Honeypot Santa really encourages people to be at his good list but sometimes he is a bit naughty himself. He is using a Windows 7 honeypot to capture any suspicious action. Since he is not a forensics expert, can you help him identify any indications of compromise?
Flag Format: HTB{echo -n "http://url.com/path.foo_PID_127.0.0.1" | md5sum} Download Link: http://46.101.25.140/forensics_honeypot.zip
Action | Rating | Author team |
---|---|---|
Read writeup |
not rated
|
origineel |
Read writeup |
not rated
|
ducks0ci3ty |
Read writeup |
not rated
|
LazyTitan |
Read writeup |
not rated
|
LEZEMMDBI5LG2YSHIZXA |
Read writeup |
not rated
|
rawsec |