Points: 300

Tags: forensics 

Poll rating:

Honeypot Santa really encourages people to be at his good list but sometimes he is a bit naughty himself. He is using a Windows 7 honeypot to capture any suspicious action. Since he is not a forensics expert, can you help him identify any indications of compromise?

  1. Find the full URL used to download the malware.
  2. Find the malicious's process ID.
  3. Find the attackers IP

Flag Format: HTB{echo -n "http://url.com/path.foo_PID_127.0.0.1" | md5sum} Download Link: http://46.101.25.140/forensics_honeypot.zip

Writeups

ActionRatingAuthor team
Read writeup
not rated
origineel
Read writeup
not rated
ducks0ci3ty
Read writeup
not rated
LazyTitan
Read writeup
not rated
LEZEMMDBI5LG2YSHIZXA
Read writeup
not rated
rawsec
You need to authenticate and join a team to post writeups