Pandora's friend and partner, Wade, is the one that leads the investigation into the relic's location. Recently, he noticed some weird traffic coming from his host. That led him to believe that his host was compromised. After a quick investigation, his fear was confirmed. Pandora tries now to see if the attacker caused the suspicious traffic during the exfiltration phase. Pandora believes that the malicious actor used rclone to exfiltrate Wade's research to the cloud. Using the tool called "chainsaw" and the sigma rules provided, can you detect the usage of rclone from the event logs produced by Sysmon? To get the flag, you need to start and connect to the docker service and answer all the questions correctly.
Action | Rating | Author team |
---|---|---|
Read writeup |
not rated
|
hamayanhamayan2 |
Read writeup |
not rated
|
Abyss Watchers |
Read writeup |
not rated
|
MvtinaPwn |
Read writeup |
not rated
|
pilum murialis |