Points: 300

Tags: forensics 

Poll rating:

Pandora's friend and partner, Wade, is the one that leads the investigation into the relic's location. Recently, he noticed some weird traffic coming from his host. That led him to believe that his host was compromised. After a quick investigation, his fear was confirmed. Pandora tries now to see if the attacker caused the suspicious traffic during the exfiltration phase. Pandora believes that the malicious actor used rclone to exfiltrate Wade's research to the cloud. Using the tool called "chainsaw" and the sigma rules provided, can you detect the usage of rclone from the event logs produced by Sysmon? To get the flag, you need to start and connect to the docker service and answer all the questions correctly.

Writeups

ActionRatingAuthor team
Read writeup
not rated
hamayanhamayan2
Read writeup
not rated
Abyss Watchers
Read writeup
not rated
MvtinaPwn
Read writeup
not rated
pilum murialis
You need to authenticate and join a team to post writeups