in the Linux PrivEsc - User Added to Sudo Group alert?
DAY 11
DAY 12
DAY 13
What regex would you use to match a string that begins with TBFC: followed by one or more alphanumeric ASCII characters?
DAY 14
Bonus Question: There is a secret code contained within the news site running on port 5002; this code also happens to be the password for the deployer user! They should definitely change their password. Can you find it?
DAY 15
Last updated