Notice: _load_textdomain_just_in_time işlevi yanlış çağrıldı. Translation loading for the perfect-portfolio domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Ayrıntılı bilgi almak için lütfen WordPress hata ayıklama bölümüne bakın. (Bu ileti 6.7.0 sürümünde eklendi.) in /home/margheri/public_html/wp-includes/functions.php on line 6121
TexSAW2024 Forensics: Malicious Threat Writeup - Aleyna Doğan

TexSAW2024 Forensics: Malicious Threat Writeup

CTF link.

In the wake of recent security breaches, it has become paramount to ensure the integrity and safety of our systems. A routine audit of our admin activity logs has revealed several anomalies that could suggest a breach or an attempted breach. These logs are critical to understanding the actions taken by users with administrative privileges and identifying any that could have jeopardized our network’s security. Your task is to analyze the provided admin activity logs to identify any suspicious activities.

If we delete the generic HTML pages (index.html) in the log file, we are left with one different URL.

We go to this ufile.io/y8ls94tu URL

We download the file in the URL and there are many CSV files in it, if you want you can search for texsaw{ flag in the content of the files with the grep command. user.csv contains flag.

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir