arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

Remotely Administered Evil 1 and 2

hashtag
link to file:

hashtag
Remotely Administered Evil 1:

hashtag
Briefing:

Simply opening it up in wireshark, we can see the flag-

flag{solut.exe}

hashtag
Remotely Administered Evil 2:

hashtag
Briefing:

All you need to do here is filter for dns traffic. Because there weren't too many packets, I spotted the flag almost immediately and didn't have to filter further.

flag{solution.myddns.me}

file: https://tinyurl.com/y4z72k5o
Password: hacktober
What is the name of the executable in the malicious url? Submit the filename as the flag: flag{virus.bad}.
What MYDDNS domain is used for the post-infection traffic in RATPack.pcap?
Use the file from Remotely Administrated Evil.