đŸš©
THM Walkthroughs
  • THM Walkthroughs
    • đŸ§‘â€đŸ«Tutorial
  • 🟩Difficulty: Info
    • 🔌What is Networking?
    • 🔌Intro to LAN
    • 🐧Linux Fundamentals
      • 🐧Linux Fundamentals Part 1
        • Task 2 - A Bit of Background on Linux
        • Task 4 - Running Your First few Commands
        • Task 5 - Interacting With the Filesystem!
        • Task 6 - Searching for Files
        • Task 7 - An Introduction to Shell Operators
      • 🐧Linux Fundamentals Part 2
        • Task 3 - Introduction to Flags and Switches
        • Task 4 - Filesystem Interaction Continued
        • Task 5 - Permissions 101
        • Task 6 - Common Directories
      • 🐧Linux Fundamentals Part 3
        • Task 3 - Terminal Text Editors
        • Task 4 - General/Useful Utilities
        • Task 5 - Processes 101
        • Task 6 - Maintaining Your System: Automation
        • Task 8 - Maintaining Your System: Logs
    • đŸȘŸWindows Fundamentals
      • đŸȘŸWindows Fundamentals 1
      • đŸȘŸWindows Fundamentals 2
      • đŸȘŸWindows Fundamentals 3
    • 🔓Principles of Security
    • 🐍Python Basics
    • 🔍History of Malware
    • đŸŠčCommon Attacks
    • đŸ–„ïžSecurity Awareness
    • ⚔Intro to Offensive Security
    • đŸŠčPentesting Fundamentals
    • 🔓CVE Walkthroughs
      • đŸ–„ïžSudo Security Bypass: CVE-2019-14287
      • đŸ–„ïžSudo Buffer Overflow: CVE-2019-18634
      • đŸ–„ïžBaron Samedit: CVE-2021-3156
      • đŸ–„ïžOverlayFS: CVE-2021-3493
      • đŸ–„ïžPolkit: CVE-2021-3560
      • đŸ–„ïžPwnkit: CVE-2021-4034
      • đŸȘ¶Apache HTTP Server Path Traversal: CVE-2021-41773/42013
      • đŸ§»Dirty Pipe: CVE-2022-0847
      • 🟱Spring4Shell: CVE-2022-22965
    • 🟧Burp Suite
      • 🟧Burp Suite: The Basics
      • 🟧Burp Suite: Repeater
    • 🏁Challenges
      • ‎Bypass Disable Functions
    • đŸŽŸïžTHM PROMOs
      • đŸŽŸïžLearn and win prizes [PROMO ENDED]
      • đŸŽŸïžLearn and win prizes #2 [PROMO ENDED]
  • đŸŸ©Difficulty: Easy
    • 🚀Learning Cyber Security
    • 🔁The Hacker Methodology
    • 🔍Google Dorking
      • Task 2 - Let's Learn About Crawlers
      • Task 4 - Beepboop - Robots.txt
      • Task 5 - Sitemaps
      • Task 6 - What is Google Dorking?
    • 🐝OWASP Top 10
      • Task 5 - Command Injection Practical
      • Task 7 - Broken Authentication Practical
      • Task 11 - Sensitive Data Exposure (Challenge)
      • Task 13 - XML External Entity - eXtensible Markup Language
      • Task 14 - XML External Entity - DTD
      • Task 16 - XML External Entity - Exploiting
      • Task 18 - Broken Access Control (IDOR Challenge)
      • Task 19 - Security Misconfiguration
      • Task 20 - Cross-site Scripting
      • Task 21 - Insecure Deserialization
      • Task 24 - Insecure Deserialization - Cookies
      • Task 25 - Insecure Deserialization - Cookies Practical
      • Task 30 - Insufficient Logging and Monitoring
    • 📡Nmap
      • Task 2 - Introduction
      • Task 3 - Nmap Switches
      • Task 5 - TCP Connect Scans
      • Task 6 - Scan Types SYN Scans
      • Task 7 - UDP Scans
      • Task 8 - NULL, FIN and Xmas
      • Task 9 - ICMP Network Scanning
      • Task 10 - NSE Scripts Overview
      • Task 11 - Working with the NSE
      • Task 12 - Searching for Scripts
      • Task 13 - Firewall Evasion
      • Task 14 - Practical
    • 📡RustScan
      • Task 2 - Installing RustScan
      • Task 5 - Extensible
      • Task 7 - Scanning Time!
      • Task 8 - RustScan Quiz
    • 🐙Crack the hash
    • 🌍OhSINT
    • 🧑‍🚀Vulnversity
    • 🧊Ice
    • đŸȘŸBlue
    • 🎄Advent of Cyber 4 (2022)
  • 🟹Difficulty: Medium
    • đŸȘŸAttacktive Directory
      • Task 3 - Welcome to Attacktive Directory
      • Task 4 - Enumerating Users via Kerberos
      • Task 5 - Abusing Kerberos
      • Task 6 - Back to the Basics
      • Task 7 - Elevating Privileges within the Domain
      • Task 8 - Flag Submission Panel
    • 💀Mr Robot CTF
    • 🛗Linux PrivEsc
    • 🛗Linux PrivEsc Arena [WIP]
    • 🛗Windows PrivEsc Arena
  • 🟧Difficulty: Hard
    • 🐘Hacking Hadoop [WIP]
  • đŸŸ„Difficulty: Insane
    • â›șYou're in a cave [WIP]
  • Blank Room (Duplicate Me)
Powered by GitBook
On this page
  • Task 6 [Day 1] Frameworks Someone's coming to town!
  • Who is the adversary that attacked Santa's network this year?
  • What's the flag that they left behind?
  • Looking to learn more? Check out the rooms on Unified Kill Chain, Cyber Kill Chain, MITRE, or the whole Cyber Defence Frameworks module!
  • Task 7 [Day 2] Log Analysis Santa's Naughty & Nice Log!
  • Ensure you are connected to the deployable machine in this task.
  • Use the ls command to list the files present in the current directory. How many log files are present?
  • Elf McSkidy managed to capture the logs generated by the web server. What is the name of this log file?
  • Begin investigating the log file from question #3 to answer the following questions.
  • On what day was Santa's naughty and nice list stolen?
  • What is the IP address of the attacker?
  • What is the name of the important list that the attacker stole from Santa?
  • Look through the log files for the flag. The format of the flag is: THM{}
  • Interested in log analysis? We recommend the Windows Event Logs room or the Endpoint Security Monitoring Module.
  • Task 8 [Day 3] OSINT Nothing escapes detective McRed
  • What is the name of the Registrar for the domain santagift.shop?
  • Find the website's source code (repository) on github.com and open the file containing sensitive credentials. Can you find the flag?
  • What is the name of the file containing passwords?
  • What is the name of the QA server associated with the website?
  • What is the DB_PASSWORD that is being reused between the QA and PROD environments?
  • Check out this room if you'd like to learn more about Google Dorking!
  • Task 9 [Day 4] Scanning Scanning through the snow
  • What is the name of the HTTP server running on the remote host?
  • What is the name of the service running on port 22 on the QA server?
  • What flag can you find after successfully accessing the Samba service?
  • What is the password for the username santahr?
  • If you want to learn more scanning techniques, we have a module dedicated to Nmap!
  1. Difficulty: Easy

Advent of Cyber 4 (2022)

Get started with Cyber Security in 24 Days - learn the basics by doing a new, beginner-friendly security challenge every day leading up to Christmas.

PreviousBlueNextDifficulty: Medium

Last updated 2 years ago

Room Attributes
Value

Subscription Required

False [Free]

Type

Walkthroughs

Difficulty

Easy

Tags

beginner, christmas, challenge, advent

Task 6 [Day 1] Frameworks Someone's coming to town!

Your task is to help the Elves solve a puzzle left for them to identify who is trying to stop Christmas. Click the View Site button at the top of the task to launch the static site in split view. You may have to open the static site on a new window and zoom in for a clearer view of the puzzle pieces.

Puzzle Solutions

Puzzle 1/3

Puzzle 2/3

Puzzle 3/3

Once you complete the puzzles you'll be presented with defaced site containing the flag and a calling card from the malicious actor:

Who is the adversary that attacked Santa's network this year?

What's the flag that they left behind?

No answer needed

Task 7 [Day 2] Log Analysis Santa's Naughty & Nice Log!

Ensure you are connected to the deployable machine in this task.

No answer needed

Use the ls command to list the files present in the current directory. How many log files are present?

HINT: The directory needs to be /home/elfmcblue. You can use cd to change to this cd /home/elfmcblue

Elf McSkidy managed to capture the logs generated by the web server. What is the name of this log file?

HINT: You can use the lscommand to list the files present in the directory.

Begin investigating the log file from question #3 to answer the following questions.

No answer needed

On what day was Santa's naughty and nice list stolen?

HINT: This answer is looking for a day in the week.

What is the IP address of the attacker?

HINT: The attacker only made one request to the web server.

What is the name of the important list that the attacker stole from Santa?

Look through the log files for the flag. The format of the flag is: THM{}

HINT: Using grep recursively allows you to quickly look through a bunch of log files for a value.

No answer needed

Task 8 [Day 3] OSINT Nothing escapes detective McRed

What is the name of the Registrar for the domain santagift.shop?

HINT: Check the who.is/whois website to find WHOIS information.

HINT: Use the same search terms that Recon McRed used on github.com to find the leaked source code.

What is the name of the file containing passwords?

HINT: Check the file containing sensitive credentials.

What is the name of the QA server associated with the website?

What is the DB_PASSWORD that is being reused between the QA and PROD environments?

No answer needed

Task 9 [Day 4] Scanning Scanning through the snow

What is the name of the HTTP server running on the remote host?

HINT: Try nmap -sV MACHINE_IP in the AttackBox.

What is the name of the service running on port 22 on the QA server?

What flag can you find after successfully accessing the Samba service?

HINT: It is located in the admins folder.

What is the password for the username santahr?

No answer needed

Reveal Flag
Reveal Flag

Looking to learn more? Check out the rooms on , , , or the whole module!

Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag

Interested in log analysis? We recommend the room or the .

All the information you need can be found on

Reveal Flag

Find the website's source code (repository) on and open the file containing sensitive credentials. Can you find the flag?

All the information you need can be found on

Reveal Flag

contains several secrets in code that are publicly readable in source code:

Reveal Flag
Reveal Flag
Reveal Flag

Check out this if you'd like to learn more about Google Dorking!

Reveal Flag
Reveal Flag
Reveal Flag
Reveal Flag

If you want to learn more scanning techniques, we have a module dedicated to !

The Bandit Yeti

THM{IT'S A Y3T1 CHR1$TMA$}

2

webserver.log

Friday

10.10.249.191

santaslist.txt

THM{STOLENSANTASLIST}

NAMECHEAP INC

{THM_OSINT_WORKS}

config.php

qa.santagift.shop

S@nta2022

Apache

ssh

{THM_SANTA_SMB_SERVER}

santa25

đŸŸ©
🎄
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
đŸš©
Unified Kill Chain
Cyber Kill Chain
MITRE
Cyber Defence Frameworks
Windows Event Logs
Endpoint Security Monitoring Module
https://who.is/whois/santagift.shop
github.com
https://github.com/muhammadthm/SantaGiftShop
config.php
room
Nmap