To access material, start machines and answer questions login.
In the world of cyber security, we often talk about a game of cat and mouse.
Follow the adventures of Jom and Terry, members of the TryMouseMe purple team, as they work through a thrilling exercise of Attack and Defense. From initial access to , you will emulate a three-stage attack on a Windows environment.
Attack Emulation
Start Machine button to start the machine above.
Please give the VM 5 minutes to boot up.
While you wait for the machine to start, familiarise yourself with the attack chain and engagement information below.
Note: It is highly recommended to use the AttackBox for this task.
Attack Chain
To test the capabilities of the blue team, you have been tasked to use the following TTPs to compromise the target:
| Tactics | Techniques | Procedures |
| TA001: Initial access | Exploit Public-Facing Application (T1190) | After finding a vulnerable service, you will get a user shell via remote code execution. |
| TA004: Privilege Escalation | Path Interception by Unquoted Path (T1574.009) | You will then escalate your privileges through an unquoted service path. |
| TA003: Persistence | Registry Run Keys / Startup Folder (T1547.001) Create Account: Local Account (T1136.001) | Finally, you will maintain persistence thanks to registry run keys and local user account creation. |
Engagement Specifications
To effectively detect the activities conducted during the emulation, here are the specific Indicators of Compromise (IOCs) that must be followed during the execution of the attack vectors:
| Technique | Requirements |
| Remote code execution |
|
| Unquoted service path |
|
| Registry run keys and local account creation |
|
What is the administrator flag located on the Desktop?
After achieving persistence, run the checker script on the desktop. What is the flag?
Ready to learn Cyber Security?
The Mouse Trap room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
