You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Advent-of-Cyber-2021/Day-06-Patch_Management_Is_Hard/README.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,10 +21,10 @@ Now that you read the index.php, there is a login credential PHP file's path. Us
21
21
22
22
- `**************************`
23
23
24
-
The web application logs all users' requests, and only authorized users can read the log file. Use the LFI to gain RCE via the log file page. What is the hostname of the webserver? The log file location is at ./includes/logs/app_access.log.
24
+
-The web application logs all users' requests, and only authorized users can read the log file. Use the LFI to gain RCE via the log file page. What is the hostname of the webserver? The log file location is at ./includes/logs/app_access.log.
25
25
26
26
- `**************************************`
27
27
28
-
Bonus: The current PHP configuration stores the PHP session files in /tmp. Use the LFI to call the PHP session file to get your PHP code executed.
28
+
-Bonus: The current PHP configuration stores the PHP session files in /tmp. Use the LFI to call the PHP session file to get your PHP code executed.
Copy file name to clipboardExpand all lines: Advent-of-Cyber-2021/Day-07-Migration_Without_Security/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,18 +2,18 @@
2
2
3
3
- Interact with the MongoDB server to find the flag. What is the flag?
4
4
5
-
-`***{********************************}`
5
+
-`***{********************************}`
6
6
7
7
We discussed how to bypass login pages as an admin. Can you log into the application that Grinch Enterprise controls as admin and retrieve the flag?
8
8
9
9
Use the knowledge given in AoC3 day 4 to setup and run Burp Suite proxy to intercept the HTTP request for the login page. Then modify the POST parameter.
10
10
11
-
-`***{********************************}`
11
+
-`***{********************************}`
12
12
13
13
- Once you are logged in, use the gift search page to list all usernames that have guest roles. What is the flag?
14
14
15
-
-`***{********************************}`
15
+
-`***{********************************}`
16
16
17
17
- Use the gift search page to perform NoSQL injection and retrieve the mcskidy record. What is the details record?
Copy file name to clipboardExpand all lines: Advent-of-Cyber-2021/Day-08-Santas_Bag_of_Toys/README.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,17 +15,17 @@ Open the first transcription log. You can see the commands and output for everyt
15
15
16
16
- What operating system is Santa's laptop running ("OS Name")?
17
17
18
-
-`********* ******* ** ***`
18
+
- `********* ******* ** ***`
19
19
20
20
Review each transcription log to get an idea for what activity was performed on the laptop just after it went missing. In the "second" transcription log, it seems as if the perpetrator created a backdoor user account!
21
21
22
22
- What was the password set for the new "backdoor" account?
23
23
24
-
-`********************`
24
+
- `********************`
25
25
26
26
- In one of the transcription logs, the bad actor interacts with the target under the new backdoor user account, and copies a unique file to the Desktop. Before it is copied to the Desktop, what is the full path of the original file?
The actor uses a Living Off The Land binary (LOLbin) to encode this file, and then verifies it succeeded by viewing the output file. What is the name of this LOLbin?
31
31
@@ -39,21 +39,21 @@ Under the Desktop folder, there seems to be a suspicious folder named "SantaRat"
39
39
40
40
- Drill down into the folders and see if you can find anything that might indicate how we could better track down what this SantaRat really is. What specific folder name clues us in that this might be publicly accessible software hosted on a code-sharing platform?
41
41
42
-
-`******`
42
+
- `******`
43
43
44
44
Additionally, there is a unique folder named "Bag of Toys" on the Desktop! This must be where Santa prepares his collection of toys, and this is certainly sensitive data that the actor could have compromised. What is the name of the file found in this folder?
45
45
46
46
- What is the name of the user that owns the SantaRat repository?
47
47
48
-
-`**********`
48
+
- `**********`
49
49
50
50
- Explore the other repositories that this user owns. What is the name of the repository that seems especially pertinent to our investigation?
51
51
52
-
-`*********************`
52
+
- `*********************`
53
53
54
54
- Read the information presented in this repository. It seems as if the actor has, in fact, compromised and tampered with Santa's bag of toys! You can review the activity in the transcription logs. It looks as if the actor installed a special utility to collect and eventually exfiltrate the bag of toys. What is the name of the executable that installed a unique utility the actor used to collect the bag of toys?
55
55
56
-
-`*****************.***`
56
+
- `*****************.***`
57
57
58
58
In the last transcription log, you can see the activity that this actor used to tamper with Santa's bag of toys! It looks as if they collected the original contents with a UHA archive. A UHA archive is similar to a ZIP or RAR archive, but faster and with better compression rates. It is very rare to see, but it looks the Grinch Enterprises are pulling out all the tricks!
59
59
@@ -66,7 +66,7 @@ We know that the actor seemingly collected the original bag of toys. Maybe there
66
66
67
67
- What is the password to the original bag_of_toys.uha archive? (You do not need to perform any password-cracking or bruteforce attempts)
68
68
69
-
-`***************************`
69
+
- `***************************`
70
70
71
71
McSkidy was able to download and save a copy of the bag_of_toys.uha archive, and you have it accessible on the Desktop of the Windows analysis machine. After uncovering the password from the actor's GitHub repository, you have everything you need to restore Santa's original bag of toys!!
72
72
@@ -76,4 +76,4 @@ With that, you have successfully recovered the original contents of Santa's Bag
76
76
77
77
- How many original files were present in Santa's Bag of Toys?
Copy file name to clipboardExpand all lines: Advent-of-Cyber-2021/Day-10-Offensive_Is_The_Best_Defence/README.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,36 +2,36 @@
2
2
3
3
- Help McSkidy and run nmap -sT MACHINE_IP. How many ports are open between 1 and 100?
4
4
5
-
-`*`
5
+
- `*`
6
6
7
7
- What is the smallest port number that is open?
8
8
9
-
-`**`
9
+
- `**`
10
10
11
11
- What is the service related to the highest port number you found in the first question?
12
12
13
-
-`****`
13
+
- `****`
14
14
15
15
- Now run nmap -sS MACHINE_IP. Did you get the same results? (Y/N)
16
16
17
-
-`*`
17
+
- `*`
18
18
19
19
- If you want Nmap to detect the version info of the services installed, you can use nmap -sV MACHINE_IP. What is the version number of the web server?
20
20
21
-
-`*****************`
21
+
- `*****************`
22
22
23
23
- By checking the vulnerabilities related to the installed web server, you learn that there is a critical vulnerability that allows path traversal and remote code execution. Now you can tell McSkidy that Grinch Enterprises used this vulnerability. What is the CVE number of the vulnerability that was solved in version 2.4.51?
24
24
25
-
-`**************`
25
+
- `**************`
26
26
27
27
- You are putting the pieces together and have a good idea of how your web server was exploited. McSkidy is suspicious that the attacker might have installed a backdoor. She asks you to check if there is some service listening on an uncommon port, i.e. outside the 1000 common ports that Nmap scans by default. She explains that adding -p1-65535 or -p- will scan all 65,535 TCP ports instead of only scanning the 1000 most common ports. What is the port number that appeared in the results now?
28
28
29
-
-`*****`
29
+
- `*****`
30
30
31
31
- What is the name of the program listening on the newly discovered port?
32
32
33
-
-`*******`
33
+
- `*******`
34
34
35
35
If you would like to learn more about the topics covered in today’s tasks, we recommend checking out the Network Security module.
0 commit comments