Via a database breach we've managed to obtain credentials for a malicious developer, and located a workstation they have previously used to develop their kernel backdoors. Luckily, they forgot to uninstall it from their own system - can you use their own tools against them and uncover their secrets?
user: Dev
password: developer
Action | Rating | Author team |
---|---|---|
Read writeup |
not rated
|
PwntasticFour |