Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Tardigrade

Premium room

Can you find all the basic persistence mechanisms in this Linux endpoint?

medium

120 min

10,236

User profile photo.

To access material, start machines and answer questions login.

A server has been compromised, and the security team has decided to isolate the machine until it's been thoroughly cleaned up. Initial checks by the Incident Response team revealed that there are five different backdoors. It's your job to find and remediate them before giving the signal to bring the server back to production.

First, let's start the Virtual Machine by pressing the Start Machine button at the top of this task. You may access the using the AttackBox or your connection.

To start our investigation, we need to connect to the server. The team has provided the credentials for use below and noted that the user has root privileges to the server. I'll help guide you along at first, but as we progress through each step, I'm sure you'll feel more comfortable solving these on your own.

user: giorgio

password: armani

Answer the questions below
What is the server's OS version?

Ready to learn Cyber Security?

The Tardigrade room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.