file
command and uncover a Windows shortcut.Exiftool
.Commands & Tools Used : Find, Exiftool, Github.
Commands & Tools Used : Elastic SIEM, CyberChef.
frostypines
. After adjusting few filter we found some trace (path and unusual ip) of web shell.Commands & Tools Used : ELK (Elasticsearch, Logstash, and Kibana), ls, cat.
T1566.001 Spearphishing
using the Atomic Red Team library.a command and scripting interpreter on Windows command shell
.T1059.003 Command and Scripting Interpreter: Windows Command Shell
we iterate through each test until a file is created and we found our flag.
Commands & Tools Used : Atomic Red Team Library, Sysmon.
/wishes/wish_1.txt
that possibly admins use to see different wishes submited by users.BurpSuite
to found that wish is submitted as XML to /wishlist.php
.<!DOCTYPE foo [<!ENTITY payload SYSTEM "/var/www/html/wishes/wish_1.txt"> ]>
as external entity and &payload;
in XML request & get access to admin only data.
Commands & Tools Used : Burp Suite.
Commands & Tools Used : YARA, Sysmon, CyberChef, FLOSS.
jq
and grep
with different filters to identify the individual responsible for modifying the QR code on the donation website.
Commands & Tools Used : JQ, grep.
Commands & Tools Used : msfvenom, nc.
Metasploit Framework
to create a malicious macro.Metasploit Framework
to listen to incoming connection.Commands & Tools Used : Metasploit Framework.
iw
set our wifi into monitor mode.airodump-ng
to scan for nearby networks.aircrack-ng
to get the password.
Commands & Tools Used : iw, airodump-ng, aircrack-ng, aireplay-ng.
Time-of-Check to Time-of-Use (TOCTOU)
flaw, we intercepted money transfer request in Burp Suite.Commands & Tools Used : Burp Suite.
BurpSuite
.userId
of WebSocket messages to track other’s car.Commands & Tools Used : Burp Suite.
local dns resolution
using /etc/hosts
file to avoid trace in dns logs.Commands & Tools Used : Burp Suite.
(Group Policy Objects)
.
Commands & Tools Used : Windows Event Viewer.
Commands & Tools Used : Azure CLI.
Commands & Tools Used : Splunk.
Commands & Tools Used : tcpdump, netcat.
Commands & Tools Used : Frida, Vscode.
Commands & Tools Used : Wireshark, CyberChef.
WarevilleApp.exe
, using PEStudio for static analysis and ILSpy for decompiling to reveal its malicious functionality.Commands & Tools Used : PEStudio, ILSpy.
Kubernetes
pod logs of compromised web application.shelly.php
access from an unexpected IP. The webshell was present even after reboot so it was part of the docker image itself.shelly.php
which is a web shell.Commands & Tools Used : minikube, kubectl, docker.
hash-id.py
identified a hash type of a password hash.rockyou.txt
wordlist.pdf2john.pl
.--rules=single
option, cracked the PDF password.
Commands & Tools Used : John The Ripepr, hash-id.py, pdf2john.pl.
MQTT (Message Queuing Telemetry Transport)
traffic using Wireshark, examined captured packets in file challenge.pcapng
to get the correct message which would turn on the lights.mosquitto_pub
to publish the correct message to the devices which turn the lights on.
Commands & Tools Used : Wireshark, mosquitto_pub.