-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathchallenge.yml
47 lines (35 loc) · 1.1 KB
/
challenge.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
---
name: "dev.corp 1/4"
author: "Worty"
category: "Forensic"
description: "The famous company dev.corp was hack last week..
They don't understand because they have followed the security standards to avoid this kind of situation. You are mandated to help them understand the attack.<br><br>
For this first step, you're given the logs of the webserver of the company.<br><br>
Could you find :<br>
- The CVE used by the attacker ?<br>
- What is the absolute path of the most sensitive file recovered by the attacker ?<br><br>
Format : **Hero{CVE-XXXX-XXXX:/etc/passwd}**<br>
Author : **Worty**<br><br>
Here is a diagram representing the company's infrastructure:
<img class='img-fluid' src='https://ctf.heroctf.fr/files/1a304ea841284b40ef20c758c2c196ba/infra.png'>"
value: null
type: dynamic
extra:
initial: 500
decay: 100
minimum: 50
image: null
host: null
flags:
- {
type: "static",
content: "Hero{CVE-2020-11738:/home/webuser/.ssh/id_rsa_backup}",
data: "case_sensitive",
}
tags:
- easy
- forensic
files:
- access.log
state: visible
version: "0.1"