forensicsmedium
Red Failure
HackTheBox
Task: analyze a PCAP from a red team engagement to find leftover persistence mechanisms. Solution: extract HTTP objects (PS1 loader, DInjector DLL, encrypted shellcode), deobfuscate PowerShell to recover AES password, decrypt shellcode, decode shikata_ga_nai encoder to reveal a net user command creating a backdoor admin account.
$ ls tags/ techniques/
obfuscationpcapaes_cbcdotnetshellcodeprocess_injectionpowershelldinjectorshikata_ga_naipersistencered_teamnet_reflection
pcap_http_object_extractionpowershell_string_format_deobfuscationaes_cbc_decryption_sha256_keyshikata_ga_nai_xor_decodingshellcode_string_extraction
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]