You are the Senior security analyst at SecretSource.CO One of your team members has investigated an incident and uncovered a stealthy threat actor in your enviroment. Your colleague suspects that it’s the APT group called FluffyPenguins, based on the TTP's he discovered.
How to play.
There are 5 diffrent challenges all about reverse engineering. Some static analysis challenges, some dynamic.
flag format is flag{......}.
Captured flags can be validated here.
https://xqbrkf8n54.execute-api.eu-west-1.amazonaws.com/prod
Challenge tools...
Suggestions :
REMNUX https://remnux.org
FLARE VM https://github.com/mandiant/flare-vm
CYBERCHEF https://gchq.github.io/CyberChef/
happy hunting...
Build Dockerfile and use the pre-build tools for this challange.
Build Docker
docker build -t thehunterctf:latest .
Run Docker
docker run -it thehunterctf:latest /bin/bash