To access material, start machines and answer questions login.
Join Tom and Dom on a quest to find out what happens when you look beyond the Event Horizon. A quest beyond borders, they need you to utilize all your abilities to find the secrets that were taken when they crossed over to the other side.
Note: For free users using the AttackBox, the challenge is best done using your own environment. Some browsers may detect the file as malicious. The zip file is safe to download with md5 of a1eda8f91365c322ebc8ce9b178248bc. In general, as a security practice, download the zip and analyze the forensic files on a dedicated virtual machine, and not on your host OS.
The attacker was able to find the correct pair of credentials for the email service. What were they? Format: email:password
What was the body of the email that was sent by the attacker?
What command initiated the malicious script download?
What is the initial AES key that is used for decrypting the C2 traffic?
What is the Administrator NTLM hash that the attacker found?
What is the flag?
Created by
Room Type
Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!
Users in Room
26
Created
today
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in