Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
file: https://tinyurl.com/y4z72k5o
Password: hacktoberWhat is the name of the executable in the malicious url? Submit the filename as the flag: flag{virus.bad}.What MYDDNS domain is used for the post-infection traffic in RATPack.pcap?
Use the file from Remotely Administrated Evil.We found some unusual activity coming from an employee's Windows 10 workstation at De Monne Financial. Our IT guy saved the memory dump to the file provided below. What was the PID of the program used
volatility -f mem.raw imageinfo > raw_imageinfo.txtVolatility Foundation Volatility Framework 2.6.1
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win10x64_17134, Win10x64_14393, Win10x64_10586, Win10x64_16299, Win2016x64_14393, Win10x64_17763, Win10x64_15063 (Instantiated with Win10x64_15063)
AS Layer1 : SkipDuplicatesAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/home/REDACTED/Downloads/mem.raw)
PAE type : No PAE
DTB : 0x1aa000L
KDBG : 0xf8001e43d520L
Number of Processors : 2
Image Type (Service Pack) : 0
KPCR for CPU 0 : 0xfffff8001d4e2000L
KPCR for CPU 1 : 0xffffd40032268000L
KUSER_SHARED_DATA : 0xfffff78000000000L
Image date and time : 2020-06-26 15:51:36 UTC+0000
Image local date and time : 2020-06-26 08:51:36 -0700volatility -f raw.mem --profile=Win10x64_1734 pstree > raw_pstree.txt Name Pid PPid Thds Hnds Time
-------------------------------------------------- ------ ------ ------ ------ ----
0xffff87868e88d440:System 4 0 111 0 2020-06-26 15:07:32 UTC+0000
. 0xffff878690147040:smss.exe 348 4 2 0 2020-06-26 15:07:32 UTC+0000
. 0xffff87868e975040:Registry 88 4 3 0 2020-06-26 15:07:23 UTC+0000
. 0xffff878690ccc040:MemCompression 1168 4 50 0 2020-06-26 15:07:58 UTC+0000
0xffff878690495080:wininit.exe 528 424 1 0 2020-06-26 15:07:45 UTC+0000
. 0xffff8786904cd080:services.exe 648 528 6 0 2020-06-26 15:07:46 UTC+0000
.. 0xffff8786914d2580:TrustedInstall 2572 648 5 0 2020-06-26 15:43:20 UTC+0000
.. 0xffff878690c8d580:svchost.exe 1052 648 18 0 2020-06-26 15:07:58 UTC+0000
.. 0xffff878690c2d580:svchost.exe 60 648 64 0 2020-06-26 15:07:56 UTC+0000
... 0xffff8786909b0580:sihost.exe 2672 60 15 0 2020-06-26 15:08:51 UTC+0000
... 0xffff87868fa02580:wuauclt.exe 5288 60 7 0 2020-06-26 15:43:18 UTC+0000
... 0xffff8786909e1580:taskhostw.exe 2764 60 10 0 2020-06-26 15:08:52 UTC+0000 .... 0xffff87868f2e1080:winpmem_v3.3.r 3348 784 5 0 2020-06-26 15:51:36 UTC+0000 
File: https://tinyurl.com/y259doyq
Password: hacktober
The amcache can be a pretty handy tool to help build out a timeline of execution during an investigation, and is always located in \%SystemRoot%\AppCompat\Programs\Amcache.hve what was the application
A malicious dll was downloaded over http in this traffic, what was the ip address that delivered this file?What is the domain used by the post-infection traffic over HTTPS?
Use the file from An Evil Christmas Carol.AmcacheParser.exe -f "Amcache.hve" --csv OutputFolderAuthor: syyntax
We've obtained access to a server maintained by spookyboi. There are four flag files that we need you to read and submit (flag1.txt, flag2.txt, etc). Submit the contents of flag1.txt.
ssh hacktober@env.hacktober.io
Password: hacktober-Underdog-Truth-Glimpseluciafer@40504779afeb:~/Documents$ ls -alt
total 20
drwxrwxr-x 1 luciafer luciafer 4096 Oct 6 08:36 .
-rw-rw-r-- 1 luciafer luciafer 47 Oct 6 08:36 .flag2.txt
-rw-rw-r-- 1 luciafer luciafer 47 Oct 5 14:55 flag1.txt
drwxr-xr-x 1 luciafer luciafer 4096 Oct 5 14:54 ..luciafer@40504779afeb:/root$ find / -perm -u=s -type f 2>/dev/null
/usr/bin/umount
/usr/bin/passwd
/usr/bin/mount
/usr/bin/gpasswd
/usr/bin/su
/usr/bin/chsh
/usr/bin/newgrp
/usr/bin/chfn
/usr/local/bin/ouija
/usr/lib/openssh/ssh-keysign
/usr/lib/dbus-1.0/dbus-daemon-launch-helperluciafer@40504779afeb:/root$ /usr/local/bin/ouija
OUIJA 6.66 - Read files in the /root directory
Usage: ouija [FILENAME]
EXAMPLES:
ouija file.txt
ouija read.meluciafer@40504779afeb:/root$luciafer@40504779afeb:/root$ /usr/local/bin/ouija flag4.txt
flag{4781cbffd13df6622565d45e790b4aac2a4054dc}luciafer@40504779afeb:/root$ /usr/local/bin/ouija ../home/spookyboi/Documents/flag3.txt
flag{445b987b5b80e445c3147314dbfa71acd79c2b67}



What is the MD5 hash of the Windows executable file?
NOTE: If you extract any files within this challenge, please delete the file after you have completed thelink: https://tinyurl.com/y3oltdh5
password: hacktoberThe malware uses four different ip addresses and ports for communication, what IP uses the same port as https? Submit the flag as: flag{ip address}.
Use the file from Evil Corp's Child.What is the localityName in the Certificate Issuer data for HTTPS traffic to 37.205.9.252?
Use the file from Evil Corp's Child.Some of the Forensics Challenges from Hacktoberfest CTF 2020.




aka working with pcaps