To access material, start machines and answer questions login.
Beneath the tempest's roar, a quiet grace,
Mayhem's beauty in a hidden place.
Within the chaos, a paradox unfolds,
A tale of beauty, in disorder it molds.
Click on the Download Task Files button at the top of this task. You will be provided with an evidence.zip file. Extract the zip file's contents and begin your analysis in order to answer the questions.
Note: Some browsers may detect the file as malicious. The zip file is safe to download with md5 of a7d64354e4b8798cff6e063449c1e64f
. In general, as a security practice, download the zip and analyze the forensic files on a dedicated virtual machine, and not on your host OS. Always handle such files in isolated, controlled, and secure environments.
What is the SID of the user that the attacker is executing everything under?
What is the Link-local IPv6 Address of the server? Enter the answer exactly as you see it.
The attacker added a new account as a persistence mechanism. What is the username and password of that account? Format is username:password
The attacker found an important file on the server. What is the full path of that file?
What is the flag found inside the file from question 5?
Created by
Room Type
Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!
Users in Room
3,230
Created
113 days ago
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in