WolvCTF Forensics Eternally Pwned: Persistence Writeup
CTF link. I get that the attackers were in my PC, but how did they achieve persistence? We use the OSForensics tool to do forensics in our.DMP file. The free version will do the job. We use the Hex/String Viewer feature to look at the detailed contents of the file and here we notice the …