Flight plan: Difference between revisions
From Pessin randon wiki
Created page with "===Description=== ===Question=== ===Solution=== ===Tools=== ===Flag=== ===Links=== * Back to CTF Challenges page" |
No edit summary |
||
| Line 1: | Line 1: | ||
===Description=== | ===Description=== | ||
After everything is cleared you start to wonder about the origin of this attack. | |||
When inspecting the logs, a correlation between the start of the compromise and a pdf file arriving to the ATC can be made. | |||
200pts | |||
===Question=== | ===Question=== | ||
Inspect the flight plan, find out if there is anything malicious hidden in it. | |||
===Solution=== | ===Solution=== | ||
Revision as of 10:01, 12 September 2022
Description
After everything is cleared you start to wonder about the origin of this attack.
When inspecting the logs, a correlation between the start of the compromise and a pdf file arriving to the ATC can be made.
200pts
Question
Inspect the flight plan, find out if there is anything malicious hidden in it.