h4cked
Task 1: Oh no! We've been hacked!

It seems like our machine got hacked by an anonymous threat actor. However, we are lucky to have a .pcap file from the attack. Can you determine what happened? Download the .pcap file and use Wireshark to view it.

No answer needed
The attacker is trying to log into a specific service. What service is this?


Answer
There is a very popular tool by Van Hauser which can be used to brute force a series of services. What is the name of this tool?
Answer
The attacker is trying to log on with a specific username. What is the username?
Answer
What is the user's password?

Answer
What is the current FTP working directory after the attacker logged in?

Answer
The attacker uploaded a backdoor. What is the backdoor's filename?

Answer
The backdoor can be downloaded from a specific URL, as it is located inside the uploaded file. What is the full URL?

Answer
Which command did the attacker manually execute after getting a reverse shell?

Answer
What is the computer's hostname?

Answer
Which command did the attacker execute to spawn a new TTY shell?

Answer
Which command was executed to gain a root shell?

Answer
The attacker downloaded something from GitHub. What is the name of the GitHub project?

Answer
The project can be used to install a stealthy backdoor on the system. It can be very hard to detect. What is this type of backdoor called?
Answer
Task 2: Hack your way back into the machine
The attacker has changed the user's password! Can you replicate the attacker's steps and read the flag.txt? The flag is located in the /root/Reptile directory. Remember, you can always look back at the .pcap file if necessary. Good luck!

No answer needed
Run Hydra (or any similar tool) on the FTP service. The attacker might not have chosen a complex password. You might get lucky if you use a common word list.
Port
Service
No answer needed
Change the necessary values inside the web shell and upload it to the webserver

No answer needed
Create a listener on the designated port on your attacker machine. Execute the web shell by visiting the .php file on the targeted web server.

No answer needed
Become root!
No answer needed
Read the flag.txt file inside the Reptile directory
Answer
Last updated