Directory
Do you have what it takes to crack this case? - by hadrian3689


What ports did the threat actor initially find open? Format: from lowest to highest, separated by a comma.

The threat actor found four valid usernames, but only one username allowed the attacker to achieve a foothold on the server. What was the username?






The threat actor captured a hash from the user in question 2. What are the last 30 characters of that hash?




What is the user's password?






What were the second and third commands that the threat actor executed on the system? Format: command1,command2










What is the flag?

Recommendation
Last updated
Was this helpful?