forensicsmedium

Red Failure

HackTheBox

Task: analyze a PCAP from a red team engagement to find leftover persistence mechanisms. Solution: extract HTTP objects (PS1 loader, DInjector DLL, encrypted shellcode), deobfuscate PowerShell to recover AES password, decrypt shellcode, decode shikata_ga_nai encoder to reveal a net user command creating a backdoor admin account.

$ ls tags/ techniques/
pcap_http_object_extractionpowershell_string_format_deobfuscationaes_cbc_decryption_sha256_keyshikata_ga_nai_xor_decodingshellcode_string_extraction

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]