#1 |
What is the computer hostname?
|
50 |
471
|
|
|
#2 |
What is the Timezone of the compromised machine?
|
50 |
418
|
|
|
#3 |
What is the current build number on the system?
|
50 |
406
|
|
|
#4 |
What is the computer IP?
|
50 |
405
|
|
|
#5 |
What is the domain computer was assigned to?
|
50 |
401
|
|
|
#6 |
When was myoussef user created?
|
50 |
363
|
|
|
#7 |
What is the user mhasan password hint?
|
50 |
358
|
|
|
#8 |
What is the version of the VMware product installed on the machine?
|
50 |
376
|
|
|
#9 |
What is the version of the log4j library used by the installed VMware product?
|
100 |
361
|
|
|
#10 |
What is the log4j library log level specified in the configuration file?
|
100 |
345
|
|
|
#11 |
The attacker exploited log4shell through an HTTP login request. What is the HTTP header used to inject payload?
|
50 |
290
|
|
|
#12 |
The attacker used the log4shell.huntress.com payload to detect if vcenter instance is vulnerable. What is the first link of the log4huntress payload?
|
50 |
287
|
|
|
#13 |
When was the first successful login to vsphere WebClient?
|
100 |
275
|
|
|
#14 |
What is the attacker's IP address?
|
100 |
284
|
|
|
#15 |
What is the port the attacker used to receive the cobalt strike reverse shell?
|
200 |
245
|
|
|
#16 |
What is the script name published by VMware to mitigate log4shell vulnerability?
|
50 |
257
|
|
|
#17 |
In some cases, you may not be able to update the products used in your network. What is the system property needed to set to 'true' to work around the log4shell vulnerability?
|
50 |
251
|
|
|
#18 |
What is the log4j version which contains a patch to CVE-2021-44228?
|
50 |
256
|
|
|
#19 |
Removing JNDIlookup.class may help in mitigating log4shell. What is the sha256 hash of the JNDILookup.class?
|
100 |
227
|
|
|
#20 |
Analyze JNDILookup.class. What is the value stored in the CONTAINER_JNDI_RESOURCE_PATH_PREFIX variable?
|
150 |
230
|
|
|
#21 |
What is the executable used by the attacker to gain persistence?
|
150 |
219
|
|
|
#22 |
When was the first submission of ransomware to virustotal?
|
50 |
219
|
|
|
#23 |
The ransomware downloads a text file from an external server. What is the key used to decrypt the URL?
|
100 |
202
|
|
|
#24 |
What is the ISP that owns that IP that serves the text file?
|
100 |
209
|
|
|
#25 |
The ransomware check for extensions to exclude them from the encryption process. What is the second extension the ransomware checks for?
|
100 |
202
|
|