Holmes CTF
Achieved Rank 2 with HCS π₯
The Card
Description
1. Analyze the provided logs and identify what is the first User-Agent used by the attacker against Nicole Vale's honeypot. (string)

2. It appears the threat actor deployed a web shell after bypassing the WAF. What is the file name? (filename.ext)

3. The threat actor also managed to exfiltrate some data. What is the name of the database that was exfiltrated? (filename.ext)
4. During the attack, a seemingly meaningless string seems to be recurring. Which one is it? (string)
5. OmniYard-3 (formerly Scotland Yard) has granted you access to its CTI platform. Browse to the first IP:port address and count how many campaigns appear to be linked to the honeypot attack.
6. How many tools and malware in total are linked to the previously identified campaigns? (number)
7. It appears that the threat actor has always used the same malware in their campaigns. What is its SHA-256 hash? (sha-256 hash)

8. Browse to the second IP:port address and use the CogWork Security Platform to look for the hash and locate the IP address to which the malware connects. (Credentials: nvale/CogworkBurning!)

9. What is the full path of the file that the malware created to ensure its persistence on systems? (/path/filename.ext)

10. Finally, browse to the third IP:port address and use the CogNet Scanner Platform to discover additional details about the TA's infrastructure. How many open ports does the server have?

11. Which organization does the previously identified IP belong to? (string)

12. One of the exposed services displays a banner containing a cryptic message. What is it? (string)

Last updated