Protected: Hack The Box – Reminiscent (Forensics Challenge)
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
Someone took my bytes! Can you recover my password for me? This time all we are given is a single file named password, which is identified simply as data. Examining it in a hex editor doesn’t give many more clues. I began thinking that the data might be encrypted somehow, and threw it into CyberChef. […]
A Junior Developer just switched to a new source control platform. Can you find the secret token? There isn’t much to this challenge. We are given an archive containing some source code and the associated .git directory. Entering into the .git directory… …and reading the Git logs… git log …we can see that commit 47241a47f62ada864ec74bd6dedc4d33f4374699 […]
We have got informed that a hacker managed to get into our internal network after pivoting through the web platform that runs in public internet. He managed to bypass our small product stocks logging platform and then he got our costumer database file. We believe that only one of our costumers was targeted. Can you […]
There is no excerpt because this is a protected post.
Hack The Box is a fantastic free (mostly) resource for anyone wanting to improve their offensive security skills. I’ve had an account for years but since I moved away from offensive work to full-time DFIR I haven’t paid much attention to it. Until, that is, I was pointed at their section of forensics challenges. Rather […]