-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathchallenge.yml
45 lines (34 loc) · 1.22 KB
/
challenge.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
---
name: Where all problems starts 1/4
author: Worty
category: Forensics
description: "For a change of pace, a company has been attacked again...
Nevertheless, the means used here is quite original, indeed, it would be apparently a food delivery man who would be at the origin of the initial compromise...
For your first analysis, you will have to found what the USB key that the delivery man put in the computer contains.
Could you provide us the malicious URL used to download something ?
/!\ WARNING : This challenge contains malicious file that can harm your computer ! Do not run them on your host machine ! I am not responsible for any potential damage to your machine. /!\
- [Download file](https://drive.google.com/file/d/1qiVubOoLjAegv2rb7IIJbnNgepAFOSai/view?usp=sharing)
```
md5sum dump.7z : c4125d54d6d54441086403912e44043a
md5sum usb.dump : 8373029010f38b57042f5fb436058a1f
```
Format : Hero{}<br>Author : Worty"
value: null
type: dynamic
extra:
initial: 500
decay: 100
minimum: 50
image: null
host: null
flags:
- {
type: "static",
content: "Hero{http://146.59.156.82/img.png}",
data: "case_insensitive",
}
tags:
- "very easy"
- forensics
state: visible
version: "0.1"