forensicsProeasy
Тот сайт с GitHub (That site from GitHub)
hackerlab
Task: Analyze a suspicious website archive cloned from GitHub. Solution: Found hidden malicious code in update.sh script (97KB with empty lines hiding base64-encoded Python that creates and executes a hidden ELF binary), extracted the binary and found the flag using strings.
$ ls tags/ techniques/
strings_analysissupply_chainshell_script_analysisbase64_encodinghidden_binaryelf_extractionmalware_hidinggithub_clone
Suspicious shell script analysisBase64 decoding of hidden payloadsEmbedded binary extraction from scriptsELF binary strings analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [misc][Pro]Git Secrets (e9d0e0f2-1069-4f72-9d56-398c01c0a960)— hackerlab
- [misc][Pro]По крупицам (Bit by Bit)— hackerlab
- [osint][Pro]GitHub Email OSINT— hackerlab
- [infra][Pro]SecretShell— alfactf
- [forensics][Pro]Скрытый след (Hidden Trail)— hackerlab