We need to know how the attacker gained access to our network.
The team discovered that some of our employees where targeted by a phishing attempt and got this excel file from their emails.
Can you check if this was used to gain a foothold in our network?
Flag format:
flag{string}
Action | Rating | Author team |
---|---|---|
Read writeup |
not rated
|
Cyb3rTh1eveZ |
Read writeup |
not rated
|
Byt3Scr4pp3rs |
Read writeup |
not rated
|
Hackatsuk1 |