πAdvent of Cyber 4 (2022)
Get started with Cyber Security in 24 Days - learn the basics by doing a new, beginner-friendly security challenge every day leading up to Christmas.
Room Attributes
Value
Task 6 [Day 1] Frameworks Someone's coming to town!

Who is the adversary that attacked Santa's network this year?
What's the flag that they left behind?
Looking to learn more? Check out the rooms on Unified Kill Chain, Cyber Kill Chain, MITRE, or the whole Cyber Defence Frameworks module!
Task 7 [Day 2] Log Analysis Santa's Naughty & Nice Log!

Ensure you are connected to the deployable machine in this task.
Use the ls command to list the files present in the current directory. How many log files are present?
ls command to list the files present in the current directory. How many log files are present?Elf McSkidy managed to capture the logs generated by the web server. What is the name of this log file?
Begin investigating the log file from question #3 to answer the following questions.
On what day was Santa's naughty and nice list stolen?
What is the IP address of the attacker?
What is the name of the important list that the attacker stole from Santa?
Look through the log files for the flag. The format of the flag is: THM{}
Interested in log analysis? We recommend the Windows Event Logs room or the Endpoint Security Monitoring Module.
Task 8 [Day 3] OSINT Nothing escapes detective McRed

What is the name of the Registrar for the domain santagift.shop?
santagift.shop?Find the website's source code (repository) on github.com and open the file containing sensitive credentials. Can you find the flag?
What is the name of the file containing passwords?
What is the name of the QA server associated with the website?
What is the DB_PASSWORD that is being reused between the QA and PROD environments?
Check out this room if you'd like to learn more about Google Dorking!
Task 9 [Day 4] Scanning Scanning through the snow

What is the name of the HTTP server running on the remote host?
What is the name of the service running on port 22 on the QA server?
What flag can you find after successfully accessing the Samba service?
What is the password for the username santahr?
If you want to learn more scanning techniques, we have a module dedicated to Nmap!
Last updated






