MrRobot Lab
Scenario
Tools
Questions
Q1: Machine:Target1 What email address tricked the front desk employee into installing a security update?




Answer
Q2: Machine:Target1 What is the filename that was delivered in the email?

Answer
Q3: Machine:Target1 What is the name of the rat's family used by the attacker?



Answer
Q4: Machine:Target1 The malware appears to be leveraging process injection. What is the PID of the process that is injected?




Answer
Q5: Machine:Target1 What is the unique value the malware is using to maintain persistence after reboot?


Answer
Q6: Machine:Target1 Malware often uses a unique value or name to ensure that only one copy runs on the system. What is the unique name the malware is using?

Answer
Q7: Machine:Target1 It appears that a notorious hacker compromised this box before our current attackers. Name the movie he or she is from.

Answer
Q8: Machine:Target1 What is the NTLM password hash for the administrator account?


Answer
Q9: Machine:Target1 The attackers appear to have moved over some tools to the compromised front desk host. How many tools did the attacker move?

Answer
Q10: Machine:Target1 What is the password for the front desk local administrator account?

Answer
Q11: Machine:Target1 What is the std create data timestamp for the nbtscan.exe tool?

Answer
Q12: Machine:Target1 The attackers appear to have stored the output from the nbtscan.exe tool in a text file on a disk called nbs.txt. What is the IP address of the first machine in that file?

Answer
Q13: Machine:Target1 What is the full IP address and the port was the attacker's malware using?

Answer
Q14: Machine:Target1 It appears the attacker also installed legit remote administration software. What is the name of the running process?
Answer
Q15: Machine:Target1 It appears the attackers also used a built-in remote access method. What IP address did they connect to?

Answer
Q16: Machine:Target2 It appears the attacker moved latterly from the front desk machine to the security admins (Gideon) machine and dumped the passwords. What is Gideon's password?




Answer
Q17: Machine:Target2 Once the attacker gained access to "Gideon," they pivoted to the AllSafeCyberSec domain controller to steal files. It appears they were successful. What password did they use?
Answer
Q18: Machine:Target2 What was the name of the RAR file created by the attackers?
Answer
Q19: Machine:Target2 How many files did the attacker add to the RAR archive?


Answer
Q20: Machine:Target2 The attacker appears to have created a scheduled task on Gideon's machine. What is the name of the file associated with the scheduled task?


Answer
Q21: Machine:POS What is the malware CNC's server?
Answer
Q22: Machine:POS What is the common name of the malware used to infect the POS system?

Answer
Q23: Machine:POS In the POS malware whitelist. What application was specific to Allsafecybersec?

Answer
Q24: Machine:POS What is the name of the file the malware was initially launched from?

Answer
Last updated