Tempest
Flags
FLAG SUMMARY
Preparation
What is the SHA256 hash of the capture.pcapng file?
What is the SHA256 hash of the sysmon.evtx file?
What is the SHA256 hash of the windows.evtx file?
Initial Access
The user of this machine was compromised by a malicious document. What is the file name of the document?
What is the name of the compromised user and machine? (username-machine name)
What is the PID of the Microsoft Word process that opened the malicious document?
Based on Sysmon logs, what is the IPv4 address resolved by the malicious domain used in the previous question?
What is the base64 encoded string in the malicious payload executed by the document?
What is the CVE number of the exploit used by the attacker to achieve a remote code execution? (Format: XXXX-XXXXX)
Discovery
The attacker was able to discover a sensitive file inside the machine of the user. What is the password discovered on the aforementioned file?
The attacker then enumerated the list of listening ports inside the machine. What is the listening port that could provide a remote shell inside the machine?
The attacker then established a reverse socks proxy to access the internal services hosted inside the machine. What is the command executed by the attacker to establish the connection? (Format: Remove the double quotes from the log.)
What is the SHA256 hash of the binary used by the attacker to establish the reverse socks proxy connection?
What is the name of the tool used by the attacker based on the SHA256 hash? Provide the answer in lowercase.
The attacker then used the harvested credentials from the machine. Based on the succeeding process after the execution of the socks proxy, what service did the attacker use to authenticate? (Format: Answer in lowercase)
Privilege Escalation
After discovering the privileges of the current user, the attacker then downloaded another binary to be used for privilege escalation. What is the name and the SHA256 hash of the binary? (Format: binary name,SHA256 hash)
Based on the SHA256 hash of the binary, what is the name of the tool used? (Format: Answer in lowercase)
The tool exploits a specific privilege owned by the user. What is the name of the privilege?
Then, the attacker executed the tool with another binary to establish a c2 connection. What is the name of the binary?
The binary connects to a different port from the first c2 connection. What is the port used?
Actions on Objectives
Upon achieving SYSTEM access, the attacker then created two users. What are the account names? (Format: Answer in alphabetical order - comma delimited)
Prior to the successful creation of the accounts, the attacker executed commands that failed in the creation attempt. What is the missing option that made the attempt fail?
Based on windows event logs, the accounts were successfully created. What is the event ID that indicates the account creation activity?
The attacker added one of the accounts in the local administrator's group. What is the command used by the attacker?
Based on windows event logs, the account was successfully added to a sensitive group. What is the event ID that indicates the addition to a sensitive local group?
After the account creation, the attacker executed a technique to establish persistent administrative access. What is the command executed by the attacker to achieve this? (Format: Remove the double quotes from the log.)
Last updated