Fragility
Description
Files
➜ 7z x .\fragility.zip -o"fragility" -p"hacktheblue"
➜ ls
Directory: ~\VBoxShare\fragility
Mode LastWriteTime Length Name
---- ------------- ------ ----
d---- 26.06.2024 17:27 [root]
----- 15.04.2024 01:35 330196 capture.pcapng
----- 15.04.2024 01:58 1546908444 Challenge.7z
Tasks
Task 1. What CVE did the attacker use to exploit the vulnerability?




Task 2. What MITRE technique does the attacker use to maintain persistence?
Task 3. John has adjusted the timezone but hasn't rebooted the computer yet, which has led to some things either being updated or not updated with the new timezone. Identifying the timezone can assist you further in your investigation. What was the default timezone and the timezone after John's adjustment on this machine?
Task 4. When did the attacker SSH in? (UTC)
Task 5. How much time has passed from when the user was first created to when the attacker stopped using SSH?
Task 6. What is the password for the account that the attacker used to backdoor?
Task 7. There is a secret in the exfiltrated file, what is its content?




Task 8. What are the username and password that the attacker uses to access Splunk?
Last updated